XSLT Security and Server Side Request Forgery
Nowadays, a growing list of XSLT processors exist with the purpose of transforming XML documents to other formats such as PDF, HTML or SVG. To this end such processors typically offer a powerful set of...
View ArticleWie stiehlt man KMU-Geheimnisse?
Ein Hintegrundartikel zur SRF Einstein Sendung vom Donnerstag, 3. September 2015 um 21:00 Uhr zum Thema “Cybercrime, wie sicher ist das Know-how der Schweiz”. (Trailer online) In diesem Artikel zeigen...
View ArticleHidden Inbox Rules in Microsoft Exchange
Contents Introduction Attack Overview Step-by-Step Detection Email Clients Administration Tools Exchange Compliance Features MAPI Editor Eradication Microsoft Security Response Center Swiss Cyber...
View ArticleInvestigating Data Leakage via External Storage Devices
Contents Introduction Background Story External Device Access Auditing with Windows Security Event Logs Audit Plug and Play Activity Audit Removable Storage Activity External Device Access Auditing...
View ArticleChallenging Your Forensic Readiness with an Application-Level Ransomware Attack
Contents Introduction Attack Scenario Outlook MAPI COM OutlookCOM Init Function OutlookCOM Traverse Function OutlookCOM Example OutlookCOM Ransomware Conclusion References Introduction Most ransomware...
View Article
More Pages to Explore .....