Can a hacker log in bypassing 2FA?
Hello, If a hacker has an access to your login and password + email details, but he has no access to 2fa, can he log in your account?
Submitted December 12, 2017 at 06:48PM by esdohadoce
via reddit http://ift.tt/2kpGVYs
Hello, If a hacker has an access to your login and password + email details, but he has no access to 2fa, can he log in your account?
Submitted December 12, 2017 at 06:48PM by esdohadoce
via reddit http://ift.tt/2kpGVYs
reddit
Can a hacker log in bypassing 2FA? • r/security
Hello, If a hacker has an access to your login and password + email details, but he has no access to 2fa, can he log in your account?
Detection Lab is a collection of Packer and Vagrant noscripts that allow you to quickly bring a Windows Active Directory online, complete with a collection of endpoint security tooling and logging best practices.
http://ift.tt/2z3sEsV
Submitted December 12, 2017 at 06:32PM by speckz
via reddit http://ift.tt/2AwdkHB
http://ift.tt/2z3sEsV
Submitted December 12, 2017 at 06:32PM by speckz
via reddit http://ift.tt/2AwdkHB
Medium
Introducing: Detection Lab
Detection Lab is a collection of Packer and Vagrant noscripts that allow you to quickly bring a Windows Active Directory online, complete…
Security In 5: Episode 130 - OWASP Top 10 - A9 - Using Components With Known Vulnerabilities
http://ift.tt/2jB5yVI
Submitted December 12, 2017 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2Bcefwp
http://ift.tt/2jB5yVI
Submitted December 12, 2017 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2Bcefwp
Libsyn
Security In Five Podcast: Episode 130 - OWASP Top 10 - A9 - Using Components With Known Vulnerabilities
The OWASP Top 10 list is almost done. Number 9 talks about using components with known vulnerabilities. If you think this doesn't happen, look at Equifax. When vulnerabilities are published for a components hackers start to work on attacks for it. If you…
makin - reveal anti-debug tricks
http://ift.tt/2yhjzco
Submitted December 12, 2017 at 07:08PM by khasaia
via reddit http://ift.tt/2nUlEL8
http://ift.tt/2yhjzco
Submitted December 12, 2017 at 07:08PM by khasaia
via reddit http://ift.tt/2nUlEL8
GitHub
secrary/makin
makin - reveal anti-debug tricks
BrickerBot Author Retires Claiming to Have Bricked over 10 Million IoT Devices
http://ift.tt/2BdR2tu
Submitted December 12, 2017 at 07:35PM by DJRWolf
via reddit http://ift.tt/2l5rict
http://ift.tt/2BdR2tu
Submitted December 12, 2017 at 07:35PM by DJRWolf
via reddit http://ift.tt/2l5rict
BleepingComputer
BrickerBot Author Retires Claiming to Have Bricked over 10 Million IoT Devices
The author of the BrickerBot malware has announced his retirement in an email to Bleeping Computer, also claiming to have bricked over 10 million devices since he started the "Internet Chemotherapy" project in November 2016.
TLS Padding Oracle Vulnerability in Citrix NetScaler
http://ift.tt/2iTx2Sh
Submitted December 12, 2017 at 07:27PM by KernelJay
via reddit http://ift.tt/2ANTpRm
http://ift.tt/2iTx2Sh
Submitted December 12, 2017 at 07:27PM by KernelJay
via reddit http://ift.tt/2ANTpRm
reddit
TLS Padding Oracle Vulnerability in Citrix NetScaler • r/netsec
1 points and 0 comments so far on reddit
BLOCKBUSTED: Lazarus, Blockbuster, and North Korea
http://ift.tt/2nQYtBz
Submitted December 12, 2017 at 08:11PM by 0xbaadf00dsec
via reddit http://ift.tt/2C4PmQF
http://ift.tt/2nQYtBz
Submitted December 12, 2017 at 08:11PM by 0xbaadf00dsec
via reddit http://ift.tt/2C4PmQF
Intezer
BLOCKBUSTED: Lazarus, Blockbuster, and North Korea - Intezer
As we have proven in previous research blog posts, malware authors often reuse the same code. This evolution of code and code reuse is seen all throughout the well known Blockbuster campaign and connections between other malware attributed to the Lazarus…
Return of Bleichenbacher's Oracle Threat (ROBOT)
https://robotattack.org
Submitted December 12, 2017 at 08:35PM by KernelJay
via reddit http://ift.tt/2BIOqEO
https://robotattack.org
Submitted December 12, 2017 at 08:35PM by KernelJay
via reddit http://ift.tt/2BIOqEO
robotattack.org
The ROBOT Attack
Return of Bleichenbacher's Oracle Threat - ROBOT is the return of a 19-year-old vulnerability that allows performing RSA decryption and signing operations with the private key of a TLS server.
VERT Threat Alert: Return of Bleichenbacher’s Oracle Threat (ROBOT)
http://ift.tt/2BeEuSR
Submitted December 12, 2017 at 08:37PM by nanooonanooo
via reddit http://ift.tt/2jBf0sf
http://ift.tt/2BeEuSR
Submitted December 12, 2017 at 08:37PM by nanooonanooo
via reddit http://ift.tt/2jBf0sf
The State of Security
VERT Threat Alert: Return of Bleichenbacher’s Oracle Threat (ROBOT)
A team of researchers has announced that TLS stacks from at least seven different vendors are vulnerable to a well-known 19-year-old protocol flaw (ROBOT).
The ROBOT Attack
http://ift.tt/2AdSOay
Submitted December 12, 2017 at 09:06PM by speckz
via reddit http://ift.tt/2z3I1BE
http://ift.tt/2AdSOay
Submitted December 12, 2017 at 09:06PM by speckz
via reddit http://ift.tt/2z3I1BE
robotattack.org
The ROBOT Attack
Return of Bleichenbacher's Oracle Threat - ROBOT is the return of a 19-year-old vulnerability that allows performing RSA decryption and signing operations with the private key of a TLS server.
HP leaves accidental keylogger in laptop keyboard driver
http://ift.tt/2ygl6Q0
Submitted December 12, 2017 at 08:56PM by EvanConover
via reddit http://ift.tt/2AdUlxe
http://ift.tt/2ygl6Q0
Submitted December 12, 2017 at 08:56PM by EvanConover
via reddit http://ift.tt/2AdUlxe
Naked Security
HP leaves accidental keylogger in laptop keyboard driver
HP didnt beat around the bush – when a researcher found a left-over keylogger, the company fessed up and fixed it fast. Result!
How secure is online backup/cloud services such as Crashplan, Backblaze, Dropbox, etc
No text found
Submitted December 12, 2017 at 08:45PM by mscaff
via reddit http://ift.tt/2z3I54m
No text found
Submitted December 12, 2017 at 08:45PM by mscaff
via reddit http://ift.tt/2z3I54m
reddit
How secure is online backup/cloud services such as... • r/security
2 points and 2 comments so far on reddit
Analysis of File-Spider Ransomware
http://ift.tt/2ygCOCO
Submitted December 12, 2017 at 10:35PM by bill__24
via reddit http://ift.tt/2kqKFIW
http://ift.tt/2ygCOCO
Submitted December 12, 2017 at 10:35PM by bill__24
via reddit http://ift.tt/2kqKFIW
Sdkhere
Analysis of File-Spider Ransomware
FileSpider Ransomware, Spider Ransomware, Spider, Ransomware, MSIL Ransomware
GDPR WARNING: Do not forget about mobile apps when planning for GDPR
http://ift.tt/2jSZk01
Submitted December 12, 2017 at 11:48PM by Mi3Security
via reddit http://ift.tt/2kqSiPC
http://ift.tt/2jSZk01
Submitted December 12, 2017 at 11:48PM by Mi3Security
via reddit http://ift.tt/2kqSiPC
Mi3 Security
GDPR WARNING: Do not forget about mobile apps when planning for GDPR
General Data Protection Regulation (GDPR) is the new regulation to protect EU citizens’ personal data, replacing the current directive from 1995 and establishing a single set of rules across the European Union. GDPR outlines a set of obligations for organizations…
Phishers Are Upping Their Game. So Should You.
http://ift.tt/2jTAcq7
Submitted December 12, 2017 at 11:42PM by volci
via reddit http://ift.tt/2yiGP9N
http://ift.tt/2jTAcq7
Submitted December 12, 2017 at 11:42PM by volci
via reddit http://ift.tt/2yiGP9N
reddit
Phishers Are Upping Their Game. So Should You. • r/security
2 points and 0 comments so far on reddit
Multiple vulnerabilities in glibc's ld.so
http://ift.tt/2Bb2O7F
Submitted December 12, 2017 at 11:13PM by petermal67
via reddit http://ift.tt/2l0Q39E
http://ift.tt/2Bb2O7F
Submitted December 12, 2017 at 11:13PM by petermal67
via reddit http://ift.tt/2l0Q39E
reddit
Multiple vulnerabilities in glibc's ld.so • r/netsec
2 points and 1 comments so far on reddit
Best Practices for Verifying Vuln Fixes
http://ift.tt/2BgXzUm
Submitted December 13, 2017 at 12:12AM by ju1i3k
via reddit http://ift.tt/2jzSfom
http://ift.tt/2BgXzUm
Submitted December 13, 2017 at 12:12AM by ju1i3k
via reddit http://ift.tt/2jzSfom
Cobalt.io
Best Practices for Verifying Vuln Fixes
The pen test lifecycle is coming to a close. The previous posts have weighed heavily on getting the process started and running smoothly…
Why you can break encryption on a CD but not a VPN connection?
No text found
Submitted December 13, 2017 at 12:44AM by G0rd0nGekk0
via reddit http://ift.tt/2z47XNC
No text found
Submitted December 13, 2017 at 12:44AM by G0rd0nGekk0
via reddit http://ift.tt/2z47XNC
reddit
Why you can break encryption on a CD but not a VPN... • r/security
1 points and 1 comments so far on reddit
Looking to get into cybersecurity; Would love some advice.
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to start.Here's a bit of information about my history within IT and security.I know consumer grade hardware inside-out; Enterprise grade not so much. I have studied to become a sysadmin, although I have been informed that the majority of sysadmins get treated like shit. This means that I have some experience within windows server, and networking. I know most things within windows, although I don't think that'll matter as I believe a lot of cybersecurity stuff is done on Kali, or another Linux distribution.The programming languages I know are: Python, C# and Powershell I know C# to the extent of someone in between 'beginner' and 'intermediate' As far as python goes, I don't really like the language too much; But I do know a bit of normal python e.g. No libraries, just basic stuff. I believe powershell is a noscripting language, but I do know a tiny bit of it.I don't explicitly know where I would like to go in the cybersecurity field, although I know that I want to work in it. To be fair, I don't even know what kind of jobs there are in the cybersecurity field.Essentially, I'm looking for a person to guide me within my cybersecurity career.Any advice on where I should start?I apologize if any of this appeared rude, as I'm not the greatest with phrasing things and grammar.
Submitted December 13, 2017 at 01:16AM by joelazot
via reddit http://ift.tt/2jTrbxd
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to start.Here's a bit of information about my history within IT and security.I know consumer grade hardware inside-out; Enterprise grade not so much. I have studied to become a sysadmin, although I have been informed that the majority of sysadmins get treated like shit. This means that I have some experience within windows server, and networking. I know most things within windows, although I don't think that'll matter as I believe a lot of cybersecurity stuff is done on Kali, or another Linux distribution.The programming languages I know are: Python, C# and Powershell I know C# to the extent of someone in between 'beginner' and 'intermediate' As far as python goes, I don't really like the language too much; But I do know a bit of normal python e.g. No libraries, just basic stuff. I believe powershell is a noscripting language, but I do know a tiny bit of it.I don't explicitly know where I would like to go in the cybersecurity field, although I know that I want to work in it. To be fair, I don't even know what kind of jobs there are in the cybersecurity field.Essentially, I'm looking for a person to guide me within my cybersecurity career.Any advice on where I should start?I apologize if any of this appeared rude, as I'm not the greatest with phrasing things and grammar.
Submitted December 13, 2017 at 01:16AM by joelazot
via reddit http://ift.tt/2jTrbxd
reddit
Looking to get into cybersecurity; Would love some... • r/security
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to...
Authoritative DNS Performance Analytics and Comparison
http://ift.tt/2pLNjgM
Submitted December 13, 2017 at 01:45AM by rmddos
via reddit http://ift.tt/2BEvBm3
http://ift.tt/2pLNjgM
Submitted December 13, 2017 at 01:45AM by rmddos
via reddit http://ift.tt/2BEvBm3
Dnsperf
DNS Performance
Compare the speed and uptime of enterprise and commercial DNS services
Detection and recovery of NSA’s covered up tracks
http://ift.tt/2kDyEUr
Submitted December 12, 2017 at 07:53PM by digicat
via reddit http://ift.tt/2jDHfX0
http://ift.tt/2kDyEUr
Submitted December 12, 2017 at 07:53PM by digicat
via reddit http://ift.tt/2jDHfX0
Fox-IT International blog
Detection and recovery of NSA’s covered up tracks
Part of the NSA cyber weapon framework DanderSpritz is eventlogedit, a piece of software capable of removing individual lines from Windows Event Log files. Now that this tool is leaked and public, …