Tag: SANS Internet Storm Center, InfoCON: green

Python Libraries Used for Malicious Purposes, (Wed, Sep 11th)

Since I&#x27m interested in malicious Python scripts, I found multiple samples that rely on existing libraries. The most-known repository is probably pypi.org[1] that reports, as of today, 567,478 projects! Malware developers are like regular developers: They don&#x27t want to reinvent…

Microsoft September 2024 Patch Tuesday, (Tue, Sep 10th)

Today, Microsoft released its scheduled September set of patches. This update addresses 79 different vulnerabilities. Seven of these vulnerabilities are rated critical. Four vulnerabilities are already being exploited and have been made public. This article has been indexed from…


Python & Notepad++, (Sat, Sep 7th)

PythonScript is a Notepad++ plugin that provides a Python interpreter to edit Notepad++ documents. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: 
Python & Notepad++, (Sat, Sep 7th)

Password Cracking & Energy: More Dedails, (Sun, Sep 8th)

Here are more details on the power consumption of my desktop computer when I crack passwords (cfr diary entry “Quickie: Password Cracking & Energy”). This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article:…

Python & Notepad++, (Sat, Sep 7th)

PythonScript is a Notepad++ plugin that provides a Python interpreter to edit Notepad++ documents. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Python & Notepad++, (Sat, Sep 7th)

Attack Surface [Guest Diary], (Wed, Sep 4th)

[This is a Guest Diary by Joshua Tyrrell, an ISC intern as part of the SANS.edu BACS program] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Attack Surface [Guest Diary], (Wed, Sep…

Scans for Moodle Learning Platform Following Recent Update, (Wed, Sep 4th)

On August 10th, the popular learning platform “Moodle” released an update fixing %%cve:2024-43425%%. RedTeam Pentesting found the vulnerability and published a detailed blog post late last week. The blog post demonstrates in detail how a user with the “trainer” role could…