Forwarded from TechToday News
#WikiLeaks #Security #report
CIA created code to impersonate Kaspersky Lab: WikiLeaks
The CIA created code that could be used to impersonate exfiltration attempts from computers infected with its malware implants as being staged by others, according to WikiLeaks. Three examples of impersonating Kaspersky Lab were released by the whistle-blower website on Thursday.
Eugene Kaspersky :
We've investigated the Vault 8 report and confirm the certificates in our name are fake. Our customers, private keys and services are safe and unaffected
https://www.itwire.com/government-tech-policy/80740-cia-created-code-to-impersonate-kaspersky-lab-wikileaks.html
https://twitter.com/e_kaspersky/status/928729434982625282
CIA created code to impersonate Kaspersky Lab: WikiLeaks
The CIA created code that could be used to impersonate exfiltration attempts from computers infected with its malware implants as being staged by others, according to WikiLeaks. Three examples of impersonating Kaspersky Lab were released by the whistle-blower website on Thursday.
Eugene Kaspersky :
We've investigated the Vault 8 report and confirm the certificates in our name are fake. Our customers, private keys and services are safe and unaffected
https://www.itwire.com/government-tech-policy/80740-cia-created-code-to-impersonate-kaspersky-lab-wikileaks.html
https://twitter.com/e_kaspersky/status/928729434982625282
Itwire
CIA created code to impersonate Kaspersky Lab: WikiLeaks
The CIA created code that could be used to impersonate exfiltration attempts as being staged by others, according to WikiLeaks. Three examples of impersonating Kaspersky Lab were released by the whistle-blower website on Thursday.
Forwarded from Deleted Account
5ª SEMANA DA SEGURANÇA DA INFORMAÇÃO!!!
SEGUE A PROGRAMAÇÃO:
20/11 - Augusto Tonnel (Tema: Cyber Threat Intelligence) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=iaIjW8bJmRI
SITE - https://sinergiasolucoes.com/eventos/cyber-threat-intelligence/
21/11 - Alisson Moretto (Tema: “Bypass em Soluções de Segurança utilizando o pensamento fora da caixa”) - 20:00h
YOUTUBE - https://www.youtube.com/watch?v=olqB3UjeYzg
SITE - https://sinergiasolucoes.com/eventos/bypass-em-solucoes-de-seguranca-utilizando-o-pensamento-fora-da-caixa/
21/11 - Yuri Diógenes - (Tema: “Melhoramento continuo na sua Profissão”) - 21:30h
YOUTUBE - https://www.youtube.com/watch?v=Dan22z4AqP8
SITe - https://sinergiasolucoes.com/eventos/melhoramento-continuo-na-sua-profissao/
22/11 - Thauan Santos (Tema: “WordPress não é inseguro, você que não sabe usar”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=S6r3in8VpGw
SITE - https://sinergiasolucoes.com/eventos/wordpress-nao-e-inseguro-voce-que-nao-sabe-usar/
23/11 - Marcos Cavinato (Tema: “Segurança na Cloud – Uma Forma Rápida de Colocar Segurança Everywhere”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=vvnnqZ1t8mM
SITE - https://sinergiasolucoes.com/eventos/seguranca-na-cloud-uma-forma-rapida-de-colocar-seguranca-everywhere/
24/11 - Filipe Villar (Tema: GRC? ISO? Análise de Risco?”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=BSrGISS0Ri4
SITE - https://sinergiasolucoes.com/eventos/grc-iso-analise-de-risco/
SEGUE A PROGRAMAÇÃO:
20/11 - Augusto Tonnel (Tema: Cyber Threat Intelligence) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=iaIjW8bJmRI
SITE - https://sinergiasolucoes.com/eventos/cyber-threat-intelligence/
21/11 - Alisson Moretto (Tema: “Bypass em Soluções de Segurança utilizando o pensamento fora da caixa”) - 20:00h
YOUTUBE - https://www.youtube.com/watch?v=olqB3UjeYzg
SITE - https://sinergiasolucoes.com/eventos/bypass-em-solucoes-de-seguranca-utilizando-o-pensamento-fora-da-caixa/
21/11 - Yuri Diógenes - (Tema: “Melhoramento continuo na sua Profissão”) - 21:30h
YOUTUBE - https://www.youtube.com/watch?v=Dan22z4AqP8
SITe - https://sinergiasolucoes.com/eventos/melhoramento-continuo-na-sua-profissao/
22/11 - Thauan Santos (Tema: “WordPress não é inseguro, você que não sabe usar”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=S6r3in8VpGw
SITE - https://sinergiasolucoes.com/eventos/wordpress-nao-e-inseguro-voce-que-nao-sabe-usar/
23/11 - Marcos Cavinato (Tema: “Segurança na Cloud – Uma Forma Rápida de Colocar Segurança Everywhere”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=vvnnqZ1t8mM
SITE - https://sinergiasolucoes.com/eventos/seguranca-na-cloud-uma-forma-rapida-de-colocar-seguranca-everywhere/
24/11 - Filipe Villar (Tema: GRC? ISO? Análise de Risco?”) - 20:30h
YOUTUBE - https://www.youtube.com/watch?v=BSrGISS0Ri4
SITE - https://sinergiasolucoes.com/eventos/grc-iso-analise-de-risco/
YouTube
#01 - Cyber Threat Intelligence
Convidado: Augusto Tonnel
Participantes: Bruno Bustamante e Jonhnathan Cesar
Sinergia!
Essa é a palavra que transmite o verdadeiro valor de nossa Equipe. Nossa atuação transcende os formatos já conhecidos no mercado com agilidade e assertividade que envolvem…
Participantes: Bruno Bustamante e Jonhnathan Cesar
Sinergia!
Essa é a palavra que transmite o verdadeiro valor de nossa Equipe. Nossa atuação transcende os formatos já conhecidos no mercado com agilidade e assertividade que envolvem…
#Evento sobre Criptografia
CryptoFesta Taubaté - Primeira Edição
Data: 18 de novembro (próximo sábado)
Página no Facebook: https://www.facebook.com/events/128222457882150/permalink/131716067532789/
Site: https://encripta.org/cryptofesta/
CryptoFesta Taubaté - Primeira Edição
Data: 18 de novembro (próximo sábado)
Página no Facebook: https://www.facebook.com/events/128222457882150/permalink/131716067532789/
Site: https://encripta.org/cryptofesta/
https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/
🕴🏽 @Phantasm_Lab
🕴🏽 @Phantasm_Lab
Hakin9 - IT Security Magazine
Web Application Penetration Testing: Local File Inclusion (LFI) Testing
The definitive guide for LFI vulnerability security testing on penetration testing engagements.
Forwarded from Security papers
#embedi #research #17yo #vulnerabilty #office
Skeleton in the closet. MS Office vulnerability you didn’t know about
https://embedi.com/files/white-papers/skeleton-in-the-closet.pdf
@cyberwhitepapers
Skeleton in the closet. MS Office vulnerability you didn’t know about
https://embedi.com/files/white-papers/skeleton-in-the-closet.pdf
@cyberwhitepapers
https://www.4linux.com.br/noticia/curso-prova-preparatoria-gratuita-certificacao-lpi-linux-essentials
🕴🏽 @Phantasm_Lab
🕴🏽 @viniviana
🕴🏽 @Phantasm_Lab
🕴🏽 @viniviana
www.4linux.com.br
Curso e Prova para certificação LPI Linux Essentials.
4Linux oferece Curso e Prova preparatória GRATUITA para a certificação LPI Linux Essentials. Facilitando a entrada dos novos profissionais no mundo linux.
http://helio.loureiro.eng.br/index.php/blog/340-falando-sobre-a-carreira-em-desenvolvimento-de-software-livre
🕴🏽 @Phantasm_Lab
🕴🏽 @SarahhMG
🕴🏽 @Phantasm_Lab
🕴🏽 @SarahhMG
helio.loureiro.eng.br
Falando sobre a carreira em desenvolvimento de software livre
Helio Loureiro - site pessoal, blog, informações, noscripts, unix, linux, receitas técnicas, python, cyberativismo e outros
*FBI* has high confidence that *HIDDEN COBRA*
actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation.
DHS and FBI are distributing these *IP addresses* to enable network defense and reduce exposure to any *North Korean government* malicious cyber activity.
This alert includes *IOCs related to HIDDEN COBRA, IP addresses* linked to systems infected with
*FALLCHILL malware*, malware denoscriptions, and associated signatures.
This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the *FALLCHILL malware*, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.
https://www.us-cert.gov/ncas/alerts/TA17-318A
🕴🏽 @Phantasm_Lab
actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation.
DHS and FBI are distributing these *IP addresses* to enable network defense and reduce exposure to any *North Korean government* malicious cyber activity.
This alert includes *IOCs related to HIDDEN COBRA, IP addresses* linked to systems infected with
*FALLCHILL malware*, malware denoscriptions, and associated signatures.
This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the *FALLCHILL malware*, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.
https://www.us-cert.gov/ncas/alerts/TA17-318A
🕴🏽 @Phantasm_Lab
Forwarded from Full Python Alchemist
Bot - COMO CRIAR UM ASSISTENTE VIRTUAL SIMPLES EM PYTHON COM RECONHECIMENTO DE VOZ, CHATBOT E SÍNTESI DE V
https://www.youtube.com/watch?v=IAEqL16g2Eg
🐍 @FullPythonAlchemist
🕴🏽 @Phantasm_Lab
https://www.youtube.com/watch?v=IAEqL16g2Eg
🐍 @FullPythonAlchemist
🕴🏽 @Phantasm_Lab
YouTube
COMO CRIAR UM ASSISTENTE VIRTUAL SIMPLES EM PYTHON COM RECONHECIMENTO DE VOZ, CHATBOT E SÍNTESI DE V
****** Inscreva-se: https://goo.gl/G4Ppnf ******
Descrição: Neste vídeo você vai aprender a como criar um simples assistente que é capaz de conversar em python, ele têm algumas funções bem legais tais como reconhecimento de voz, síntese de voz e um chatbot…
Descrição: Neste vídeo você vai aprender a como criar um simples assistente que é capaz de conversar em python, ele têm algumas funções bem legais tais como reconhecimento de voz, síntese de voz e um chatbot…
Forwarded from Full Python Alchemist
Sistema para uma Locadora de Carros - Python
https://www.youtube.com/watch?v=SHZ-ouQTedk
🐍 @FullPythonAlchemist
🕴🏽 @Phantasm_Lab
https://www.youtube.com/watch?v=SHZ-ouQTedk
🐍 @FullPythonAlchemist
🕴🏽 @Phantasm_Lab
YouTube
Sistema para uma Locadora de Carros - Python
Projeto realizado para a disciplina de Paradigmas de Linguagens de Programação, do Centro Universitário de Lins - Unilins.
Documentação do Projeto: https://drive.google.com/file/d/0B5zTF_GyV_2INWRWOUp3NFdLTzg/view?usp=sharing
Códigos Fonte:
https://dr…
Documentação do Projeto: https://drive.google.com/file/d/0B5zTF_GyV_2INWRWOUp3NFdLTzg/view?usp=sharing
Códigos Fonte:
https://dr…
Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
https://www.youtube.com/watch?v=WPoQfKQlOjg
🕴🏽 @Phantasm_Lab
https://www.youtube.com/watch?v=WPoQfKQlOjg
🕴🏽 @Phantasm_Lab
YouTube
The Perfect Code - Computerphile
Summing up why Hamming's error correcting codes are regarded as 'Perfect' - Professor Brailsford explains.
EXTRA BITS: https://youtu.be/i4zC67Yf5Iw
For more background on this: https://youtu.be/1_X-7BgHbE0
http://www.facebook.com/computerphile
https…
EXTRA BITS: https://youtu.be/i4zC67Yf5Iw
For more background on this: https://youtu.be/1_X-7BgHbE0
http://www.facebook.com/computerphile
https…