Security Review Of Okta's TOP-10 Security Posture Features to prevent the next breach
https://ift.tt/VU3b8FY
Submitted February 13, 2024 at 10:01PM by Or1rez
via reddit https://ift.tt/0Fl2QyO
https://ift.tt/VU3b8FY
Submitted February 13, 2024 at 10:01PM by Or1rez
via reddit https://ift.tt/0Fl2QyO
Rezonate - Protect Identities, Everywhere
Top 10 Features to Enhance Your Okta Security Posture - Rezonate
We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks.
Google chronicle - query by subnet
https://ift.tt/mpo8KYg
Submitted February 13, 2024 at 11:49PM by BurkeSooty
via reddit https://ift.tt/JZx7GnB
https://ift.tt/mpo8KYg
Submitted February 13, 2024 at 11:49PM by BurkeSooty
via reddit https://ift.tt/JZx7GnB
Azure Devops Zero-Click CI/CD Vulnerability
https://ift.tt/H7lsgKy
Submitted February 14, 2024 at 03:35AM by roy_6472
via reddit https://ift.tt/1uBUZh7
https://ift.tt/H7lsgKy
Submitted February 14, 2024 at 03:35AM by roy_6472
via reddit https://ift.tt/1uBUZh7
Legitsecurity
Azure Devops Zero-Click CI/CD Vulnerability
The Legit Security research team has found and reported a zero-click attack that allowed attackers to submit malicious code and access secrets.
Can you Tell When A Power Outage Occurred? -- Determining How Long a Wi-Fi AP Has Been Active
https://ift.tt/vHaADyV
Submitted February 14, 2024 at 04:59PM by wirelessbits
via reddit https://ift.tt/pec3MUC
https://ift.tt/vHaADyV
Submitted February 14, 2024 at 04:59PM by wirelessbits
via reddit https://ift.tt/pec3MUC
Medium
Determining How Long a Wi-Fi AP Has Been Active
I spend a decent amount of time looking at IEEE 802.11 (Wi-Fi) packet captures and feel like every time I close Wireshark I’ve learned…
Snap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion System
https://ift.tt/kW654Hy
Submitted February 14, 2024 at 06:50PM by ilay789
via reddit https://ift.tt/AsL2pjf
https://ift.tt/kW654Hy
Submitted February 14, 2024 at 06:50PM by ilay789
via reddit https://ift.tt/AsL2pjf
Aqua
The Hidden Dangers Within Ubuntu's Package Suggestion System
Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu's command-not-found package and the snap package repository.
Staying ahead of threat actors in the age of AI
https://ift.tt/5WrFIyo
Submitted February 15, 2024 at 12:26AM by SCI_Rusher
via reddit https://ift.tt/gmwbeON
https://ift.tt/5WrFIyo
Submitted February 15, 2024 at 12:26AM by SCI_Rusher
via reddit https://ift.tt/gmwbeON
Microsoft Security Blog
Staying ahead of threat actors in the age of AI | Microsoft Security Blog
Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity…
SOC Interview Questions
https://ift.tt/pdaoMPU
Submitted February 15, 2024 at 03:06AM by ogunal00
via reddit https://ift.tt/VDhAF6n
https://ift.tt/pdaoMPU
Submitted February 15, 2024 at 03:06AM by ogunal00
via reddit https://ift.tt/VDhAF6n
GitHub
GitHub - LetsDefend/SOC-Interview-Questions: SOC Interview Questions
SOC Interview Questions. Contribute to LetsDefend/SOC-Interview-Questions development by creating an account on GitHub.
Microsoft 365 AiTM detection: the lessons learned
https://ift.tt/VghIqAu
Submitted February 15, 2024 at 11:10PM by wez32
via reddit https://ift.tt/Tk5chWM
https://ift.tt/VghIqAu
Submitted February 15, 2024 at 11:10PM by wez32
via reddit https://ift.tt/Tk5chWM
Zolder B.V.
Microsoft 365 AiTM detection: the lessons learned
The beginning of January we released a new way to detect AiTM attacks on your Microsoft 365 environment. In just one month, we are protecting over 100 tenants with this new approach. We were able t…
GitHub - deeexcee-io/duppy: python flask app which utilises ngrok and gunicorn to securely download and upload files to local machine over the internet. all handled by the bash noscript.
https://ift.tt/gBj69Rh
Submitted February 16, 2024 at 03:04AM by Leading-Employer-828
via reddit https://ift.tt/7HPEvFZ
https://ift.tt/gBj69Rh
Submitted February 16, 2024 at 03:04AM by Leading-Employer-828
via reddit https://ift.tt/7HPEvFZ
GitHub
GitHub - deeexcee-io/duppy: python flask app which utilises ngrok and gunicorn to securely upload files to local machine and download…
python flask app which utilises ngrok and gunicorn to securely upload files to local machine and download to remote machine over the internet. all handled by the bash noscript. - deeexcee-io/duppy
Exploiting TRACE
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
attackshipsonfi.re
Exploiting TRACE
TL;DR The presence of the TRACE method is generally considered to be at best an informational finding (and in isolation, I wouldn’t disagree with that). But before you deploy your meh, if you know what to look for, the TRACE method (and any other mechanism…
Exploiting Unsynchronised Clocks
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
attackshipsonfi.re
Exploiting Unsynchronised Clocks
TL;DR According to data from RIPE, over 40% of computers attached to the Internet have a few seconds of clock drift, which with the right combination of headers, will make an HTTP response unintentionally cacheable. Background Like many parts of the HTTP…
A Double Free vulnerability on the libdicom library and an in-depth analysis of the DICOM file format.
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
voidzone.me
Diving into the DICOM file format
Introduction While doing some research about file formats, I occasionally found some references about the DICOM file format. Since I never heard about it I’ve decided to dig deeper.
16/02/2024 Update It seems that the developer was already aware of the Double…
16/02/2024 Update It seems that the developer was already aware of the Double…
Elrouby Decrypted Desktop: The Best safe place for your files.
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
GitHub
GitHub - ElroubyMagnos/ElroubyDecryptedDesktop: The best safe place for your files
The best safe place for your files. Contribute to ElroubyMagnos/ElroubyDecryptedDesktop development by creating an account on GitHub.
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
ReynardSec
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
This article provides practical recommendations for configuring Docker platform aimed at increasing its security. It also suggests tools helpful in automation of some tasks related to securing Docker.
Analysis of Mirai variant leveraging CVE-2023-1389
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
Weekly digest of security-related conference talks
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
Top 10 web hacking techniques of 2023
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
PortSwigger Research
Top 10 web hacking techniques of 2023
Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
Code Review Like a Pro
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
haymiz@kali:~/blog$
Code Review Like a Pro
Discover how to uncover vulnerabilities in source code applications and learn key techniques to identify and mitigate security risks effectively.
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXE
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...