Authentication Encounter: OIDC vs OAuth2
https://ift.tt/2Wz30e0
Submitted October 03, 2021 at 12:56PM by prescojan
via reddit https://ift.tt/3l2Migw
https://ift.tt/2Wz30e0
Submitted October 03, 2021 at 12:56PM by prescojan
via reddit https://ift.tt/3l2Migw
Frontegg
Authentication Encounter: OIDC vs OAuth2 | Frontegg
Not sure about the winner in the OIDC vs OAuth2 encounter? We’ve got you covered with this detailed authentication comparison.
Working with the sales team during my consulting days was eye opening. In this edition, I argue that there are many lessons AppSec teams can learn from how Sales teams operate.
https://ift.tt/3mnNKcM
Submitted October 03, 2021 at 05:05PM by jubbaonjeans
via reddit https://ift.tt/3oySUpj
https://ift.tt/3mnNKcM
Submitted October 03, 2021 at 05:05PM by jubbaonjeans
via reddit https://ift.tt/3oySUpj
Substack
Edition 10: Selling AppSec
In AppSec, most Security controls are implemented by folks outside the Security team. You cannot improve your AppSec posture, without "selling" the virtue of AppSec to your stakeholders.
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher [PDF]
https://ift.tt/3a8qyJL
Submitted October 03, 2021 at 07:34PM by Uberhipster
via reddit https://ift.tt/3mjEOVN
https://ift.tt/3a8qyJL
Submitted October 03, 2021 at 07:34PM by Uberhipster
via reddit https://ift.tt/3mjEOVN
Undectable backdooring of PE file using dual code caves & encoding
https://ift.tt/3a614Nn
Submitted October 04, 2021 at 02:46AM by InformationSecurity
via reddit https://ift.tt/2YeVy8X
https://ift.tt/3a614Nn
Submitted October 04, 2021 at 02:46AM by InformationSecurity
via reddit https://ift.tt/2YeVy8X
Haider Mahmood Infosec Blog
undetectable backdooring PE file
backdooring exe files, backdooring PE file, backdoor windows executable, fully undetectable backdoor, encoding shellcode, FUD,codecaves,
/r/netsec's Q4 2021 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 04, 2021 at 02:39AM by ranok
via reddit https://ift.tt/3FfhFfV
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 04, 2021 at 02:39AM by ranok
via reddit https://ift.tt/3FfhFfV
BazarLoader and the Conti Leaks
https://ift.tt/2ZVucVJ
Submitted October 04, 2021 at 07:07AM by TheDFIRReport
via reddit https://ift.tt/3l61eue
https://ift.tt/2ZVucVJ
Submitted October 04, 2021 at 07:07AM by TheDFIRReport
via reddit https://ift.tt/3l61eue
The DFIR Report
BazarLoader and the Conti Leaks
Intro In July, we observed an intrusion that started from a BazarLoader infection and lasted approximately three days. The threat actor’s main priority was to map the domain network, while lo…
OnionShare 2.3 >= 2.3.3 Vulnerabilities (CVE-2021-41868 and CVE-2021-41867)
https://ift.tt/3a1o53N
Submitted October 04, 2021 at 02:29PM by IHTeam
via reddit https://ift.tt/3uKnSf1
https://ift.tt/3a1o53N
Submitted October 04, 2021 at 02:29PM by IHTeam
via reddit https://ift.tt/3uKnSf1
Misconfigured Airflows Leak Credentials from Popular Services
https://ift.tt/3uCAwN0
Submitted October 04, 2021 at 08:43PM by Milafasents
via reddit https://ift.tt/3FdScn7
https://ift.tt/3uCAwN0
Submitted October 04, 2021 at 08:43PM by Milafasents
via reddit https://ift.tt/3FdScn7
Intezer
Misconfigured Airflows Leak Thousands of Credentials from Popular Services
Apache Airflow is the #1 starred open-source workflows application on GitHub.
Implicit Overflow Considered Harmful
https://ift.tt/3A7hPCp
Submitted October 04, 2021 at 08:41PM by pimterry
via reddit https://ift.tt/3a45qV0
https://ift.tt/3A7hPCp
Submitted October 04, 2021 at 08:41PM by pimterry
via reddit https://ift.tt/3a45qV0
Considerations on Codecrafting
Implicit Overflow Considered Harmful (and how to fix it)
A common problem in programming language design is the question of what the type of integral literals should be, and if they are untyped, what the rules for implicitly converting them to regular integer types should be. This is part of the more general problem…
Welcoming Dragonfly, a modern malware sandbox built on binary emulation tools
https://ift.tt/3a3HbGD
Submitted October 04, 2021 at 09:16PM by samaritan_o
via reddit https://ift.tt/3a20ss9
https://ift.tt/3a3HbGD
Submitted October 04, 2021 at 09:16PM by samaritan_o
via reddit https://ift.tt/3a20ss9
Certego
Dragonfly: your next generation malware sandbox
Certego has always been strongly involved in researching new ways to analyze malware. We have been working for some time on new projects aimed to...
List of public BGP hijacking incidents
https://ift.tt/3oyTYt8
Submitted October 04, 2021 at 10:16PM by dontbenebby
via reddit https://ift.tt/3AafVRl
https://ift.tt/3oyTYt8
Submitted October 04, 2021 at 10:16PM by dontbenebby
via reddit https://ift.tt/3AafVRl
Wikipedia
BGP hijacking
attack on Internet routing infrastructure
Now that whatsapp is down, it is a good time to get people to try signal out :)
https://ift.tt/2z1sLG4
Submitted October 04, 2021 at 11:53PM by abagnalejr
via reddit https://ift.tt/3otSwbu
https://ift.tt/2z1sLG4
Submitted October 04, 2021 at 11:53PM by abagnalejr
via reddit https://ift.tt/3otSwbu
Signal Messenger
Download Signal
Download Signal for Android, iOS, Linux, macOS, and Windows.
Atom Silo ransomware actors use Confluence exploit, DLL side-load for stealthy attack
https://ift.tt/3l7MIlI
Submitted October 05, 2021 at 01:49AM by ksr_malware
via reddit https://ift.tt/3DcrGIZ
https://ift.tt/3l7MIlI
Submitted October 05, 2021 at 01:49AM by ksr_malware
via reddit https://ift.tt/3DcrGIZ
Sophos News
Atom Silo ransomware actors use Confluence exploit, DLL side-load for stealthy attack
A new ransomware operator uses stealthy techniques, but borrows heavily from other players.
An Intro to Fuzzing (AKA Fuzz Testing)
https://ift.tt/3FfmWUT
Submitted October 05, 2021 at 01:42AM by breach_house
via reddit https://ift.tt/3l9GVMM
https://ift.tt/3FfmWUT
Submitted October 05, 2021 at 01:42AM by breach_house
via reddit https://ift.tt/3l9GVMM
Bishop Fox
Fuzz Testing for blackbox security analysis
Learn about fuzzing testing, including who should fuzz, what types of fuzzers exist, how to write a good harness to perform blackbox analysis on a given program.
Creating an IoT botnet of IPTVs to rickroll 10,000+ students
https://ift.tt/3l7XjNC
Submitted October 05, 2021 at 02:41AM by WhiteHoodHacker
via reddit https://ift.tt/3l9wn07
https://ift.tt/3l7XjNC
Submitted October 05, 2021 at 02:41AM by WhiteHoodHacker
via reddit https://ift.tt/3l9wn07
Protect Your GitHub Actions with Semgrep
https://ift.tt/2WLEXsA
Submitted October 05, 2021 at 06:26AM by iterablewords
via reddit https://ift.tt/3ivZuc6
https://ift.tt/2WLEXsA
Submitted October 05, 2021 at 06:26AM by iterablewords
via reddit https://ift.tt/3ivZuc6
r2c.dev
r2c blog — Protect Your GitHub Actions with Semgrep
Semgrep rules for GitHub Actions
Update: Facebook, Instagram And WhatsApp Go Down Hard In Possible Whistleblower DDoS Backlash
https://ift.tt/3acowbz
Submitted October 05, 2021 at 10:20AM by kayeT16
via reddit https://ift.tt/2WFqVbJ
https://ift.tt/3acowbz
Submitted October 05, 2021 at 10:20AM by kayeT16
via reddit https://ift.tt/2WFqVbJ
HotHardware
Update: Facebook, Instagram And WhatsApp Go Down Hard In Possible Whistleblower DDoS Backlash
It’s widely reported worldwide that Facebook, WhatsApp, and Instagram are down at the moment.
Practical strategies for pentesting and exploiting file read vulnerabilities.
https://ift.tt/3a71Aup
Submitted October 05, 2021 at 12:00PM by portmapper
via reddit https://ift.tt/3abZhWQ
https://ift.tt/3a71Aup
Submitted October 05, 2021 at 12:00PM by portmapper
via reddit https://ift.tt/3abZhWQ
Medium
Practical strategies for exploiting FILE READ vulnerabilities
Techniques for pentesting and exploiting file read conditions in web applications, also with a pinch of recommendations for…
TEQNIX - I made an online platform of pentesting tools and automation. Check it out and let me know
https://teqnix.io
Submitted October 05, 2021 at 12:10PM by maudits
via reddit https://ift.tt/3adRc3X
https://teqnix.io
Submitted October 05, 2021 at 12:10PM by maudits
via reddit https://ift.tt/3adRc3X
Swimming Upstream: Uncovering Broadcom SDK Vulnerabilities from Bug Reports.
https://ift.tt/3BbsehO
Submitted October 05, 2021 at 02:08PM by g_e_r_h_a_r_d
via reddit https://ift.tt/3iAT0sv
https://ift.tt/3BbsehO
Submitted October 05, 2021 at 02:08PM by g_e_r_h_a_r_d
via reddit https://ift.tt/3iAT0sv
IoT Inspector
Swimming Upstream: Uncovering Broadcom SDK vulnerabilities from bug reports - IoT Inspector
IoT Inspector identified security vulnerabilities affecting the UPnP implementation of Broadcom’s SDK that affect vendors such as Cisco or Linksys.
Abusing vCenter SAML Certificates: Logging in as Admin from Backups
https://ift.tt/3msyr2y
Submitted October 05, 2021 at 04:26PM by scopedsecurity
via reddit https://ift.tt/2ZZuE5m
https://ift.tt/3msyr2y
Submitted October 05, 2021 at 04:26PM by scopedsecurity
via reddit https://ift.tt/2ZZuE5m
GitHub
GitHub - horizon3ai/vcenter_saml_login: A tool to extract the IdP cert from vCenter backups and log in as Administrator
A tool to extract the IdP cert from vCenter backups and log in as Administrator - horizon3ai/vcenter_saml_login