Libc Realpath Buffer Underflow CVE-2018-1000001
http://ift.tt/2D4sqp6
Submitted January 12, 2018 at 05:00PM by the_gnarts
via reddit http://ift.tt/2D3yWw4
http://ift.tt/2D4sqp6
Submitted January 12, 2018 at 05:00PM by the_gnarts
via reddit http://ift.tt/2D3yWw4
reddit
Libc Realpath Buffer Underflow CVE-2018-1000001 • r/netsec
2 points and 1 comments so far on reddit
Medical Device Security 101 Conference on January 15, 2018
http://ift.tt/2mmLHXq
Submitted January 12, 2018 at 06:13PM by cywarelabs12
via reddit http://ift.tt/2mljP6c
http://ift.tt/2mmLHXq
Submitted January 12, 2018 at 06:13PM by cywarelabs12
via reddit http://ift.tt/2mljP6c
Cyware
Medical Device Security 101 Conference | Cyware
The 2018 Medical Device Security 101 Conference, hosted by the University of Michigan’s Archimedes Center for Medical Device Security, is a 2.5-day educational workshop for healthcare providers, medical device manufacturers, and industry regulators to learn…
My work has a security block so I cannot see gaming websites. Can this be changed?
No text found
Submitted January 12, 2018 at 05:51PM by PompeyJon82
via reddit http://ift.tt/2FtCmG2
No text found
Submitted January 12, 2018 at 05:51PM by PompeyJon82
via reddit http://ift.tt/2FtCmG2
reddit
My work has a security block so I cannot see gaming... • r/security
1 points and 0 comments so far on reddit
Skype starts testing new ‘private conversations’ with end-to-end encryption
http://ift.tt/2qTwimW
Submitted January 12, 2018 at 05:08PM by GemmaJ123
via reddit http://ift.tt/2AUrxJv
http://ift.tt/2qTwimW
Submitted January 12, 2018 at 05:08PM by GemmaJ123
via reddit http://ift.tt/2AUrxJv
The Verge
Skype starts testing new ‘private conversations’ with end-to-end encryption
Extra security on a platform as big as Skype is always welcome.
Cyber Security Training in Amsterdam on January 15, 2018
http://ift.tt/2mjihtk
Submitted January 12, 2018 at 06:40PM by cywarelabs12
via reddit http://ift.tt/2D6UgjK
http://ift.tt/2mjihtk
Submitted January 12, 2018 at 06:40PM by cywarelabs12
via reddit http://ift.tt/2D6UgjK
Cyware
Cyber Security Training in Amsterdam | Cyware
Features of Cyber Security Training in Amsterdam 2018:
-Choose from 7 hands-on cyber security courses;
-Prepare for: GSEC, GCIH, GXPN and GCFE Certification;
-Take SANS Training in a classroom-like environment and under the supervision of a SANS Instructor;…
-Choose from 7 hands-on cyber security courses;
-Prepare for: GSEC, GCIH, GXPN and GCFE Certification;
-Take SANS Training in a classroom-like environment and under the supervision of a SANS Instructor;…
The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within
http://ift.tt/2ue1Owh
Submitted January 12, 2018 at 07:26PM by wowamit
via reddit http://ift.tt/2FuQEGl
http://ift.tt/2ue1Owh
Submitted January 12, 2018 at 07:26PM by wowamit
via reddit http://ift.tt/2FuQEGl
Kaspersky
The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within
IntroductionSometimes personnel may take cybersecurity requirements too lightly, leading to dramatic consequences for the organizations they work for.In the recent WannaCry ransomware
Security In 5: Episode 151 - Tools, Tips and Tricks - FCC Cyberplanner Website
http://ift.tt/2D8qr20
Submitted January 12, 2018 at 07:38PM by BinaryBlog
via reddit http://ift.tt/2mw5Uee
http://ift.tt/2D8qr20
Submitted January 12, 2018 at 07:38PM by BinaryBlog
via reddit http://ift.tt/2mw5Uee
Libsyn
Security In Five Podcast: Episode 151 - Tools, Tips and Tricks - FCC Cyberplanner Website
This week's tools, tips and tricks episode is a tip on gathering guidelines on building a cybersecurity program. The Federal Communication Commission has a website for Cybersecurity planning. There you can download great beginning resources, especially if…
Polymorphic and smaller versions of three shell-storm’s x64 shellcodes, including the smallest execve /bin/sh
http://ift.tt/2AVRmt2
Submitted January 12, 2018 at 07:44PM by 0x4ndr3
via reddit http://ift.tt/2ECOfIn
http://ift.tt/2AVRmt2
Submitted January 12, 2018 at 07:44PM by 0x4ndr3
via reddit http://ift.tt/2ECOfIn
Pentester's life
Polymorphic and smaller versions of three shell-storm’s x64 shellcodes, including the smallest execve /bin/sh
Looking at the smallest x64 shellcodes (section Linux / Intel x86-64) in shell-storm’s website, we find the following: Linux/x86-64 – reboot(POWER_OFF) – 19 bytes by zbt Linux/x86…
Reviewing AlwaysOnSSL - The new free & automated Certificate Authority
http://ift.tt/2Fux8dn
Submitted January 12, 2018 at 07:00PM by ayeshrajans
via reddit http://ift.tt/2ASBJ5q
http://ift.tt/2Fux8dn
Submitted January 12, 2018 at 07:00PM by ayeshrajans
via reddit http://ift.tt/2ASBJ5q
ayesh.me
AlwaysOnSSL - The new free & automated Certificate Authority
"New security flaw detected in Intel. It has nothing to do with the Spectre and Meltdown vulnerabilities, but has a huge "destructive potential" too." Local exploit though and have to stay on LAN
http://ift.tt/2mvLmm3
Submitted January 12, 2018 at 06:38PM by cpeacock15
via reddit http://ift.tt/2Dl2MJn
http://ift.tt/2mvLmm3
Submitted January 12, 2018 at 06:38PM by cpeacock15
via reddit http://ift.tt/2Dl2MJn
DW.COM
New security flaw detected in Intel hardware | Business| Economy and finance news from a German perspective | DW | 12.01.2018
Finnish cybersecurity specialist F-Secure has reported another serious flaw in Intel hardware. It has nothing to do with the Spectre and Meltdown vulnerabilities, but has a huge "destructive potential" too.
Chaining Bugs to Steal Yahoo Contacts!
http://ift.tt/2mutEzn
Submitted January 12, 2018 at 09:18PM by sxcurity
via reddit http://ift.tt/2FxTH0L
http://ift.tt/2mutEzn
Submitted January 12, 2018 at 09:18PM by sxcurity
via reddit http://ift.tt/2FxTH0L
www.sxcurity.pro
Chaining Bugs to Steal Yahoo Contacts!
👨🏻💻 Introduction & Background: This is a write-up of how I chained two vulnerabilities (an XSS and a CORS misconfiguration) that allowed me to steal contacts from a victim’s contact book. ...
FILE Structure Exploitation - 'vtable' check bypass
http://ift.tt/2Dqf43t
Submitted January 12, 2018 at 10:27PM by dhavalkapil
via reddit http://ift.tt/2mwSw9F
http://ift.tt/2Dqf43t
Submitted January 12, 2018 at 10:27PM by dhavalkapil
via reddit http://ift.tt/2mwSw9F
https://dhavalkapil.com
FILE Structure Exploitation ('vtable' check bypass)
Understanding the recent check on 'vtable' and a possible bypass technique
34C3 Tool Release: Cachegrab for TrustZone
http://ift.tt/2mw9Rjk
Submitted January 12, 2018 at 09:47PM by digicat
via reddit http://ift.tt/2FxdU6y
http://ift.tt/2mw9Rjk
Submitted January 12, 2018 at 09:47PM by digicat
via reddit http://ift.tt/2FxdU6y
reddit
34C3 Tool Release: Cachegrab for TrustZone • r/netsec
1 points and 0 comments so far on reddit
How I exploited ACME TLS-SNI-01 issuing Let’s Encrypt SSL-certs for any domain using shared hosting
http://ift.tt/2mnLbbF
Submitted January 12, 2018 at 09:47PM by tunnelshade
via reddit http://ift.tt/2EB5Cta
http://ift.tt/2mnLbbF
Submitted January 12, 2018 at 09:47PM by tunnelshade
via reddit http://ift.tt/2EB5Cta
reddit
How I exploited ACME TLS-SNI-01 issuing Let’s Encrypt... • r/netsec
7 points and 0 comments so far on reddit
With all the hubbub about Meltdown and Spectre, AMD CPUs are widely regarded as being perfectly safe. Well AMD chips may be safer, but they're not invulnerable.
http://ift.tt/2mlBNWc
Submitted January 12, 2018 at 09:53PM by yourbasicgeek
via reddit http://ift.tt/2mwGLjR
http://ift.tt/2mlBNWc
Submitted January 12, 2018 at 09:53PM by yourbasicgeek
via reddit http://ift.tt/2mwGLjR
ZDNet
AMD processors: Not as safe as you might have thought | ZDNet
With all the hub-bub about Meltdown and Spectre, AMD CPUs are widely regarded as being perfectly safe. Well AMD chips may be safer, but they're not invulnerable.
The Crucial Time for Critical Vulns
http://ift.tt/2mwIHZC
Submitted January 12, 2018 at 11:08PM by ju1i3k
via reddit http://ift.tt/2FvSRSf
http://ift.tt/2mwIHZC
Submitted January 12, 2018 at 11:08PM by ju1i3k
via reddit http://ift.tt/2FvSRSf
Cobalt.io
The Crucial Time for Critical Vulns
Time, like love, is a universal subject in songs. Time is also a universal theme when discussing vulns; it’s a key component of risk…
Challenge Your Threat Intelligence Assumptions: An Interview With Gavin Reid
http://ift.tt/2FyF1OL
Submitted January 13, 2018 at 12:02AM by volci
via reddit http://ift.tt/2FxjAxM
http://ift.tt/2FyF1OL
Submitted January 13, 2018 at 12:02AM by volci
via reddit http://ift.tt/2FxjAxM
Recorded Future
Challenge Your Threat Intelligence Assumptions: An Interview With Gavin Reid
We interviewed Gavin Reid, who recently joined Recorded Future as chief security architect, focusing on next-generation threats and the role that threat intelligence can play in identifying and combating them.
Intel AMT Security Issue Lets Attackers Bypass BIOS and BitLocker Passwords
http://ift.tt/2CYWPkv
Submitted January 13, 2018 at 01:57AM by 808hunna
via reddit http://ift.tt/2D6O2Bc
http://ift.tt/2CYWPkv
Submitted January 13, 2018 at 01:57AM by 808hunna
via reddit http://ift.tt/2D6O2Bc
BleepingComputer
Intel AMT Security Issue Lets Attackers Bypass BIOS and BitLocker Passwords
An F-Secure security researcher has found a way to use Intel's Active Management Technology (AMT) to bypass BIOS passwords, BitLocker credentials, and TPM pins and gain access to previously-secured corporate computers.
"2018 is barely two weeks old, and already it looks like we've got new piece of macOS malware! Hooray :)"
http://ift.tt/2D4DS3T
Submitted January 13, 2018 at 07:26AM by cpeacock15
via reddit http://ift.tt/2DrVinU
http://ift.tt/2D4DS3T
Submitted January 13, 2018 at 07:26AM by cpeacock15
via reddit http://ift.tt/2DrVinU
Tom's Guide
New Mac Malware Hijacks Web Connections: What to Do
This year's first known Mac malware is a DNS hijacker called 'MaMi.' It can also steal passwords, install new programs and take screenshots.
A publicly-disclosed UXSS vulnerability was being exploited against Opera users for over two years (2010 to late 2012)
http://ift.tt/2msFFES
Submitted January 13, 2018 at 08:45AM by Sephr
via reddit http://ift.tt/2mzl6Y4
http://ift.tt/2msFFES
Submitted January 13, 2018 at 08:45AM by Sephr
via reddit http://ift.tt/2mzl6Y4
Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture
http://ift.tt/2mrqZWk
Submitted January 13, 2018 at 11:19AM by volci
via reddit http://ift.tt/2DchNQb
http://ift.tt/2mrqZWk
Submitted January 13, 2018 at 11:19AM by volci
via reddit http://ift.tt/2DchNQb
Troy Hunt
Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture
India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's also…