Javascript Injection Creates Rogue WordPress Admin User

Earlier this year, we faced a growing volume of infections related to a vulnerability in outdated versions of the Newspaper and Newsmag themes. The infection type was always the same: malicious javascript designed to display unauthorized pop-ups or co… Continue reading Javascript Injection Creates Rogue WordPress Admin User

How-to nail data viz design for multidimensional data (Part 1)

Example multidimensional data plot from https://commons.wikimedia.org/wiki/File:Scatter_plot.jpg
In this article I’ll describe some of the design challenges and thought processes I go through when solving a common “entity list” design… Continue reading How-to nail data viz design for multidimensional data (Part 1)

Attacking Active Directory: Tools and Techniques for Using your AD Against You

The Problem with Active Directory Since it was introduced in 2000, Active Directory has become the most critical application for the majority of enterprises. The problem is, that in the almost two decades since it was released, the enterprise security … Continue reading Attacking Active Directory: Tools and Techniques for Using your AD Against You

There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

The digital world of Bitcoin is ablaze with profit, speculation, and potential riches for all – unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. From the oldest tricks in the bo… Continue reading There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

DerbyCon 2017, Lee Christensen, Matt Nels & Wil Schroeder’s ‘An ACE in the Hole: Stealthy Host Persistence Via Security Descriptors’

Permalink
The post DerbyCon 2017, Lee Christensen, Matt Nels & Wil Schroeder’s ‘An ACE in the Hole: Stealthy Host Persistence Via Security Descriptors’ appeared first on Security Boulevard.
Continue reading DerbyCon 2017, Lee Christensen, Matt Nels & Wil Schroeder’s ‘An ACE in the Hole: Stealthy Host Persistence Via Security Descriptors’

Do You Know What Healthcare Did Last Summer?

A Summer to Forget for the Healthcare Industry While we’re amidst the throes of winter, when it comes to cyber security, one industry is happy the summer is long over. It was a pretty bad summer for the healthcare industry and email security and … Continue reading Do You Know What Healthcare Did Last Summer?