Forwarded from DARKNET BR
OSINT_Open_Source_Intelligence_Glossary.epub
185.4 KB
O Brasil não está preparado para o Open Source?!
🧬 @Phantasm_Lab
LinkAPI Founder startou um debate no linkedin que atraiu muitos comentários acídos..até o criador do PyJobs apareceu por la.. qual a sua opinião em relação ao tópico ?
https://www.linkedin.com/posts/thiagolimabr_o-brasil-não-está-preparado-para-o-open-source-activity-6635285389877747713-8a2k🧬 @Phantasm_Lab
Linkedin
Thiago Lima on LinkedIn: O Brasil não está preparado para o Open Source!
Quando fundei o LinkApi | 96 comments
Quando fundei o LinkApi | 96 comments
O Brasil não está preparado para o Open Source!
Quando fundei o LinkApi, meu sonho era que nossa plataforma fosse Open Source, entretanto, comecei a estudar... 96 comments on LinkedIn
Quando fundei o LinkApi, meu sonho era que nossa plataforma fosse Open Source, entretanto, comecei a estudar... 96 comments on LinkedIn
Forwarded from The Hacker News
Iranian hackers are exploiting unpatched 1-day enterprise VPN vulnerabilities to compromise network of organizations worldwide and implant backdoors for cyber espionage.
➡️ Pulse Secure Connect: CVE-2019-11510
➡️ Palo Alto Networks: CVE-2019-1579
➡️ Fortinet FortiOS: CVE-2018-13379
➡️ Citrix: CVE-2019-19781
Read: https://thehackernews.com/2020/02/iranian-hackers-vpn-vulnerabilities.html
➡️ Pulse Secure Connect: CVE-2019-11510
➡️ Palo Alto Networks: CVE-2019-1579
➡️ Fortinet FortiOS: CVE-2018-13379
➡️ Citrix: CVE-2019-19781
Read: https://thehackernews.com/2020/02/iranian-hackers-vpn-vulnerabilities.html
DevSecOps Podcast Series
https://podtail.com/pt-BR/podcast/owasp-24-7/
🧬 @Phantasm_Lab
The DevSecOps Days is a recorded series of discussions with thought leaders and practitioners who are working on integrating automated security into every phase of the software development pipeline.https://podtail.com/pt-BR/podcast/owasp-24-7/
🧬 @Phantasm_Lab
Podtail
DevSecOps Podcast Series – Podcast
The DevSecOps Days is a recorded series of discussions with thought leaders and practitioners who are working on integrating automated security into every phase of the software development pipeline. – Ouça o DevSecOps Podcast Series instantaneamente no seu…
hackthebox-writeups
https://github.com/Hackplayers/hackthebox-writeups
Writeups for HacktheBox machines (boot2root) and challenges written in Spanish or English.https://github.com/Hackplayers/hackthebox-writeups
GitHub
GitHub - Hackplayers/hackthebox-writeups: Writeups for HacktheBox 'boot2root' machines
Writeups for HacktheBox 'boot2root' machines. Contribute to Hackplayers/hackthebox-writeups development by creating an account on GitHub.
Gabriel Engel - Como um projeto JS open source se transformou em uma empresa de 60 milhões
https://www.youtube.com/watch?v=hXG5R15Uc-E
🧬 @Phantasm_Lab
Conheça a história de como um time de brazucas utilizou o poder do open source para transformar um side-project em uma Startup de US$17 milhões, recebendo investimento de um dos maiores Venture Capitalists americanos e mantendo um crescimento exponencial. Uma jornada que mostra o poder de uma visão ousada e da coragem de quebrar paradigmas para mudar o mundo dos chats.https://www.youtube.com/watch?v=hXG5R15Uc-E
🧬 @Phantasm_Lab
YouTube
Gabriel Engel - Como um projeto JS open source se transformou em uma empresa de 60 milhões
Conheça a história de como um time de brazucas utilizou o poder do open source para transformar um side-project em uma Startup de US$17 milhões, recebendo investimento de um dos maiores Venture Capitalists americanos e mantendo um crescimento exponencial.…
Google Bans 600 Android Apps from Play Store for Serving Disruptive Ads
https://thehackernews.com/2020/02/android-adware-apps-banned.html
🧬 @Phantasm_Lab
Google has banned nearly 600 Android apps from the Play Store for bombarding users with disruptive ads and violating its advertising guidelines.https://thehackernews.com/2020/02/android-adware-apps-banned.html
🧬 @Phantasm_Lab
US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline Facility
https://thehackernews.com/2020/02/critical-infrastructure-ransomware-attack.html
🧬 @Phantasm_Lab
The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) earlier today issued a warning to all industries operating critical infrastructures about a new ransomware threat that if left unaddressed could have severe consequences.https://thehackernews.com/2020/02/critical-infrastructure-ransomware-attack.html
🧬 @Phantasm_Lab
Forwarded from The Hacker News
⭐Google recommends Android developers to encrypt app data on the users' devices, especially when they use external storage that's prone to hijacking, man-in-the-disk, & other side-channel attacks.
Also, considering that there are not many reference frameworks available for the same, Google also offered an open-source crypto library—called JetSec—that lets developers easily read and write encrypted files by following best security practices.
Read details ➤ https://thehackernews.com/2020/02/android-app-data-encryption.html
Also, considering that there are not many reference frameworks available for the same, Google also offered an open-source crypto library—called JetSec—that lets developers easily read and write encrypted files by following best security practices.
Read details ➤ https://thehackernews.com/2020/02/android-app-data-encryption.html
“Shark Tank” TV star loses almost $400,000 in Business Email Compromise scam – HOTforSecurity
https://hotforsecurity.bitdefender.com/blog/shark-tank-tv-star-loses-almost-400000-in-business-email-compromise-scam-22386.html
https://hotforsecurity.bitdefender.com/blog/shark-tank-tv-star-loses-almost-400000-in-business-email-compromise-scam-22386.html
HOTforSecurity
“Shark Tank” TV star loses almost $400,000 in Business Email...
Barbara Corcoran, one of the business moguls who head up the judging team on US TV's "Shark Tank" investment show, has lost nearly $400,000 to an... #Attacker #businessemailcompromise #SharkTank
Forwarded from Guia Dev
@GuiaDev
🎉👨👩👧👧 JavaScript Visualized: Prototypal Inheritance
https://dev.to/lydiahallie/javanoscript-visualized-prototypal-inheritance-47co
🎉👨👩👧👧 JavaScript Visualized: Prototypal Inheritance
https://dev.to/lydiahallie/javanoscript-visualized-prototypal-inheritance-47co
Security Misconfiguration
https://www.youtube.com/watch?v=iSYD7vOlSJs
@Phantasm_Lab
In this module, we’ll be looking at Security Misconfiguration. We’ll explain what a Security Misconfiguration is, its causes and preventions and, some potential hazards.https://www.youtube.com/watch?v=iSYD7vOlSJs
@Phantasm_Lab
YouTube
Security Misconfiguration | Owasp Top 10 Explainer Video | Secure Code Warrior
In this Explainer video from Secure Code Warrior, we'll be looking at Security Misconfiguration, A6 in the OWASP Top 10. We’ll explain what a Security Misconfiguration attack is, its causes and preventions, and some potential hazards.
To learn more about…
To learn more about…
Startups, Ninjas e Marketplaces – Hipsters #10
https://hipsters.tech/startups-ninjas-e-marketplaces-hipsters-10/
@Phantasm_Lab
Um dos desafios para uma startup começar a se provar é a monetização. Como teremos receita? Em um marketplace tudo fica um pouco mais complicado: quais são os desafios de encontrar um modelo que funcione bem para as duas pontas, tanto para os compradores quanto para os vendedores? Nosso host Paulo Silveira bate um papo com o CEO e com o CTO do GetNinjas, uma startup de marketplace de serviços que provou o seu modelo depois de muita experimentação e testes. Conversamos sobre os desafios da startup, de como encontrar o modelo adequado e o que há de tecnologia por trás do sistema.https://hipsters.tech/startups-ninjas-e-marketplaces-hipsters-10/
@Phantasm_Lab
Hipsters Ponto Tech
Startups, Ninjas e Marketplaces - Hipsters #10 - Hipsters Ponto Tech
…
Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)
https://eforensicsmag.com/exfiltration-and-uploading-data-by-dns-traffic-aaaa-records-by-damon-mohammadbagher/
@Phatasm_Lab
In this chapter, I want to explain how to Send DATA to Attacker Server by DNS AAAA records and IPv6 Addresses, so this is one way for DATA Exfiltration.https://eforensicsmag.com/exfiltration-and-uploading-data-by-dns-traffic-aaaa-records-by-damon-mohammadbagher/
@Phatasm_Lab
eForensics
Exfiltration and Uploading DATA by DNS Traffic (AAAA Records) | By Damon Mohammadbagher - eForensics
Exfiltration and Uploading DATA by DNS Traffic (AAAA Records) Understanding this method In this chapter, I want to explain how …
Top Interview Tips for Cybersecurity Professionals 2020
https://gbhackers.com/top-interview-tips-for-cybersecurity-professionals-2020/
@Phantasm_Lab
When you interview for the profile of a cybersecurity professional the interviewer will get into the technical bits to establish your level of expertise once they finish asking you about your professional experience, educational details, and more such obligatory questions.Now, how technical they can get depends on the position of the job profile you are applying for as a cybersecurity professional. But in any way as a cybersecurity professional, you are expected to be well versed in your field of work.https://gbhackers.com/top-interview-tips-for-cybersecurity-professionals-2020/
@Phantasm_Lab
GBHackers On Security
Cybersecurity interview Tips for Securiity Professionals 2020
When you interview for the profile of a cybersecurity professional the interviewer will get into the technical bits to establish your level of expertise once they finish asking you about your professional experience, educational details, and more such obligatory…
Forwarded from The Hacker News
Researchers claim the CIA hackers were behind an 11-year-long hacking and cyber-espionage campaign against several critical Chinese industries (aviation, petroleum, and more) and government agencies.
Read more: https://thehackernews.com/2020/03/china-cia-hackers.html
Read more: https://thehackernews.com/2020/03/china-cia-hackers.html