
malwarejake.blogspot.com
MalwareJakeRamblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for?
http://malwarejake.blogspot.com/
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for?
http://malwarejake.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
1.1 seconds
16x16
32x32
64x64
128x128
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
27
SITE IP
172.217.6.225
LOAD TIME
1.109 sec
SCORE
6.2
MalwareJake | malwarejake.blogspot.com Reviews
https://malwarejake.blogspot.com
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for?
MalwareJake: October 2016
http://malwarejake.blogspot.com/2016_10_01_archive.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Monday, October 31, 2016. New Shadow Brokers dump - thoughts and implications. In case you missed it, the Shadow Brokers just released a list of keys. To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom". If you're one of the organizations impac...
MalwareJake: Blind recruiting on LinkedIn - advice to recruiters
http://malwarejake.blogspot.com/2017/01/blind-recruiting-on-linkedin-advice-to.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Wednesday, January 11, 2017. Blind recruiting on LinkedIn - advice to recruiters. This message I got on LinkedIn today is a great example of how NOT. Want to get serious about recruiting? What am I offering that would make this job attractive to a business owner? So attractive they'd leave the business and come work for me? Blind recruiting on Li...
MalwareJake: March 2016
http://malwarejake.blogspot.com/2016_03_01_archive.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Tuesday, March 29, 2016. Open letter to EC Council. Dear EC Council,. Your website is hacked. Your website has been hacked - for a long time. Way too long for any "security" training/accreditation company. You probably know I have a generally low opinion of your CEH and CHFI certifications, but please don't let that stand between us. Is offering ...
MalwareJake: Implications of the newest Shadow Brokers offerings
http://malwarejake.blogspot.com/2017/01/implications-of-newest-shadow-brokers.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Sunday, January 8, 2017. Implications of the newest Shadow Brokers offerings. What of the tools? This screenshot shows the price for individual components. Most interesting perhaps is the fact that the exploits contain a possible SMB zero day exploit. For the price requested, one would hope it is a zero day. The price is far too high ...This scre...
MalwareJake: Russian election hacking sanctions
http://malwarejake.blogspot.com/2017/01/russian-election-hacking-sanctions.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Sunday, January 1, 2017. Russian election hacking sanctions. Now I'll admit declaring 35 Russian operatives in the US persona non grata (PNG) IS. Significant. It takes time to find and train new embassy operatives (if you believe what you see on The Americans. But what about the sanctions for people and companies involved in the hacking? This is ...
TOTAL PAGES IN THIS WEBSITE
19
malware – CYINT Analysis
http://www.cyintanalysis.com/tag/malware
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). The malware ...
PCAP – CYINT Analysis
http://www.cyintanalysis.com/tag/pcap
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). May 10, 2015.
Analysis – CYINT Analysis
http://www.cyintanalysis.com/tag/analysis
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). April 9, 2016.
analytic methods – CYINT Analysis
http://www.cyintanalysis.com/tag/analytic-methods
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / analytic methods. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counter-intuitive...
More PCAP Analysis Practice – CYINT Analysis
http://www.cyintanalysis.com/more-pcap-analysis-practice
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. February 28, 2016. July 30, 2016. More PCAP Analysis Practice. It’s time to tackle another PCAP analysis exercise from Brad Duncan. I’ve only done a couple of these (I posted one of my write ups here. So here we go! On December 8, 2014 at 18:18 UTC,...
UCloud-201612-002: Linux内核通杀提权漏洞安全预警 | U刻
http://blog.ucloud.cn/archives/1719
Centos 7 默认不受影响 开启namespaces后受影响. Ubuntu 12.04 14.04受影响. Sudo apt-get install linux-image-generic. Ubuntu 14.04 : 3.13.0-105.152. Ubuntu 12.04 : 3.2.0-118.161. CVE-2016-8655 Linux (net/packet/af packet.c)存在条件竞争漏洞,可以让低权限的进程获得内核代码执行权限。 POC https:/ www.exploit-db.com/exploits/40871/. Https:/ access.redhat.com/security/cve/CVE-2016-8655. Https:/ people.canonical.com/ ubuntu-security/cve/2016/CVE-2016-8655.html. Https:/ security-tracker.debian.org/tracker/CVE-2016-8655. Http:/ malwarejake.blogspot.com/.
intel workflow – CYINT Analysis
http://www.cyintanalysis.com/tag/intel-workflow
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / intel workflow. September 11, 2016. September 11, 2016. A Simple, Free, and Fast Open Source Workflow For Processing Indicators. Fortunately, the availability and quality of open source threat intelligence tools have grown in-kind with the qua...
intelprogram – CYINT Analysis
http://www.cyintanalysis.com/tag/intelprogram
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Great stuff in the #CTIJam. Counter-intui...
Christian – CYINT Analysis
http://www.cyintanalysis.com/author/cyint-dude
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Cyber threat intelligence analyst. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counte...
TOTAL LINKS TO THIS WEBSITE
27
DigitaleExpertise
How to uninstall kiwee
How to uninstall kiwee. Monday, September 29, 2008. Malicious Kiwee is a pain. After spending a few hours bumbling around on the internet and with no conclusive websites coming up I decided to post a blog about my horrible experience with Kiwee. If you have Kiwee, and you've tried uninstalling it, you'll probably know what this is about. I'm running Windows Vista Home Edition. These instructions may not be for you otherwise. I take no responsibility for any damage you do to your computer. Also, without r...
malwareinvestigation.com
Malware Investigator
What is Malware Investigator? Malware Investigator is a tool that provides users the ability to submit suspected malware files and within as little as an hour, receive detailed technical information about what the malware does and what it may be targeting. Malware Investigator is accessible by established FBI partnerships, to include members of the U.S. Intelligence Community (USIC), domestic and foreign law enforcement, academia, and private industry. How to Access Malware Investigator. Malware Investig...
MalwareJake
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Thursday, January 12, 2017. Shadow Brokers - Russian thoughts? Who are the Shadow Brokers? Are they nation state? If so, are they Russian government or Russian government sponsored? Were kicked out of the US. Apparently we also took their summer vacation home. Shadow Brokers "final message". So why dump the actual files themselves? I think that s...
malwarejournal.com - This website is for sale! - malwarejournal Resources and Information.
The owner of malwarejournal.com. Is offering it for sale for an asking price of 199 USD! This page provided to the domain owner free. By Sedo's Domain Parking. Disclaimer: Domain owner and Sedo maintain no relationship with third party advertisers. Reference to any specific service or trade mark is not controlled by Sedo or domain owner and does not constitute or imply its association, endorsement or recommendation.
Malware Killer
Friday, 20 July 2012. Windows Security System rogue removal lesson. Is a a fake antispyware program that imitates functions of a legitimate tool expecting computer users to fall for this trick. The program looks pretty trustworthy if you just look at it. However, it only compromises computer systems and swindle the money away. Labels: remove Windows Security System. Windows Security System entfernen. Windows Security System virus. Windows Security Renewal is a "newly-born" rogue. Be careful of it! Protec...
Welcome to MALWAREKILLER.COM
Interested in this domain? This page is provided courtesy of GoDaddy.com, LLC.
MalwareKillers.com - We'll help you with the removal of all the infections from your computer!
Browser Hijackers & Search Redirectors. Potentially Unwanted Programs (PUPs). We'll help you with the removal of all the infections from your computer! How to remove ShieldDefense.net Redirects. September 4, 2017. How to remove ShieldDefense.net Redirects. Votes, average: 4.88. How to remove ShieldDefense.net Redirects. What is ShieldDefense.net:. Threat Classification: Browser Hijacker. Website is currently been promoted by the. Shield Defense browser extension. Is very similar to the. 3rd party web ads.
malwareknights.com
Welcome to: malwareknights.com. This Web page is parked for FREE, courtesy of GoDaddy.com. Search for domains similar to. Is this your domain? Let's turn it into a website! Would you like to buy this. THE domain at THE price. Visit GoDaddy.com for the best values on. Restrictions apply. See website for details.
SOCIAL ENGAGEMENT