Vivek Ramachandran discuss KRACK
https://www.youtube.com/watch?v=QeDn7bgIpIU
Submitted October 17, 2017 at 01:33PM by giomke
via reddit http://ift.tt/2ghGwFQ
https://www.youtube.com/watch?v=QeDn7bgIpIU
Submitted October 17, 2017 at 01:33PM by giomke
via reddit http://ift.tt/2ghGwFQ
YouTube
WPA2 Encryption Basics | Part 1 | WPA2 Key Installation KRACK Attacks
Full details of the vulnerability: http://blog.mojonetworks.com/wpa2-vulnerability
Pentester Academy is the world’s leading online cyber security education platform. We offer:
💻2000+ training lab exercises accessible via your browser: https://bit.ly/2JJoyh9…
Pentester Academy is the world’s leading online cyber security education platform. We offer:
💻2000+ training lab exercises accessible via your browser: https://bit.ly/2JJoyh9…
github repo 4 krack info
http://ift.tt/2xJbdKg
Submitted October 17, 2017 at 01:58PM by blackout-314
via reddit http://ift.tt/2zuxIoo
http://ift.tt/2xJbdKg
Submitted October 17, 2017 at 01:58PM by blackout-314
via reddit http://ift.tt/2zuxIoo
GitHub
kristate/krackinfo
krackinfo - Information Regarding KRACK
BlackOasis APT leverages new Flash zero-day exploit to deploy FinSpy
http://ift.tt/2ztrGUN
Submitted October 17, 2017 at 02:51PM by MicheeLengronne
via reddit http://ift.tt/2yq7uDb
http://ift.tt/2ztrGUN
Submitted October 17, 2017 at 02:51PM by MicheeLengronne
via reddit http://ift.tt/2yq7uDb
Security Affairs
BlackOasis APT leverages new Flash zero-day exploit to deploy FinSpy
Security researchers from Kaspersky Labs spotted the BlackOasis APT group exploiting a new zero-day RCE vulnerability in Adobe Flash.
Security In 5: Episode 91 - OWASP Top 10 - A1 Injection
http://ift.tt/2ihpRGv
Submitted October 17, 2017 at 06:32PM by BinaryBlog
via reddit http://ift.tt/2gNaqCy
http://ift.tt/2ihpRGv
Submitted October 17, 2017 at 06:32PM by BinaryBlog
via reddit http://ift.tt/2gNaqCy
Libsyn
Security In Five Podcast: Episode 91 - OWASP Top 10 - A1 Injection
The first in a series of ten episodes going over each of the OWASP Top 10 items. A1 deals with Injection. This episode goes over the very high level denoscription on what it is, how it's exploited and the damage that can be done. Reference Links: A1 Injection…
Bad rolling code in keyfob for many Subaru cars
http://ift.tt/2y8tFA0
Submitted October 17, 2017 at 06:48PM by FireFart
via reddit http://ift.tt/2zuoJ6p
http://ift.tt/2y8tFA0
Submitted October 17, 2017 at 06:48PM by FireFart
via reddit http://ift.tt/2zuoJ6p
seclists.org
Full Disclosure: Bad rolling code in keyfob for many Subaru cars
Read on the Web: What You Should Know About the ‘KRACK’ WiFi Security Weakness
http://ift.tt/2yuyLq0
Submitted October 17, 2017 at 07:02PM by MicheeLengronne
via reddit http://ift.tt/2hLlYWw
http://ift.tt/2yuyLq0
Submitted October 17, 2017 at 07:02PM by MicheeLengronne
via reddit http://ift.tt/2hLlYWw
Limawi
Read on the Web: What You Should Know About the ‘KRACK’ WiFi Security Weakness
Read on the Web: Researchers this week published information about a newfound, serious weakness in WPA2 — the security standard that protects all modern Wi-Fi networks. What follows is...
Developing Key Risk Indicators + Examples
http://ift.tt/2xKYWFd
Submitted October 17, 2017 at 07:23PM by Uminekoshi
via reddit http://ift.tt/2yuvwP0
http://ift.tt/2xKYWFd
Submitted October 17, 2017 at 07:23PM by Uminekoshi
via reddit http://ift.tt/2yuvwP0
Nehemiah Security
Key Risk Indicators, Explained: Part Two - Nehemiah Security
If you have not read Part One of our two-part blog series on Key Risk Indicators, we advise you to do so before reading on. There you will gain an understanding of what KRIs are, why they are important for your business, and what makes a good KRI. Now let’s…
Microsoft responded quietly after detecting secret database hack in 2013
http://ift.tt/2ytwECs
Submitted October 17, 2017 at 08:05PM by QuirkySpiceBush
via reddit http://ift.tt/2gi2R6b
http://ift.tt/2ytwECs
Submitted October 17, 2017 at 08:05PM by QuirkySpiceBush
via reddit http://ift.tt/2gi2R6b
U.S.
Microsoft responded quietly after detecting secret database hack in 2013
Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.
Untangling Exotic Architectures with Binary Ninja
http://ift.tt/2x3vVVt
Submitted October 17, 2017 at 08:38PM by gaasedelen
via reddit http://ift.tt/2yQ36Ax
http://ift.tt/2x3vVVt
Submitted October 17, 2017 at 08:38PM by gaasedelen
via reddit http://ift.tt/2yQ36Ax
Ret2 Systems Blog
Untangling Exotic Architectures with Binary Ninja
October 13th marked the conclusion of FireEye’s fourth annual Flare-On Challenge. Every year the Flare-On challenge attracts thousands of hackers, security r...
ZDI researcher uses Foxit Reader to demonstrate how fuzzing pieces of an application separately saves time and helps analysis.
http://ift.tt/2gqyVIL
Submitted October 17, 2017 at 08:21PM by RedmondSecGnome
via reddit http://ift.tt/2hMl105
http://ift.tt/2gqyVIL
Submitted October 17, 2017 at 08:21PM by RedmondSecGnome
via reddit http://ift.tt/2hMl105
Zero Day Initiative
Wrapping the Converter within Foxit Reader
PDF readers are an essential part of our daily workflow nowadays. Many of
these readers support more features than just navigating a PDF. For
example, a lot of the PDF readers support image conversion, including Adobe
Acrobat Pro (DC) and Foxit Reader…
these readers support more features than just navigating a PDF. For
example, a lot of the PDF readers support image conversion, including Adobe
Acrobat Pro (DC) and Foxit Reader…
Requesting feedback on Pulsedive community threat intel platform
https://pulsedive.com
Submitted October 17, 2017 at 09:00PM by netbroom
via reddit http://ift.tt/2kTHvB7
https://pulsedive.com
Submitted October 17, 2017 at 09:00PM by netbroom
via reddit http://ift.tt/2kTHvB7
Pulsedive
Threat Intelligence - Pulsedive
Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own.
I ran a phishing test against our tech-savvy company. The results show that timing and content really matter and your users may not be as able to spot a phishing attack as you think!
http://ift.tt/2wJyvQE
Submitted October 17, 2017 at 08:59PM by DougEubanks
via reddit http://ift.tt/2zhdwoS
http://ift.tt/2wJyvQE
Submitted October 17, 2017 at 08:59PM by DougEubanks
via reddit http://ift.tt/2zhdwoS
Atlantic BT
Phishing Your Coworkers to Save Your Company | Atlantic BT
90% of data breaches involve phishing or other social-based attacks. It’s easy to think we wouldn’t be fooled by an email phishing attack. Or that our friends and coworkers know how to identify a suspicious email or not. But like a lot of our work at ABT…
Introducing Miscreant: a multi-language misuse resistant encryption library
http://ift.tt/2ywOB3C
Submitted October 17, 2017 at 09:39PM by bascule
via reddit http://ift.tt/2yu20Hw
http://ift.tt/2ywOB3C
Submitted October 17, 2017 at 09:39PM by bascule
via reddit http://ift.tt/2yu20Hw
reddit
Introducing Miscreant: a multi-language misuse... • r/netsec
1 points and 0 comments so far on reddit
HackWest 2018 CFP is Open
http://ift.tt/2gLb6bp
Submitted October 17, 2017 at 09:31PM by Nemus0
via reddit http://ift.tt/2hOg6eS
http://ift.tt/2gLb6bp
Submitted October 17, 2017 at 09:31PM by Nemus0
via reddit http://ift.tt/2hOg6eS
Microsoft responded quietly after detecting secret database hack in 2013
http://ift.tt/2zu5JVV
Submitted October 17, 2017 at 09:29PM by ourlifeintoronto
via reddit http://ift.tt/2igaQVj
http://ift.tt/2zu5JVV
Submitted October 17, 2017 at 09:29PM by ourlifeintoronto
via reddit http://ift.tt/2igaQVj
U.S.
Microsoft responded quietly after detecting secret database hack in 2013
Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
http://ift.tt/2grdHuj
Submitted October 17, 2017 at 11:00PM by teksquisite
via reddit http://ift.tt/2x1YToR
http://ift.tt/2grdHuj
Submitted October 17, 2017 at 11:00PM by teksquisite
via reddit http://ift.tt/2x1YToR
Lastline
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
Breach Detection Systems (BDS) trap attacks that display sufficient evidence of a possible breach, but are at risk of false positives when the sensitivity level is set too low. Hunting attacks with anomaly detection systems
Wiping Out CSRF
http://ift.tt/2xNPhlX
Submitted October 17, 2017 at 10:58PM by jrozner
via reddit http://ift.tt/2zvOTpC
http://ift.tt/2xNPhlX
Submitted October 17, 2017 at 10:58PM by jrozner
via reddit http://ift.tt/2zvOTpC
Medium
Wiping Out CSRF
It’s 2017 and there shouldn’t be much more to say about Cross-Site Request Forgery (CSRF) that hasn’t already been said. It’s a…
Executives are underinvesting in cybersecurity – even though they are the most vulnerable...
http://ift.tt/2gMxcdo
Submitted October 17, 2017 at 11:40PM by robthesecurityguy
via reddit http://ift.tt/2iijuTc
http://ift.tt/2gMxcdo
Submitted October 17, 2017 at 11:40PM by robthesecurityguy
via reddit http://ift.tt/2iijuTc
Proactive Cyber Defense Leader Cybersecurity SaaS
Why are executives underinvesting in cybersecurity, even when they are the most vulnerable? - Proactive Cyber Defense Leader Cybersecurity…
cybersecurity investing
TPM can be exploited by breaching weak RSA keys used by the hardware. HP, Lenovo, Fujitsu affected.
http://ift.tt/2ykc0mO
Submitted October 17, 2017 at 11:32PM by Derbel__McDillet
via reddit http://ift.tt/2gMxf94
http://ift.tt/2ykc0mO
Submitted October 17, 2017 at 11:32PM by Derbel__McDillet
via reddit http://ift.tt/2gMxf94
Note to the CISO: Part 1 - The Evolving Application Security Landscape
http://ift.tt/2yw9ZWB
Submitted October 18, 2017 at 01:30AM by Mi3Security
via reddit http://ift.tt/2gpbY8G
http://ift.tt/2yw9ZWB
Submitted October 18, 2017 at 01:30AM by Mi3Security
via reddit http://ift.tt/2gpbY8G
Mi3 Security
Note to the CISO: Part 1 - The Evolving Application Security Landscape
In a world where your smartphone is becoming the core authentication
device for every Internet service, we need to understand how app
development practices are impacting security and privacy.
device for every Internet service, we need to understand how app
development practices are impacting security and privacy.
HackerOne CEO and Hackers on Bug Bounty Programs
http://ift.tt/2zwogRa
Submitted October 18, 2017 at 05:25AM by jonobacon
via reddit http://ift.tt/2yqracK
http://ift.tt/2zwogRa
Submitted October 18, 2017 at 05:25AM by jonobacon
via reddit http://ift.tt/2yqracK
Forbes
A Security CEO and Two Hackers on Building a Safer Internet, Powered by a Community of Hackers
Notable Security CEO Mårten Mickos and two prominent hackers share how a global community of hackers is helping to create a safer Internet and governments, all while changing the notion of what a "hacker" is.