Tag: exploitation

By: Jillian Stella, October 24, 2017 (16:26 PM)

Office Exploit – It’s not a bug, it’s a feature

Microsoft Word has been an instrument of imperative functions for decades now.It’s a place for writers to proof read their work, a place for designers to create custom posters or brochures, a place where a lazy twenty-something year old can supplement their job experience into a pre-prepared r...

Continue Reading
By: Jillian Stella, September 18, 2017 (20:15 PM)

The Return of Shadow Brokers

We're nearing 2018 and subscriptions are huge. If anything, they're bigger than ever. You can subscribe to just about anything your heart desires; whether it is People Magazine, FitFunFab, Spotify, Netflix, Birchbox, etc.As of this June, you can add UNITEDRAKE to the subscription list - a bi-mon...

Continue Reading
By: Walker Rowe, May 01, 2017 (09:21 AM)

Wikileaks Marble Framework CIA String Obfuscator Code Explained

WikiLeaks has just published the third batch of CIA documents. While they say this is source code, it is not the actual spyware that we have been waiting for. Instead this is code the CIA uses to obfuscate their programs so they cannot be traced back to the CIA. So it’s just one piece of the large...

Continue Reading
By: Walker Rowe, April 17, 2017 (09:25 AM)

Looks Like The NSA Owns SWIFT

The anonymous leaker or leakers, Shadowbrokers, has dumped 300 MB of NSA source code and documentation onto the internet and published it at github. This is a large haul of zero-day exploits placed there with no advance ...

Continue Reading
By: Walker Rowe, March 28, 2017 (09:08 AM)

WikiLeaks Releases Dark Matter, the Second Batch of CIA Documents

On March 23rd, Wikileaks released Dark Matter. As promised this is the second batch of leaked CIA documents. The focus here are iOS and Mac OS X exploits. But what is still not there is the source code. As we Continue Reading

By: Walker Rowe, March 13, 2017 (06:50 AM)

Wikileaks Vault 7 CIA Espionage Tools

The worldwide media has widely reported on the loss of the CIA cyber arsenal to WikiLeaks. WikiLeaks calls this trove Vault 7. But the media, and most readers, are not IT people. So the articles do not give an exact view as to exactly what has been lost by the CIA, as the average newspaper reader wi...

Continue Reading
By: Owen Dubiel, March 02, 2017 (10:24 AM)

Network Compromise Kill Chain

As a cyber security professional it is imperative that you fully understand the attack kill chain and how to stop it. In the long run it will be beneficial for any security analyst to have a plan of action in place for each step as well as having it memorized. In the event of a possible compromise, ...

Continue Reading
By: Walker Rowe, February 02, 2017 (11:05 AM)

Understanding Buffer Overflow and Shellcode Exploits

In the official biography of Bill Gates, Paul Allen, the Microsoft co-founder, tells of flying into an airport with the code he and Bill had sold to Atari to provide Basic Language for that platform. Mr Allen says as the airplane circled the airport he realized he had not written code to load those ...

Continue Reading

Be Informed. Stay One Step Ahead.

Sign up for our newsletter and stay up to date with the latest industry news, trends, and technologies