Security Orchestration Use Case For SSL Certificate Management
http://ift.tt/2hSFrbR
Submitted November 22, 2017 at 01:26AM by abhishekiyer
via reddit http://ift.tt/2BbBkfN
http://ift.tt/2hSFrbR
Submitted November 22, 2017 at 01:26AM by abhishekiyer
via reddit http://ift.tt/2BbBkfN
Demisto
Security Orchestration Use Case: Certificate Management with Venafi and Demisto
Learn how to use security orchestration for certificate management operations (like checking for expired certificates) by integrating Venafi and Demisto.
The Russian Banker Who Knew Too Much
http://ift.tt/2AUS6yL
Submitted November 22, 2017 at 05:01AM by joelgsus
via reddit http://ift.tt/2zrB1QH
http://ift.tt/2AUS6yL
Submitted November 22, 2017 at 05:01AM by joelgsus
via reddit http://ift.tt/2zrB1QH
Bloomberg.com
The Russian Banker Who Knew Too Much
Alexei Kulikov was charged with looting a small Moscow bank. His trial turned into a window on the shadowy world of money laundering in Russia.
Uber Concealed Cyberattack That Exposed 57 Million People’s Data
http://ift.tt/2zamJzO
Submitted November 22, 2017 at 05:24AM by redscel
via reddit http://ift.tt/2zWjfnL
http://ift.tt/2zamJzO
Submitted November 22, 2017 at 05:24AM by redscel
via reddit http://ift.tt/2zWjfnL
Bloomberg.com
Uber Paid Hackers to Delete Stolen Data on 57 Million People
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for…
From Markdown to RCE in Atom
http://ift.tt/2zUi8p0
Submitted November 22, 2017 at 06:45AM by 1lastBr3ath
via reddit http://ift.tt/2zqVeGt
http://ift.tt/2zUi8p0
Submitted November 22, 2017 at 06:45AM by 1lastBr3ath
via reddit http://ift.tt/2zqVeGt
reddit
From Markdown to RCE in Atom • r/netsec
1 points and 0 comments so far on reddit
Sign to help Defend Net Neutrality
http://ift.tt/2zVHz9V
Submitted November 22, 2017 at 07:51AM by dmeskin
via reddit http://ift.tt/2Al3JmB
http://ift.tt/2zVHz9V
Submitted November 22, 2017 at 07:51AM by dmeskin
via reddit http://ift.tt/2Al3JmB
Change.org
Sign the Petition
FCC: Internet Privacy and Net Neutrality
Uber was Hacked in October 2016 and the Company Failed to Report it!
http://ift.tt/2AlqjLD
Submitted November 22, 2017 at 07:32AM by moki339
via reddit http://ift.tt/2zXwncb
http://ift.tt/2AlqjLD
Submitted November 22, 2017 at 07:32AM by moki339
via reddit http://ift.tt/2zXwncb
Security News iO
Uber Hack in October 2016: Failing to Report | Security News iO
The Uber hack spanned the personal information of 57 million customers and Uber failed to notify individuals and regulators.
Week 46 in Information Security, 2017
http://ift.tt/2iEWZ8C
Submitted November 22, 2017 at 12:34PM by undercomm
via reddit http://ift.tt/2B2dKRO
http://ift.tt/2iEWZ8C
Submitted November 22, 2017 at 12:34PM by undercomm
via reddit http://ift.tt/2B2dKRO
Malgregator
InfoSec Week 46, 2017
Multiple critical vulnerabilities were found in the Intel Management Engine, Trusted Execution Engine and Server Platform Services by...
Google admits it tracked user location data even when the setting was turned off
http://ift.tt/2zoEqQk
Submitted November 22, 2017 at 01:58PM by bionicnomad
via reddit http://ift.tt/2hVdAHT
http://ift.tt/2zoEqQk
Submitted November 22, 2017 at 01:58PM by bionicnomad
via reddit http://ift.tt/2hVdAHT
The Verge
Google admits it tracked user location data even when the setting was turned off
It did so via cell tower data
Skeleton in the closet. MS Office vulnerability you didn’t know about
http://ift.tt/2iUpkaj
Submitted November 22, 2017 at 02:35PM by speckz
via reddit http://ift.tt/2AlMEcd
http://ift.tt/2iUpkaj
Submitted November 22, 2017 at 02:35PM by speckz
via reddit http://ift.tt/2AlMEcd
Embedi
Skeleton in the closet. MS Office vulnerability you didn’t know about
What is the beginning of a typical research? Any research begins with detecting vulnerabilities with common tools. Although the process does not require much time and effort, it works well.Detection procedure is focused on vulnerabilities in third-party libraries…
I honestly hope (even white hats) do their part. in ANY way possible. Please.
http://ift.tt/1kpJiCj
Submitted November 22, 2017 at 03:40PM by Owl_of_Panopticon
via reddit http://ift.tt/2hURIMP
http://ift.tt/1kpJiCj
Submitted November 22, 2017 at 03:40PM by Owl_of_Panopticon
via reddit http://ift.tt/2hURIMP
Battle for the Net
Take action: Battle for the Net!
Tell your Senators to act now to confirm both the FCC nominees, and to do all they can to reinstate net neutrality. battleforthenet.com
The Art of Fuzzing – Slides and Demos (Workflow AFL&WinAFL, Taint Analysis in Fuzzing, In-Memory Fuzzing, Reversing Tricks for Fuzzing, ...)
http://ift.tt/2zZysEU
Submitted November 22, 2017 at 04:37PM by SecABC
via reddit http://ift.tt/2jepOrM
http://ift.tt/2zZysEU
Submitted November 22, 2017 at 04:37PM by SecABC
via reddit http://ift.tt/2jepOrM
reddit
The Art of Fuzzing – Slides and Demos (Workflow... • r/netsec
4 points and 0 comments so far on reddit
PC vendors scramble as Intel announces vulnerability in firmware
http://ift.tt/2zaiBQi
Submitted November 22, 2017 at 05:40PM by MrSnuffles101
via reddit http://ift.tt/2A0iSIX
http://ift.tt/2zaiBQi
Submitted November 22, 2017 at 05:40PM by MrSnuffles101
via reddit http://ift.tt/2A0iSIX
Ars Technica
PC vendors scramble as Intel announces vulnerability in firmware [Updated]
Millions of computers could be remotely hijacked through bug in firmware code.
Locate AV signature in a binary/payload
http://ift.tt/2B10WeA
Submitted November 22, 2017 at 05:24PM by hegusung
via reddit http://ift.tt/2BbsqPf
http://ift.tt/2B10WeA
Submitted November 22, 2017 at 05:24PM by hegusung
via reddit http://ift.tt/2BbsqPf
GitHub
hegusung/AVSignSeek
AVSignSeek - Tool written in python3 to determine where the AV signature is located in a binary/payload
As devastating as KRACK: New vulnerability undermines RSA encryption keys
http://ift.tt/2ytYEXi
Submitted November 22, 2017 at 07:33PM by wewewawa
via reddit http://ift.tt/2B35jpe
http://ift.tt/2ytYEXi
Submitted November 22, 2017 at 07:33PM by wewewawa
via reddit http://ift.tt/2B35jpe
ZDNet
As devastating as KRACK: New vulnerability undermines RSA encryption keys
A new security flaw has placed the security of RSA encryption in jeopardy.
Security In 5: Episode 117 - Top 10 Security Tips For Your Network - 4 - Cyber Rules For Your Employees
http://ift.tt/2iFDFrR
Submitted November 22, 2017 at 07:30PM by BinaryBlog
via reddit http://ift.tt/2B2V6t8
http://ift.tt/2iFDFrR
Submitted November 22, 2017 at 07:30PM by BinaryBlog
via reddit http://ift.tt/2B2V6t8
Libsyn
Security In Five Podcast: Episode 117 - Top 10 Security Tips For Your Network - 4 - Cyber Rules For Your Employees
Continuing with the Top 10 Security Tips For Your Network mini-series we are up to number four. This tips talk about creating cyber rules for your employees. How you need to set the expectations of use and more importantly communicating the 'why' the rules…
Conclusion: passwords are the new IE6
http://ift.tt/2jNWV9K
Submitted November 22, 2017 at 08:23PM by volci
via reddit http://ift.tt/2hSPvl6
http://ift.tt/2jNWV9K
Submitted November 22, 2017 at 08:23PM by volci
via reddit http://ift.tt/2hSPvl6
Wouter Admiraal's Blog
Why not forget all our passwords completely: it has been one year
One year ago I wrote about why we should not use passwords online, and how email could help us provide better authentication methods. After one year of cheating the system, this is what I learned.
Key Windows 10 defense is 'worthless' and bug dates back to Windows 8
http://ift.tt/2z4THBP
Submitted November 22, 2017 at 09:00PM by wewewawa
via reddit http://ift.tt/2hTznQl
http://ift.tt/2z4THBP
Submitted November 22, 2017 at 09:00PM by wewewawa
via reddit http://ift.tt/2hTznQl
ZDNet
Key Windows 10 defense is 'worthless' and bug dates back to Windows 8 | ZDNet
Microsoft's anti-exploitation technology has a flaw that makes it "worthless" in some cases.
RBAC vs ABAC | iamfortress
http://ift.tt/2jN1EIZ
Submitted November 22, 2017 at 08:49PM by shawnmckinney
via reddit http://ift.tt/2hTzprr
http://ift.tt/2jN1EIZ
Submitted November 22, 2017 at 08:49PM by shawnmckinney
via reddit http://ift.tt/2hTzprr
iamfortress
RBAC vs ABAC
Frequently debated within info sec circles. Which one of them is better? Use the right tool for the job as they say. RBAC, like any access control model, has its weaknesses. Many are well understo…
Your biggest threat is inside your organisation and probably didn't mean it
http://ift.tt/2AV4MFO
Submitted November 22, 2017 at 08:48PM by wewewawa
via reddit http://ift.tt/2jN1FN3
http://ift.tt/2AV4MFO
Submitted November 22, 2017 at 08:48PM by wewewawa
via reddit http://ift.tt/2jN1FN3
ZDNet
Your biggest threat is inside your organisation and probably didn't mean it
Threat of the malicious insider is very real, but accidental data leakage is a bigger problem.
h1-202 web CTF writeup
http://ift.tt/2zY8Xnv
Submitted November 22, 2017 at 09:28PM by albinowax
via reddit http://ift.tt/2zYWjVw
http://ift.tt/2zY8Xnv
Submitted November 22, 2017 at 09:28PM by albinowax
via reddit http://ift.tt/2zYWjVw
www.skeletonscribe.net
h1-212 CTF Writeup
Introduction This is a writeup of h1-212 ; a web-based CTF by HackerOne. You can find the results and other writeups at https://www....
Attacking Uninitialized Variables with Recursion
http://ift.tt/2itvezx
Submitted November 22, 2017 at 10:26PM by maxxori
via reddit http://ift.tt/2ztCeqF
http://ift.tt/2itvezx
Submitted November 22, 2017 at 10:26PM by maxxori
via reddit http://ift.tt/2ztCeqF