Inside An Indian Scam Call Center!
https://www.youtube.com/watch?v=RMY7zAHd770
In this video i will show you guys the inside of a scam call center. We got access into their CCTV and you can see every single camera in the entire building. This story starts of with jim browning contacting me with this, and accesing the scammers webcam.We will demonstrate what call flooding does and see in person how the entire call centre scammers react when being call flooded!We had a look and pulled off some scambaits at this call centre to get the evidence we need! Big shoutout to jim browning!https://www.youtube.com/watch?v=RMY7zAHd770
YouTube
Inside An Indian Scam Call Center! (Spying On The Scammers)
Spying on the scammers!
In this video i will show you guys the inside of a scam call center. We got access into their CCTV and you can see every single camera in the entire building. This story starts of with jim browning contacting me with this, and accesing…
In this video i will show you guys the inside of a scam call center. We got access into their CCTV and you can see every single camera in the entire building. This story starts of with jim browning contacting me with this, and accesing…
Funcionário do TCE-AM executa noscript errado no SQL e apaga 16,5 mil processos
http://suporteninja.com/funcionario-do-tce-am-executa-noscript-errado-no-sql-e-apaga-165-mil-processos/
@Phatansm_Lab
Depois de ter 16,5 mil processos apagados do banco de dados PostgreSQL, o Tribunal de Contas do Estado do Amazonas (TCE-AM) anunciou que até a próxima semana todos os processos deverão ser recuperados. A garantia foi dada pelo conselheiro-presidente do TCE-AM, Ari Moutinho Júnior, que lembrou que os dados do TCE possuem backup.http://suporteninja.com/funcionario-do-tce-am-executa-noscript-errado-no-sql-e-apaga-165-mil-processos/
@Phatansm_Lab
Security Learns to Sprint: DevSecOps by TanyaJanca
https://www.youtube.com/watch?v=9P-DzQwb1iQ
@Phantasm_Lab
https://www.youtube.com/watch?v=9P-DzQwb1iQ
@Phantasm_Lab
YouTube
[2019-Keynote] Security Learns to Sprint: DevSecOps by TanyaJanca
This talk will argue that DevOps could be the best thing to happen to application security since OWASP, if developers and operations teams are enabled to make security a part of their everyday work. With a ratio of 100/10/1 for Development, Operations, and…
Fixing Mobile AppSec by Sven Schleier
https://youtu.be/Jm_i6I5B1HM
@Phantasm_Lab
There are numerous ways of developing mobile apps today, but how do you ensure that security is part of the development process?https://youtu.be/Jm_i6I5B1HM
@Phantasm_Lab
YouTube
[2019] Fixing Mobile AppSec by Sven Schleier
There are numerous ways of developing mobile apps today, but how do you ensure that security is part of the development process? What are the attacks I should be concerned about and what can I do to avoid being an easy target? The Mobile Security Testing…
HTTP Desync Attacks: Smashing Into The Cell Next Door
https://www.youtube.com/watch?v=upEMlJeU_Ik
@Phantasm_Lab
https://www.youtube.com/watch?v=upEMlJeU_Ik
@Phantasm_Lab
YouTube
HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
https://ams.globalappsec.org/
-
Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project
-
Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project
Startup security: Starting a security program at a startup - Evan Johnson
https://www.youtube.com/watch?v=6iNpqTZrwjE
@Phantasm_Lab
https://www.youtube.com/watch?v=6iNpqTZrwjE
@Phantasm_Lab
YouTube
AppSecCali 2019 - Startup security: Starting a security program at a startup - Evan Johnson
There's no blueprint for how to be successful at a small startup. Startups are quirky, ambiguous, and full of challenges and broken processes. Startups also have a high risk tolerance and rarely introduce security from the beginning. This talk will discuss…
Forwarded from Programmer Humor
Forwarded from @Phantasm_Lab
Awesome GitHub Repos
1. Book of Secret Knowledge = https://lnkd.in/fWKCdi4
2. Awesome Hacking = https://lnkd.in/f7VPTEX
3. Awesome Bug Bounty = https://lnkd.in/fPrQiVD
4. Awesome Penetration Testing = https://lnkd.in/fAUZgu5
5. Awesome Web Hacking = https://lnkd.in/f5n2hSd
6. Awesome Hacking Resources = https://lnkd.in/fcJ6wFH
7. Awesome Pentest = https://lnkd.in/fNNSFeN
8. Awesome Red Teaming = https://lnkd.in/fGpievF
9. Awesome Web Security = https://lnkd.in/ffG73u2
10. Penetration Test Guide based on OWASP = https://lnkd.in/ffyBwzG
11. Pentest Compilation = https://lnkd.in/f5JwJTD
12. Infosec Reference = https://lnkd.in/fY6wNmX
🧪 @Phantasm_Lab
📬 @tani0m
1. Book of Secret Knowledge = https://lnkd.in/fWKCdi4
2. Awesome Hacking = https://lnkd.in/f7VPTEX
3. Awesome Bug Bounty = https://lnkd.in/fPrQiVD
4. Awesome Penetration Testing = https://lnkd.in/fAUZgu5
5. Awesome Web Hacking = https://lnkd.in/f5n2hSd
6. Awesome Hacking Resources = https://lnkd.in/fcJ6wFH
7. Awesome Pentest = https://lnkd.in/fNNSFeN
8. Awesome Red Teaming = https://lnkd.in/fGpievF
9. Awesome Web Security = https://lnkd.in/ffG73u2
10. Penetration Test Guide based on OWASP = https://lnkd.in/ffyBwzG
11. Pentest Compilation = https://lnkd.in/f5JwJTD
12. Infosec Reference = https://lnkd.in/fY6wNmX
🧪 @Phantasm_Lab
📬 @tani0m
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
Forwarded from DARKNET BR
This media is not supported in your browser
VIEW IN TELEGRAM
🦠 #COVID19 | #China | #IA
Polícia chinesa está usando capacetes inteligentes equipados com inteligência artificial para detectar coronavirus na china por meio altas temperatura.
O capacete, chamado Smart Helmet N901 contém câmera infra-vermelha que alarma se houver alguém com febre alta em um raio de cinco metros.
Forwarded from DARKNET BR
This media is not supported in your browser
VIEW IN TELEGRAM
🦠 #COVID-19 | #China | #Holographic
Elevadores na China usam tecnologia holográfica para impedir que o toque do dedo pegue o vírus
Forwarded from DARKNET BR
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from DARKNET BR
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from DARKNET BR
🚫 #Monitoramento | #Privacidade | #Vigilância
https://www.uol.com.br/tilt/noticias/redacao/2020/04/02/para-combater-a-covid-19-o-governo-federal-vai-monitorar-o-seu-celular.htm
O governo federal vai usar os dados de geolocalização do seu celular para enfrentar o coronavírus por meio de políticas públicas de saúde. As operadoras de telefonia Algar, Claro, Oi, Tim e Vivo fornecerão os dados de localização de 222,2 milhões de linhas móveis para o Ministério da Ciência, Inovação, Tecnologia e Comunicação (MCTIC). A medida foi anunciada na última sexta-feira (27), em vídeo com o ministro Marcos Pontes, no Twitter do MCTIC, que depois o apagou. Somente ontem (2), as operadoras confirmaram que colaborariam com o governo e como isso seria feito. Por enquanto, ainda não há uma data para iniciar o monitoramento.
https://www.uol.com.br/tilt/noticias/redacao/2020/04/02/para-combater-a-covid-19-o-governo-federal-vai-monitorar-o-seu-celular.htm
www.uol.com.br
Governo vai monitorar celular para controlar aglomeração na pandemia
O governo federal vai usar os dados de geolocalização do seu celular para enfrentar o coro...