White Hat Computer Consulting

Solutions are only the beginning

Feed aggregator

Handling Special PDF Compression Methods, (Sun, Apr 19th)

Internet Storm Center - 3 hours 20 min ago

Maarten Van Horenbeeck posted a

Memory Forensics Of Network Devices, (Fri, Apr 17th)

Internet Storm Center - Fri, 04/17/2015 - 04:13

Memory forensics of PCs has become a popular forensic method, and has made great progress the las ...(more)...

Exploit kits (still) pushing Teslacrypt ransomware, (Thu, Apr 16th)

Internet Storm Center - Wed, 04/15/2015 - 18:02

Teslacrypt is a form of ransomware that was first noted in January of this year [

MS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW, (Wed, Apr 15th)

Internet Storm Center - Wed, 04/15/2015 - 12:38

MS15-034, which patches CVE-2015-1635, is quickly emerging as a big deal. The vulnerability can e ...(more)...

Odd POST Request To Web Honeypot, (Tue, Apr 14th)

Internet Storm Center - Mon, 04/13/2015 - 20:11

I just saw this odd POST request to our honeypotsENUSMSN)\r\n
Host: [IP Address of Honeypo ...(more)...

The Kill Chain: Now With Pastebin, (Fri, Apr 10th)

Internet Storm Center - Fri, 04/10/2015 - 02:07

I have yet another maldoc sample. They still keep coming, these malicious Word and Excel document ...(more)...

An example of the malicious emails sometimes sent to the ISC handler addresses, (Thu, Apr 9th)

Internet Storm Center - Wed, 04/08/2015 - 18:19

Part of being an ISC handler is reviewing the emails sent to our various email distros. Because t ...(more)...

Pages

Subscribe to White Hat Computer Consulting aggregator