Install Kali Linux [2017.2] On VMware Workstation
http://ift.tt/2z08iyU
Submitted October 31, 2017 at 05:19PM by kholio11
via reddit http://ift.tt/2yhxpQS
http://ift.tt/2z08iyU
Submitted October 31, 2017 at 05:19PM by kholio11
via reddit http://ift.tt/2yhxpQS
A Study of RATs - A comprehensive timeline covering 29 years and 152 different remote access Trojans
http://ift.tt/2zNz2lt
Submitted October 31, 2017 at 05:40PM by speckz
via reddit http://ift.tt/2zlIBvN
http://ift.tt/2zNz2lt
Submitted October 31, 2017 at 05:40PM by speckz
via reddit http://ift.tt/2zlIBvN
Veronica Valeros
A Study of RATs
In early 2017 I started a personal research on Remote Access Trojans (RATs). The goal of the research is to discover possible trends, similarities and other hidden aspects among RATs observed during the last 30 years.
Adversary/Social Engineering Tactics To Watch Out For
http://ift.tt/2z0j1Mb
Submitted October 31, 2017 at 05:37PM by Uminekoshi
via reddit http://ift.tt/2iMAKAj
http://ift.tt/2z0j1Mb
Submitted October 31, 2017 at 05:37PM by Uminekoshi
via reddit http://ift.tt/2iMAKAj
Nehemiah Security
Wake up Cyber World: Adversary Tactics to Watch Out For - Nehemiah Security
What does an adversary know about your company before they initiate an attack? Better yet, WHO have they contacted within your company before they initiated an attack? The answer may surprise you. The reconnaissance performed by an adversary has always been…
Security In 5: Episode 101 - Email Sucks, Stop Using It, Communicate More Effectively
http://ift.tt/2A2Xhx1
Submitted October 31, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2xElhVB
http://ift.tt/2A2Xhx1
Submitted October 31, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2xElhVB
Libsyn
Security In Five Podcast: Episode 101 - Email Sucks, Stop Using It, Communicate More Effectively
Email needs to go, it's a security nightmare, it's a pain to manage and it has become an inefficient method of communication. Look at your inbox, how much time do you spend 'cleaning it out', messages skipped over or skimmed, and time going back and forth…
Phish in a Barrel: Hunting and Analyzing Phishing Kits at Scale
http://ift.tt/2xFcPWa
Submitted October 31, 2017 at 07:12PM by jwcrux
via reddit http://ift.tt/2lyoQv1
http://ift.tt/2xFcPWa
Submitted October 31, 2017 at 07:12PM by jwcrux
via reddit http://ift.tt/2lyoQv1
Note to the CISO: Part 3 – The Future of Application Security
http://ift.tt/2zlBinU
Submitted October 31, 2017 at 07:12PM by Mi3Security
via reddit http://ift.tt/2iOvHPS
http://ift.tt/2zlBinU
Submitted October 31, 2017 at 07:12PM by Mi3Security
via reddit http://ift.tt/2iOvHPS
Mi3 Security
Note to the CISO: Part 3 – The Future of Application Security
In Part 3 of our series on how the application security landscape is evolving, we look further at Contextual Application Security Testing and the future of AppSec.
State-sponsored cyber attacks against Canada successful once a week
http://ift.tt/2hqqYQX
Submitted October 31, 2017 at 08:49PM by nzwasp
via reddit http://ift.tt/2zT9Ji8
http://ift.tt/2hqqYQX
Submitted October 31, 2017 at 08:49PM by nzwasp
via reddit http://ift.tt/2zT9Ji8
Security Breach Online
State-sponsored cyber attacks against Canada successful once a week - Security Breach Online
The Canadian government’s PC systems have been hit by state-supported cyber attacks around 50 times each week — and no less than one of them generally succeeded. That affirmation from the Communications Security Establishment (CSE), the secretive agency accused…
If all Bitcoin transactions are "open", why would ransomware actors want payment in Bitcoin?
Maybe I'm not grokking some part of how cryptocurrencies work, but since all transactions can be verified by anyone using the cryptocurrency in question (http://ift.tt/2gXwpK8), wouldn't that mean that the ransomware creators would be "known" - or, at least, any time those cryptocoins were used in the future, it would be known they came through a bad actor's wallet?
Submitted October 31, 2017 at 09:14PM by volci
via reddit http://ift.tt/2zlBYJM
Maybe I'm not grokking some part of how cryptocurrencies work, but since all transactions can be verified by anyone using the cryptocurrency in question (http://ift.tt/2gXwpK8), wouldn't that mean that the ransomware creators would be "known" - or, at least, any time those cryptocoins were used in the future, it would be known they came through a bad actor's wallet?
Submitted October 31, 2017 at 09:14PM by volci
via reddit http://ift.tt/2zlBYJM
Wikipedia
Bitcoin
Bitcoin is a worldwide cryptocurrency and digital payment system called the first decentralized digital currency, as the system works without a central repository or single administrator. It was invented by an unknown person or group of people under the name…
Data Security 101
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every member of my company could know 3 things what should they know about protecting our sensitive data?
Submitted October 31, 2017 at 09:00PM by Barnaby_Jonezzz
via reddit http://ift.tt/2z0X5Rq
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every member of my company could know 3 things what should they know about protecting our sensitive data?
Submitted October 31, 2017 at 09:00PM by Barnaby_Jonezzz
via reddit http://ift.tt/2z0X5Rq
reddit
Data Security 101 • r/security
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every...
Stop SSH Attacks By Eliminating SSH Keys
http://ift.tt/2A318u3
Submitted October 31, 2017 at 10:48PM by misterkwon
via reddit http://ift.tt/2gZZO6G
http://ift.tt/2A318u3
Submitted October 31, 2017 at 10:48PM by misterkwon
via reddit http://ift.tt/2gZZO6G
ScaleFT
ScaleFT - Stop SSH Attacks By Eliminating SSH Keys
Lost, stolen, or misused SSH keys have long been a known threat vector. We have a crazy thought here at ScaleFT – what if we got rid of them entirely? It's our belief that static credentials are a thing of the past, representing the failed perimeter model…
Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online
http://ift.tt/2zjFkgs
Submitted October 31, 2017 at 10:15PM by brideoflinux
via reddit http://ift.tt/2A1c3Ep
http://ift.tt/2zjFkgs
Submitted October 31, 2017 at 10:15PM by brideoflinux
via reddit http://ift.tt/2A1c3Ep
Data Center Knowledge
Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online
The open source file sharing project scanned the web to find numerous vulnerable and unpatched instances of its software on critical websites.
"Lessons in Building your own Awareness Community - At the EU #SecAwareSummit"
http://ift.tt/2gZENZM
Submitted October 31, 2017 at 11:13PM by volci
via reddit http://ift.tt/2z2ubQw
http://ift.tt/2gZENZM
Submitted October 31, 2017 at 11:13PM by volci
via reddit http://ift.tt/2z2ubQw
securingthehuman.sans.org
Security Awareness Blog | Lessons in Building your own Awareness Community - At the EU #SecAwareSummit
Security Awareness Blog blog pertaining to Lessons in Building your own Awareness Community - At the EU #SecAwareSummit
Putin has started aiming his cyberweapons against individuals
http://ift.tt/2z1iWr9
Submitted October 31, 2017 at 11:05PM by NISMO1968
via reddit http://ift.tt/2z2uieU
http://ift.tt/2z1iWr9
Submitted October 31, 2017 at 11:05PM by NISMO1968
via reddit http://ift.tt/2z2uieU
Newsweek
Putin has started aiming his cyberweapons against individuals
The Ukrainian government has been attacked by computer viruses that target particular individuals.
Night of the Devil: Ransomware or wiper? A look into targeted attacks in Japan
http://ift.tt/2gYm2pF
Submitted November 01, 2017 at 12:05AM by Eliad-Cybereason
via reddit http://ift.tt/2hsNVmq
http://ift.tt/2gYm2pF
Submitted November 01, 2017 at 12:05AM by Eliad-Cybereason
via reddit http://ift.tt/2hsNVmq
Cybereason
Night of the Devil: Ransomware or wiper? A look into targeted attacks in Japan using MBR-ONI
Cybereason followed ONI family of ransomware that targets Japanese companies and discovered MBR-ONI, a new bootkit ransomware that behaves like a wiper.
Loss of NSA software a cybersecurity disaster
http://ift.tt/2zdBYM0
Submitted November 01, 2017 at 01:33AM by WinglessIndependence
via reddit http://ift.tt/2z2SOKF
http://ift.tt/2zdBYM0
Submitted November 01, 2017 at 01:33AM by WinglessIndependence
via reddit http://ift.tt/2z2SOKF
Atimes
Loss of NSA software a cybersecurity disaster
The US response to the discovery by Israeli cyber-intelligence of highly classified documents inside Moscow-based software firm Kaspersky's computers has been weak
If your vibrator is hacked, is it a sex crime?
http://ift.tt/2zlHool
Submitted November 01, 2017 at 02:02AM by dpgowan
via reddit http://ift.tt/2iPnvyQ
http://ift.tt/2zlHool
Submitted November 01, 2017 at 02:02AM by dpgowan
via reddit http://ift.tt/2iPnvyQ
Gizmodo
If Your Vibrator Is Hacked, Is It a Sex Crime?
On a recent trip to Berlin, Alex Lomas’ acquaintance posed him a challenge: Can you find a Bluetooth-enabled butt plug in the wild, and can you turn it on without its owner’s help? Lomas, a penetration tester with the British cybersecurity firm Pen Test Partners…
Disclosure: WordPress WPDB SQL Injection
http://ift.tt/2lwjpg5
Submitted November 01, 2017 at 02:55AM by lboynton
via reddit http://ift.tt/2gSLgC7
http://ift.tt/2lwjpg5
Submitted November 01, 2017 at 02:55AM by lboynton
via reddit http://ift.tt/2gSLgC7
ircmaxell's Blog
Disclosure: WordPress WPDB SQL Injection - Technical
Today, a significant SQL-Injection vulnerability was fixed in WordPress 4.8.3. Before reading further, if you haven’t updated yet stop right now and update. The foundations of this vulnerability was r
Measuring the Value of Identity Governance â Part II
http://ift.tt/2iQ0T12
Submitted November 01, 2017 at 04:34AM by mCIO_tech
via reddit http://ift.tt/2zlY9zB
http://ift.tt/2iQ0T12
Submitted November 01, 2017 at 04:34AM by mCIO_tech
via reddit http://ift.tt/2zlY9zB
Microfocus
Measuring the Value of Identity Governance – Part II | Micro Focus Blog
In part I, Marcus Vogt covered the framework that we'll use as the basis of calculating the value of identity governance - here's the concluding part of the
BlackBerry CEO Promises To Try To Break Customers' Encryption If The US Gov't Asks Him To
http://ift.tt/2zgPXAE
Submitted November 01, 2017 at 04:00AM by RandomCollection
via reddit http://ift.tt/2gRYoY2
http://ift.tt/2zgPXAE
Submitted November 01, 2017 at 04:00AM by RandomCollection
via reddit http://ift.tt/2gRYoY2
Techdirt.
BlackBerry CEO Promises To Try To Break Customers' Encryption If The US Gov't Asks Him To
The DOJ's reps -- along with the new FBI boss -- keep making noises about device encryption. They don't like it. What they...
D-Link Middle East “DLink-MEA” website is secretly mining cryptocurrencies
http://ift.tt/2iRDDzL
Submitted November 01, 2017 at 05:39AM by SymbianSyMoh
via reddit http://ift.tt/2zmP8GI
http://ift.tt/2iRDDzL
Submitted November 01, 2017 at 05:39AM by SymbianSyMoh
via reddit http://ift.tt/2zmP8GI
Privilege Escalation on LegalRobot through Type Confusion
http://ift.tt/2hrFacq
Submitted November 01, 2017 at 07:58AM by samczsun
via reddit http://ift.tt/2lBVJH2
http://ift.tt/2hrFacq
Submitted November 01, 2017 at 07:58AM by samczsun
via reddit http://ift.tt/2lBVJH2
samczsun
Privilege Escalation on LegalRobot through Type Confusion
While bug hunting on LegalRobot, I discovered a privilege escalation bug in Meteor by abusing JavaScript's weak types.