Aggregator
Cobalt Strike Staffing Changes and the Road Ahead
TLDR: Cobalt Strike Staffing Changes Recently there have been some internal changes within the Cobalt Strike team. Greg Darwin has switched to a new position within Fortra. Greg has been the face of Cobalt Strike within the community for a number of years and we thank Greg for all his work and effort he put [...]
Read More... from Cobalt Strike Staffing Changes and the Road Ahead
The post Cobalt Strike Staffing Changes and the Road Ahead appeared first on Cobalt Strike.
CVE-2015-7021 | Apple Mac OS X up to 10.11.0 Graphics Drivers memory corruption (HT205375 / Nessus ID 86654)
CVE-2015-6989 | Apple iOS up to 9.0 Grand Central Dispatch memory corruption (HT205370 / Nessus ID 86654)
CVE-2015-6989 | Apple Mac OS X up to 10.11.0 Grand Central Dispatch Font File memory corruption (HT205375 / Nessus ID 86654)
CVE-2015-7019 | Apple Mac OS X up to 10.11.0 Graphics Drivers memory corruption (HT205375 / Nessus ID 86654)
CVE-2015-7020 | Apple Mac OS X up to 10.11.0 Graphics Drivers memory corruption (HT205375 / Nessus ID 86654)
Ford investigates alleged breach following customer data leak
Ford investgates alleged breach following customer data leak
CVE-2004-0652 | BEA WebLogic 7.0/7.0.0.1/8.1 administrator Remote Code Execution (VU#352110 / ID 87198)
CVE-2004-0650 | Cisco Collaboration Server up to 3.0 UploadServlet privileges management (VU#718896 / XFDB-16553)
CVE-2004-0657 | NTP Daemon up to 3.x Request integer coercion (VU#584606 / XFDB-15406)
CVE-2004-0690 | KDE 3.2.1 DCOPServer /tmp symlink (VU#330638 / Nessus ID 24307)
CVE-2004-0636 | AOL Instant Messenger 5.5 URI goaway memory corruption (VU#735966 / EDB-395)
CVE-2004-0646 | Macromedia JRun 3.0/3.1/4.0 mod_jrun writetolog memory corruption (VU#990200 / Nessus ID 14810)
CVE-2004-0628 | MySQL 4.1/5.0 stack-based overflow (VU#645326 / Nessus ID 19149)
DEF CON 32 – Breaching AWS Through Shadow Resources
Authors/Presenters: Yakir Kadkoda, Michael Katchinskiy, Ofek Itach
Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Breaching AWS Through Shadow Resources appeared first on Security Boulevard.