#BlueBorne : Wormable #Bluetooth #Attack "Unfortunately, this set of capabilities is extremely desireable to a #hacker . BlueBorne can serve any malicious objective, such as cyber espionage, data theft, ransomware, and even creating large botnets out of I..."
🤖 This is the indictment against Marcus Hutchins of Malware Tech Blog- arrested for distributing the C&C software of a banking Trojan called #Kronos. Marcus was the security researcher who discovered the kill-switch to the #WannaCry #ransomware. #cybersecurity
If you are interested in #hacker #books, but are not able to spend hundreds of dollars, the #humblebundle can help! Currently they have a very good deal: https://www.humblebundle.com/books/cybersecurity-wiley
For 1$, you get:
- Social Engineering: The Art of Human Hacking
- The Web Application Hacker's Handbook
- Practical Reverse Engineering
- Threat Modeling: Designing for Security
5 more books for 8$ and again 5 more for 16$.
Source infection through e-mail with a #Microsoft Word .doc file.
Currently the malicious doc file attached in the e-mails are not detected by antivirus.
The #killswitch doesn't work for all infections.
#WikiLeaks publishes documents from the #BrutalKangaroo project of the #CIA . Brutal Kangaroo is a tool suite for #Microsoft Windows that targets closed networks by air gap jumping using thumbdrives through #USB stick. Brutal Kangaroo components create a custom covert #network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.