Wednesday, July 1, 2015

OPM Data Breach: What Needs to Happen Now

OPM Data Breach: What Needs to Happen Now

OPM Data Breach: What Needs to Happen Now

Given that OPM handles records for federal employees, including those obtaining security clearances, the damage can potentially go beyond financial crimes.
Cyphort Social Hub

Helping Cyphort Defeat The Enemy Inside The...

Helping Cyphort Defeat The Enemy Inside The Gates | Sapphire Ventures @sapphirevc

Helping Cyphort Defeat The Enemy Inside The...

When it comes to cybersecurity, we live in unprecedented times! The enemy has figured out how to breach the perimeter security – including firewalls, anti-virus, endpoint security, and more – that enterprises have put up over the last decade and is already inside the gates of enterprises. Security breaches have become so passé that some of them don’t even get mentioned in the press, and if they do the shelf-life of news about the breach lasts only a few days. However, for nearly all enterprises these kinds of security breaches are top-of-mind since the costs associated with each breach continue to creep up and up. According to an IBM study, the average consolidated total cost of a data breach is $3.8 million representing a 23 percent...Read More
Cyphort Social Hub

NGFW – WTF is the Intelligence?

NGFW – WTF is the Intelligence?

NGFW – WTF is the Intelligence?

Definition: Intelligence - can be generally described as the ability to perceive and/or retain knowledge or information and apply it to itself or other instances of knowledge Today’s state of cyber security is one of the most interesting, and challenging it has ever been. If you take a step back and review the advancements in the traditional security infrastructure, there has been little innovation in the terms of providing protection layers that are as advanced as the tactics used by today’s threat actors. Let’s take a look at the state of firewalls, and their mos
Cyphort Social Hub

Tuesday, July 23, 2013

"Master key" Exploit Scanner

Google has released patch for the master key vulnerability to third party Android Mobiles, but google's Nexus devices still remain vulnerable against mater key exploits. Android user are advised not to download apps from 3rd party app markets. You can use the python version of the scanner (download link) to check for the exploits that exploit this vulnerability.

A simple web search will give details about this vulnerability.

Download Python version of the scanner;
MasterKey Exploit Scanner

I recommend you to develop Android version of this simple tool to use in your Android mobiles.

Wednesday, May 15, 2013

How to remove qvo6?

This blog post will help you to remove Qvo6.com adware from your web browsers Chrome, Firefox and Chrome.

Qvo6 adware gets installed in your machine with many freeware programs. This adware is a browser hijacker capable of changing your browser homepage to www.Qvo6.com.


The same website will also get open in every new tab you open in your browser.

1. Uninstall Freewares that install Qvo6 adware:

a. Open Control panel > Programs and Features


b. Then serach for programs eSave Security Control, Qvo6 toolbar, New Tabs Uninstall, Desk 365 (or) BrowserProtect and uninstall it.

2. Remove from program shortcuts:

a. Right click the shortcuts for Firefox / Chrome / Internet explorer, in the drop down menu select Properties. In target tab remove "http://www.qvo6.com/?utm_source=b&utm_medium=tti&.."


b. Click Apply to save the changes.

3. Remove from Windows Registry:

a. Click Start > Run and type REGEDIT

For Firefox:

b. Go to the Registry key

"HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command"

c. on the right pane you can find Default key. Modify the Data value to remove "http://www.qvo6.com/?utm_source=b&utm_medium=tti&.." from it.

For Chrome:

b. Go to the Registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Google Chrome\shell\open\command

c. on the right pane you can find Default key. Modify the Data value to remove "http://www.qvo6.com/?utm_source=b&utm_medium=tti&.." from it.

For Internet Explorer:

b. Go to the Registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command

c. on the right pane you can find Default key. Modify the Data value to remove "http://www.qvo6.com/?utm_source=b&utm_medium=tti&.." from it.

d. Go to the Registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN

e. On the right side pane edit all the key values to remove "http://www.qvo6.com/?utm_..."

Friday, June 15, 2012

PE Skeleton Spread Sheet

PE structure quick reference Sheet for virus analysts.
-f00l!sh