A Different Kind of IKEA Hack: Javascript Price Comparison by Location

When looking for the best deal, it pays to shop around. When it comes to chain stores, of course, one expects the price to be the same across their retail network. However, where international companies are concerned, occasionally a better deal is just a border crossing away. To investigate the …read more

Continue reading A Different Kind of IKEA Hack: Javascript Price Comparison by Location

Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

Security researchers have followed the evolution of a piece of infostealer malware named Raccoon, as it’s being developed and enhanced to work in as many scenarios as possible, including email clients, Internet browsers, and more. Infostealers ar… Continue reading Raccoon Malware Aims to Steal Credentials of People Who Use Popular Apps

FTCode: PowerShell’s Own Ransomware

If it is not yet apparent how pervasive and problematic ransomware is, just look at the news. Weekly, and sometimes near-daily, a new variant is discovered or another massive corporation has fallen victim to an attack. Whether a Fortune 500 company or… Continue reading FTCode: PowerShell’s Own Ransomware

Raspberry Pi Streams Music Using Only the Default Linux Tools

Getting a  home music streaming system off the ground is typically a straightforward task. Using Apple devices with Airplay makes this task trivial, but if you’re a computing purist like [Connor] who runs a Linux machine and wants to keep it light on extra packages, the task gets complicated quickly. …read more

Continue reading Raspberry Pi Streams Music Using Only the Default Linux Tools

[SANS ISC] Obfuscated bash script targeting QNap boxes

I published the following diary on isc.sans.edu: “Obfuscated bash script targeting QNap boxes“: One of our readers, Nathaniel Vos, shared an interesting shell script with us and thanks to him! He found it on an embedded Linux device, more precisely, a QNap NAS running QTS 4.3. After some quick investigations,

[The post [SANS ISC] Obfuscated bash script targeting QNap boxes has been first published on /dev/random]

Continue reading [SANS ISC] Obfuscated bash script targeting QNap boxes

Delving deep into VBScript

In late April we found and wrote a description of CVE-2018-8174, a new zero-day vulnerability for Internet Explorer that uses a well-known technique from the PoC exploit CVE-2014-6332. But whereas CVE-2014-6332 was aimed at integer overflow exploitation for writing to arbitrary memory locations, my interest lay in how this technique was adapted to exploit the use-after-free vulnerability. Continue reading Delving deep into VBScript

Automatically Resize an Azure VM

In this “how to” post, Aidan Finn shows you how to use Azure Automation to scale up (increase) or scale down (decrease) the size of an Azure virtual machine.

The post Automatically Resize an Azure VM appeared first on Petri.

Continue reading Automatically Resize an Azure VM