Eric Romang

@eromang

The contents of my tweets are my own personal opinions and do not represent my employer's.

Photos and Videos by @eromang

  • Timeline
  • Gallery

Also you remember www.yahcoo .net ?

CVE-2013-1493 ImAlpha.class and others, sample in the wild

yes I have check and recheck the certificate is valid ! http://pastebin.com/FuRzKcXa http://pastebin.com/myu4SMs0

  • 552 days ago via site
  • 38

Oh NBC . com :)

And you can see this

I think under investigation but confirm that the 23/01 was still active

Yop I also found it on way back

Avec 7U11 j'ai le message d'erreur suivant

As "Protected view" is off by default, so default #Adobe Reader and Acrobat XI are vulnerable

Oh JSbug backend in Space Foundation drive by attack http://eromang.zataz.com/2013/01/06/forgotten-watering-hole-attacks-on-space-foundation-and-rsf-chinese/ also used with CVE-2013-0634 :)

Oups, should I updated my Flash or not ? Seem that I have the latest version on Mac OS X.

: This Crazy Map Has One Dot for Every Person in the United States http://t.co/eYiGyQTv” <- I'm here

CFR.org #0day Website comprised before 7 December #infosec

My next post will cover the targeted attacks against RSF-chinese.org and spacefoundation.org through Jsbug backend

cfr.org 0day drive-by attack was not only targeting chinese visitors

My next post will be regarding http://pastebin.com/rDwncbTq and the attached screenshot

Confirmed it is CVE-2011-1999

1 2 3 4 Next