IDS x series alarm system
Error: Version No. 2.02 busy. Will not arm the alarm because of this error.
Submitted January 26, 2018 at 02:22PM by Gtex555
via reddit http://ift.tt/2DEhFWs
Error: Version No. 2.02 busy. Will not arm the alarm because of this error.
Submitted January 26, 2018 at 02:22PM by Gtex555
via reddit http://ift.tt/2DEhFWs
reddit
IDS x series alarm system • r/security
Error: Version No. 2.02 busy. Will not arm the alarm because of this error.
Amazing Incident Response 45K PCs and 4K Servers in 10 days
http://ift.tt/2nf36ll
Submitted January 26, 2018 at 03:27PM by akapranos
via reddit http://ift.tt/2DGEqxq
http://ift.tt/2nf36ll
Submitted January 26, 2018 at 03:27PM by akapranos
via reddit http://ift.tt/2DGEqxq
Debugging Android third-party Java apps with native methods
http://ift.tt/2Ea7c6g
Submitted January 26, 2018 at 03:10PM by xaocuc
via reddit http://ift.tt/2DA2kq3
http://ift.tt/2Ea7c6g
Submitted January 26, 2018 at 03:10PM by xaocuc
via reddit http://ift.tt/2DA2kq3
reddit
Debugging Android third-party Java apps with native methods • r/netsec
3 points and 0 comments so far on reddit
Why IP-based rules are bad, but we still use it
http://ift.tt/2ncAs51
Submitted January 26, 2018 at 04:22PM by jpkroehling
via reddit http://ift.tt/2Bv0yVv
http://ift.tt/2ncAs51
Submitted January 26, 2018 at 04:22PM by jpkroehling
via reddit http://ift.tt/2Bv0yVv
Medium
Why IP-based rules are bad, but we still use it
One of the first decisions when architecting a Web Application Firewall is whether or not to add blacklists based on IP addresses. Even…
How to Hack a Turned-off Computer, or Running Unsigned Code in Intel ME
http://ift.tt/2BwkAyI
Submitted January 26, 2018 at 06:26PM by alexlash
via reddit http://ift.tt/2Gix5Sb
http://ift.tt/2BwkAyI
Submitted January 26, 2018 at 06:26PM by alexlash
via reddit http://ift.tt/2Gix5Sb
Ptsecurity
How to Hack a Turned-off Computer, or Running Unsigned Code in Intel ME
At the recent Black Hat Europe conference, Positive Technologies researchers Mark Ermolov and Maxim Goryachy spoke about the vulnerability ...
Security In 5: Episode 161 - Tools, Tips and Tricks - Fileinfo.com
http://ift.tt/2BuwCZy
Submitted January 26, 2018 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2nhl73x
http://ift.tt/2BuwCZy
Submitted January 26, 2018 at 07:36PM by BinaryBlog
via reddit http://ift.tt/2nhl73x
Libsyn
Security In Five Podcast: Episode 161 - Tools, Tips and Tricks - Fileinfo.com
There are times when you come across a file and have no idea what it is, what it's for, if it's dangerous and if you can delete it. This is where a website like Fileinfo.com comes in. There are many resources like Fileinfo.com out there, this is just one…
Universal Cross-site Scripting db
http://ift.tt/2BtIBqm
Submitted January 26, 2018 at 07:25PM by coldlinecall
via reddit http://ift.tt/2neFkGT
http://ift.tt/2BtIBqm
Submitted January 26, 2018 at 07:25PM by coldlinecall
via reddit http://ift.tt/2neFkGT
GitHub
Metnew/uxss-db
uxss-db - UXSS DB [WIP!, update soon]
CloudFlair: Bypassing Cloudflare using Internet-wide scan data
http://ift.tt/2DrZB5a
Submitted January 26, 2018 at 08:23PM by speckz
via reddit http://ift.tt/2DGurrA
http://ift.tt/2DrZB5a
Submitted January 26, 2018 at 08:23PM by speckz
via reddit http://ift.tt/2DGurrA
Christophe Tafani-Dereeper
CloudFlair: Bypassing CloudFlare using Internet-wide scan data - Christophe Tafani-Dereeper
CloudFlare is a service that acts as a middleman between a website and its end users, protecting it from various attacks. Unfortunately, those websites are often poorly configured, allowing an attacker to entirely bypass Cloudflare and run DDoS attacks or…
Elastic Stack as Intrusion detection system
Hey guys, Has anybody experience or sources about a intrusion detection system based on the elastic stack ? We have centralised logging systems of our Webserver. So maybe we can use Kibana in combination with the x-pack. They offer some attractive tools and features for setting up a ids. I’m currently researching the machine learning feature. Highly appreciate any input!
Submitted January 26, 2018 at 07:57PM by Asurax96
via reddit http://ift.tt/2EbciPP
Hey guys, Has anybody experience or sources about a intrusion detection system based on the elastic stack ? We have centralised logging systems of our Webserver. So maybe we can use Kibana in combination with the x-pack. They offer some attractive tools and features for setting up a ids. I’m currently researching the machine learning feature. Highly appreciate any input!
Submitted January 26, 2018 at 07:57PM by Asurax96
via reddit http://ift.tt/2EbciPP
reddit
Elastic Stack as Intrusion detection system • r/security
Hey guys, Has anybody experience or sources about a intrusion detection system based on the elastic stack ? We have centralised logging systems of...
Catching same subnet scanning
What is the best detection method to catch same subnet scanning?
Submitted January 26, 2018 at 09:06PM by housetops
via reddit http://ift.tt/2DBlxrm
What is the best detection method to catch same subnet scanning?
Submitted January 26, 2018 at 09:06PM by housetops
via reddit http://ift.tt/2DBlxrm
reddit
Catching same subnet scanning • r/security
What is the best detection method to catch same subnet scanning?
Honey Buckets - A tool to find out who is snooping through your AWS S3 buckets
http://ift.tt/2n0s9Zl
Submitted January 26, 2018 at 11:00PM by graystevens
via reddit http://ift.tt/2DCOu6r
http://ift.tt/2n0s9Zl
Submitted January 26, 2018 at 11:00PM by graystevens
via reddit http://ift.tt/2DCOu6r
Breach Insider
Honey Buckets by Breach Insider
Find out who is snooping through your Amazon S3 buckets. A free, painless, and a quick way to identify reconnaissance against your infrastructure or brand, brought to you by Breach Insider.
SHA-1 and the art of digital certificate management: For years, crypto experts have been warning that a method of reliably generating SHA-1 hash collisions was just a matter of time. That time has come.
http://ift.tt/2EeRAPa
Submitted January 26, 2018 at 10:41PM by yourbasicgeek
via reddit http://ift.tt/2ndRBeQ
http://ift.tt/2EeRAPa
Submitted January 26, 2018 at 10:41PM by yourbasicgeek
via reddit http://ift.tt/2ndRBeQ
reddit
SHA-1 and the art of digital certificate management:... • r/security
0 points and 0 comments so far on reddit
Security Startup Builds GPU Native Custom Neural Network Framework
http://ift.tt/2DGAqwR
Submitted January 26, 2018 at 10:39PM by KeponeFactory
via reddit http://ift.tt/2BvGCBT
http://ift.tt/2DGAqwR
Submitted January 26, 2018 at 10:39PM by KeponeFactory
via reddit http://ift.tt/2BvGCBT
The Next Platform
Startup Builds GPU Native Custom Neural Network Framework
It is estimated that each day over a million malicious files are created and kicked to every corner of the web. While there are plenty of options for secur
InfoSec Week 4, 2018
http://ift.tt/2ndrpkC
Submitted January 26, 2018 at 11:42PM by undercomm
via reddit http://ift.tt/2BvSiV5
http://ift.tt/2ndrpkC
Submitted January 26, 2018 at 11:42PM by undercomm
via reddit http://ift.tt/2BvSiV5
Malgregator
InfoSec Week 4, 2018
Electron applications designed to run on Windows that register themselves as the default handler for a protocol, like Skype, Slack and...
Sandstorm Security Review
http://ift.tt/2rGb9Nr
Submitted January 26, 2018 at 10:45PM by DiscombobulatedGood
via reddit http://ift.tt/2nftlsE
http://ift.tt/2rGb9Nr
Submitted January 26, 2018 at 10:45PM by DiscombobulatedGood
via reddit http://ift.tt/2nftlsE
DEVCORE 戴夫寇爾
Sandstorm Security Review | DEVCORE 戴夫寇爾
In order to leverage the vulnerabilities, we put part of efforts into review of Sandstorm's source codes, and tried to escape the sandbox to impact the whole server...
Google X is launching a cybersecurity company called Chronicle
http://ift.tt/2Bq8p6E
Submitted January 27, 2018 at 01:45AM by volci
via reddit http://ift.tt/2DIqC5z
http://ift.tt/2Bq8p6E
Submitted January 27, 2018 at 01:45AM by volci
via reddit http://ift.tt/2DIqC5z
The Verge
Google X is launching a cybersecurity company called Chronicle
A ‘digital immune system’ from the moonshot department
Spy vs. Spy – “Cozy Bear” election hackers undone by hackable security camera
http://ift.tt/2DMJlMp
Submitted January 27, 2018 at 01:43AM by volci
via reddit http://ift.tt/2rJiQlZ
http://ift.tt/2DMJlMp
Submitted January 27, 2018 at 01:43AM by volci
via reddit http://ift.tt/2rJiQlZ
Naked Security
Spy vs. Spy – “Cozy Bear” election hackers undone by hackable security camera
Dutch counter-hackers spy on “Cozy Bear” election hackers using hackable security camera.
Reddit has added 2FA
http://ift.tt/2BuBhdR
Submitted January 27, 2018 at 01:39AM by volci
via reddit http://ift.tt/2GmoCx8
http://ift.tt/2BuBhdR
Submitted January 27, 2018 at 01:39AM by volci
via reddit http://ift.tt/2GmoCx8
Naked Security
Reddit users, 2FA is here! Now turn it on…
It’s been rather too long coming but Reddit users can finally secure their accounts with two-factor authentication (2FA).
Just saw this course on white hat hacking, does anyone know how good this course actually is?
http://ift.tt/2APkztz
Submitted January 27, 2018 at 01:17AM by King_Crimson93
via reddit http://ift.tt/2GjOU3c
http://ift.tt/2APkztz
Submitted January 27, 2018 at 01:17AM by King_Crimson93
via reddit http://ift.tt/2GjOU3c
StackSocial
Master the Essential Ethical Hacking Tools & Tricks (68+ Hours!) to Launch an Ethical Hacking Career in 2018
Pay What You Want: The Ultimate White Hat Hacker 2018 Bundle, Master the Essential Ethical Hacking Tools & Tricks (67+ Hours!) to Launch an Ethical Hacking Career in 2018
YouTube Serves Ads With Cryptocurrency Miners
http://ift.tt/2Bxdo5q
Submitted January 27, 2018 at 02:13AM by Amidza
via reddit http://ift.tt/2GjVh6H
http://ift.tt/2Bxdo5q
Submitted January 27, 2018 at 02:13AM by Amidza
via reddit http://ift.tt/2GjVh6H
The Inquisitr
YouTube serves ads with cryptocurrency miners
Cryptocurrency miners are slipping into YouTube ads and draining your CPU.
There’s More to Cyber Security Than Expensive New Technology; Analysts Know That, But They Focus on Tech Anyhow
http://ift.tt/2DBjoMh
Submitted January 27, 2018 at 02:20AM by yourbasicgeek
via reddit http://ift.tt/2rNHJ0f
http://ift.tt/2DBjoMh
Submitted January 27, 2018 at 02:20AM by yourbasicgeek
via reddit http://ift.tt/2rNHJ0f
Medium
There’s More to Cyber Security Than Expensive New Technology; Analysts Know That, But They Focus on Tech Anyhow
To my mind, the main problem with the analyst community is that it assumes that technology is the ultimate weapon for waging a winning war…