OVER 18 (18,984,624) Million of the most used passwords!!
http://ift.tt/2yMIJQl
Submitted December 18, 2017 at 04:18AM by TheGuru12
via reddit http://ift.tt/2CMWce8
http://ift.tt/2yMIJQl
Submitted December 18, 2017 at 04:18AM by TheGuru12
via reddit http://ift.tt/2CMWce8
Pastebin
OVER 18 (18,984,624) Million of the most used passwords!! - Pastebin.com
Custom x64 encoder with a basic polymorphic engine implementation
http://ift.tt/2CLOqkF
Submitted December 18, 2017 at 04:44AM by 0x4ndr3
via reddit http://ift.tt/2k7FkqR
http://ift.tt/2CLOqkF
Submitted December 18, 2017 at 04:44AM by 0x4ndr3
via reddit http://ift.tt/2k7FkqR
Pentester's life
Custom x64 encoder with a basic polymorphic engine implementation
I’ll develop a python encoder that will XOR the payload, byte by byte, with a randomly generated byte value, and also generate a polymorphic stub in x64 to decode that payload, by brute-forci…
Remote LD_PRELOAD Exploitation
http://ift.tt/2oA6QBR
Submitted December 18, 2017 at 11:26AM by Gallus
via reddit http://ift.tt/2kbttYP
http://ift.tt/2oA6QBR
Submitted December 18, 2017 at 11:26AM by Gallus
via reddit http://ift.tt/2kbttYP
reddit
Remote LD_PRELOAD Exploitation • r/netsec
3 points and 0 comments so far on reddit
Securing WordPress Against Infrastructure/Supply-Chain Attacks (Feedback Sought from /r/netsec)
http://ift.tt/2CTB6L1
Submitted December 18, 2017 at 10:28AM by sarciszewski
via reddit http://ift.tt/2kDOZVB
http://ift.tt/2CTB6L1
Submitted December 18, 2017 at 10:28AM by sarciszewski
via reddit http://ift.tt/2kDOZVB
reddit
Securing WordPress Against Infrastructure/Supply-Chain... • r/netsec
14 points and 1 comments so far on reddit
Why Pharma Needs Access Security Broker To Protect Their Data
http://ift.tt/2oCucqA
Submitted December 18, 2017 at 11:53AM by hardiksoni28111988
via reddit http://ift.tt/2oEgALy
http://ift.tt/2oCucqA
Submitted December 18, 2017 at 11:53AM by hardiksoni28111988
via reddit http://ift.tt/2oEgALy
Ltssecure
Why Pharma needs Access Security Broker to protect their data − LTS Secure
Pharmaceutical industry is the industry of medicines and health-drugs. Safety of medicine is necessary in order to prevent theft and black marketing. However, apart from medicines, pharmaceutical firms also need to protect their data which comprises of company…
website securing services in Nepal | mountdomain
http://ift.tt/2kFyojW
Submitted December 18, 2017 at 11:46AM by NishanKarki
via reddit http://ift.tt/2CRURTk
http://ift.tt/2kFyojW
Submitted December 18, 2017 at 11:46AM by NishanKarki
via reddit http://ift.tt/2CRURTk
Mountdomain
website securing services in Nepal | mountdomain
Securing the site and its data is very important, if you are planning to secure your site then contact mountdomain for website securing services in Nepal.
Bitcoin Keys (951682) in WIF Format
http://ift.tt/2B6RL0l
Submitted December 18, 2017 at 04:32PM by TheGuru12
via reddit http://ift.tt/2BGqVfn
http://ift.tt/2B6RL0l
Submitted December 18, 2017 at 04:32PM by TheGuru12
via reddit http://ift.tt/2BGqVfn
Pastebin
Bitcoin Keys (951682) in WIF Format - Pastebin.com
Trojan malware attacks by North Korean hackers are attempting to steal Bitcoin
http://ift.tt/2Cdzta4
Submitted December 18, 2017 at 04:29PM by GemmaJ123
via reddit http://ift.tt/2AQfdeh
http://ift.tt/2Cdzta4
Submitted December 18, 2017 at 04:29PM by GemmaJ123
via reddit http://ift.tt/2AQfdeh
ZDNet
Trojan malware attacks by North Korean hackers are attempting to steal Bitcoin
Researchers at Secureworks say trojan malware is being distributed in phishing emails using the lure of a fake job advert
Detect And Disrupt Cyber Attacks Using Identity-Powered Intelligent Security
http://ift.tt/2Bsvlnp
Submitted December 18, 2017 at 02:52PM by hardiksoni28111988
via reddit http://ift.tt/2BECCmM
http://ift.tt/2Bsvlnp
Submitted December 18, 2017 at 02:52PM by hardiksoni28111988
via reddit http://ift.tt/2BECCmM
Ltssecure
Detect and Disrupt Cyber Attacks Using Identity-Powered Intelligent Security − LTS Secure
With activity logs, application usage data and company documents, information is a valuable commodity of any corporate organization that needs to be protected. Digital data needs to be protected and some common security mistakes made by enterprises need to…
Detect And Disrupt Cyber Attacks Using Identity-Powered Intelligent Security
http://ift.tt/2oBQYyJ
Submitted December 18, 2017 at 02:28PM by hardiksoni28111988
via reddit http://ift.tt/2CWpCqm
http://ift.tt/2oBQYyJ
Submitted December 18, 2017 at 02:28PM by hardiksoni28111988
via reddit http://ift.tt/2CWpCqm
Ltssecure
Lts cyber security analytics helps business detect target attacks. LTS Secure
Identify threats and anomalies associated with users and other entities within your organization: User and Entity Behavior Analytics (UEBA)
USER ENTITY BEHAVIOR ANALYTICS: A BOON FOR THE WORLD OF CYBER SECURITY
http://ift.tt/2oC8xPo
Submitted December 18, 2017 at 01:38PM by hardiksoni28111988
via reddit http://ift.tt/2ARA9Bz
http://ift.tt/2oC8xPo
Submitted December 18, 2017 at 01:38PM by hardiksoni28111988
via reddit http://ift.tt/2ARA9Bz
Ltssecure
LTS secure user entity behavior analytics boon to cyber security LTS Secure
UEBA has proved itself to be an indispensible asset in the world of cyber security
A complete guide on how to install and use WPSeku to penetrate into Wordpress Website
http://ift.tt/2B7IOUO
Submitted December 18, 2017 at 06:13PM by drhydrogen1
via reddit http://ift.tt/2B9yqMp
http://ift.tt/2B7IOUO
Submitted December 18, 2017 at 06:13PM by drhydrogen1
via reddit http://ift.tt/2B9yqMp
My Hack Stuff
WPSeku Kali Linux (Wordpress Security Scanner) Guide - My Hack Stuff
WPSeku Kali Linux (Wordpress Security Scanner) is a blackbox WordPress vulnerability scanner that can be utilized to scan distant WordPress installations...
Humble Book Bundle Network & Security Certification Ends Tomorrow
http://ift.tt/2CyvKEa
Submitted December 18, 2017 at 06:48PM by 13378
via reddit http://ift.tt/2kJnKZQ
http://ift.tt/2CyvKEa
Submitted December 18, 2017 at 06:48PM by 13378
via reddit http://ift.tt/2kJnKZQ
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
How I allowed bots to ssh into my server
http://ift.tt/2ASPhP0
Submitted December 18, 2017 at 07:54PM by bechampionjero
via reddit http://ift.tt/2BFxQoV
http://ift.tt/2ASPhP0
Submitted December 18, 2017 at 07:54PM by bechampionjero
via reddit http://ift.tt/2BFxQoV
Medium
How I allowed “hackers” to ssh into my server.
In my previous article ( https://hackernoon.com/how-ive-captured-all-passwords-trying-to-ssh-into-my-server-d26a2a6263ec ) I’ve modified…
Embeds a PowerShell noscript in the pixels of a PNG file and generates a oneliner to execute
http://ift.tt/2yNFTuq
Submitted December 18, 2017 at 07:52PM by speckz
via reddit http://ift.tt/2ARr5g2
http://ift.tt/2yNFTuq
Submitted December 18, 2017 at 07:52PM by speckz
via reddit http://ift.tt/2ARr5g2
GitHub
peewpw/Invoke-PSImage
Invoke-PSImage - Embeds a PowerShell noscript in the pixels of a PNG file and generates a oneliner to execute
Security In 5: Episode 134 - Best Security Practices For Your Browser
http://ift.tt/2kdbtxh
Submitted December 18, 2017 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2BDSohp
http://ift.tt/2kdbtxh
Submitted December 18, 2017 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2BDSohp
Libsyn
Security In Five Podcast: Episode 134 - Best Security Practices For Your Browser
As our Internet lives rely on the browser it's important to know how to use them in a secure way. You cannot assume your browser is setup in the most secure way possible. This episode goes through several best practices, tips and suggestions to ensure your…
There’s No Place Like ::1 — Enumerating Local IPv6 networks
http://ift.tt/2jaSTER
Submitted December 18, 2017 at 07:54PM by imposter_oak
via reddit http://ift.tt/2oDRnkq
http://ift.tt/2jaSTER
Submitted December 18, 2017 at 07:54PM by imposter_oak
via reddit http://ift.tt/2oDRnkq
SecDevOps
There’s No Place Like ::1 — Enumerating Local IPv6 networks
In today’s digital age, our devices expose a vast amount of data which highlights the need for cybersecurity. Without realizing it, we…
First security bounty: Knowing who is interviewing with Google and snatched their domain
http://ift.tt/2CXs0wU
Submitted December 18, 2017 at 08:37PM by htruong_habeducation
via reddit http://ift.tt/2oFotAg
http://ift.tt/2CXs0wU
Submitted December 18, 2017 at 08:37PM by htruong_habeducation
via reddit http://ift.tt/2oFotAg
The Pensieve
First security bug bounty: Knowing who is interviewing with Google and snatched their domain
My first bug bounty with Google is totally an accident while I was interviewed for their software engineering job this March.
Privacy-touting Mozilla caught shoving Mr Robot add-on into Firefox
http://ift.tt/2CtVbXj
Submitted December 18, 2017 at 08:50PM by ctwtn
via reddit http://ift.tt/2ySpnJm
http://ift.tt/2CtVbXj
Submitted December 18, 2017 at 08:50PM by ctwtn
via reddit http://ift.tt/2ySpnJm
ZDNet
Privacy-touting Mozilla caught shoving Mr Robot add-on into Firefox
Users who allowed Firefox to run its studies feature found an unwelcome add-on installed over the weekend.
10 things we wish more VPNs would do
http://ift.tt/2CkeP8k
Submitted December 18, 2017 at 09:25PM by yourbasicgeek
via reddit http://ift.tt/2jcVbn6
http://ift.tt/2CkeP8k
Submitted December 18, 2017 at 09:25PM by yourbasicgeek
via reddit http://ift.tt/2jcVbn6
TechRadar
10 things we wish more VPNs would do
Stop living with a shoddy VPN. It's time to expect more from your provider – along these suggested lines.
Micro-fortresses everywhere: The cloud security model and the software-defined perimeter | ZDNet
http://ift.tt/2CArODN
Submitted December 18, 2017 at 09:16PM by SecurityTrust
via reddit http://ift.tt/2zllX5D
http://ift.tt/2CArODN
Submitted December 18, 2017 at 09:16PM by SecurityTrust
via reddit http://ift.tt/2zllX5D
ZDNet
Micro-fortresses everywhere: The cloud security model and the software-defined perimeter
Where we encounter the efforts of security practitioners to apply something that sounds like an old model to the new system of distributed computing, and find out to get it to work, they have to turn it inside out.