[R] Breaking 7 / 8 of the ICLR 2018 adversarial example defenses
http://ift.tt/2ErtKzF
Submitted February 02, 2018 at 12:39AM by anishathalye
via reddit http://ift.tt/2DSQDz8
http://ift.tt/2ErtKzF
Submitted February 02, 2018 at 12:39AM by anishathalye
via reddit http://ift.tt/2DSQDz8
GitHub
anishathalye/obfuscated-gradients
obfuscated-gradients - Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Delivering a final stage shellcode through an active server socket
http://ift.tt/2nuxYPI
Submitted February 01, 2018 at 07:25PM by xpnsecurity
via reddit http://ift.tt/2nyPZvB
http://ift.tt/2nuxYPI
Submitted February 01, 2018 at 07:25PM by xpnsecurity
via reddit http://ift.tt/2nyPZvB
ewilded.blogspot.co.uk
$this->is(my $rifle); // IT is my !life
Vulnserver - my KSTET exploit (delivering the final stage shellcode through the active server socket) Introduction The purpose of writ...
How $800k Evaporated from the PoWH Coin Ponzi Scheme Overnight • r/PoWHCoin
http://ift.tt/2BKSEYe
Submitted February 01, 2018 at 05:58PM by throwawaeyaaaeyaeyaa
via reddit http://ift.tt/2DSlFXP
http://ift.tt/2BKSEYe
Submitted February 01, 2018 at 05:58PM by throwawaeyaaaeyaeyaa
via reddit http://ift.tt/2DSlFXP
reddit
Explanation: How $800k Evaporated from the PoWH Coin... • r/PoWHCoin
11 points and 5 comments so far on reddit
Hospital MRI and CT scanners at risk of cyberattack
http://ift.tt/2FybCDq
Submitted February 02, 2018 at 01:33AM by volci
via reddit http://ift.tt/2FAyNgt
http://ift.tt/2FybCDq
Submitted February 02, 2018 at 01:33AM by volci
via reddit http://ift.tt/2FAyNgt
Naked Security
Hospital MRI and CT scanners at risk of cyberattack
A recent study has concluded that Medical Imaging Devices such as CT and MRI scanners have a number of vulnerabilities that make them attractive targets for cyberattacks.
Week 5 in Information Security, 2017
http://ift.tt/2BMoOT3
Submitted February 02, 2018 at 03:05AM by undercomm
via reddit http://ift.tt/2DTDkhM
http://ift.tt/2BMoOT3
Submitted February 02, 2018 at 03:05AM by undercomm
via reddit http://ift.tt/2DTDkhM
Malgregator
InfoSec Week 5, 2018
A.P. Moller–Maersk Group, the world's largest container shipping company, reinstalled 45000 PCs and 4000 Servers to recover from the...
Adobe Security Advisory : A critical vulnerability in the Adobe flash player
http://ift.tt/2GEV0vi
Submitted February 02, 2018 at 03:53AM by haris3301
via reddit http://ift.tt/2BOx6K4
http://ift.tt/2GEV0vi
Submitted February 02, 2018 at 03:53AM by haris3301
via reddit http://ift.tt/2BOx6K4
Adobe
Adobe Security Advisory
Security Advisory for Flash Player APSA18-01
Any recommendations for outdoor security camera systems that don't rely on power supply?
No text found
Submitted February 02, 2018 at 04:56AM by jesuismich
via reddit http://ift.tt/2DUTvve
No text found
Submitted February 02, 2018 at 04:56AM by jesuismich
via reddit http://ift.tt/2DUTvve
reddit
Any recommendations for outdoor security camera... • r/security
2 points and 2 comments so far on reddit
Attacking the Nintendo 3DS Boot ROMs
http://ift.tt/2DWsBz5
Submitted February 02, 2018 at 07:33AM by Plailect
via reddit http://ift.tt/2BMxA3D
http://ift.tt/2DWsBz5
Submitted February 02, 2018 at 07:33AM by Plailect
via reddit http://ift.tt/2BMxA3D
What's the motivation for google to find zero days in windows and intel products?
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than Android. Why don't they make their OS at least as secured as Windows before hacking into other companies products?
Submitted February 02, 2018 at 08:00AM by kokobannana
via reddit http://ift.tt/2BOJdqq
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than Android. Why don't they make their OS at least as secured as Windows before hacking into other companies products?
Submitted February 02, 2018 at 08:00AM by kokobannana
via reddit http://ift.tt/2BOJdqq
reddit
What's the motivation for google to find zero days in... • r/security
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than...
Any research on this topic done since 2015?
Google Security published some research back in 23 July 2015 comparing the opinions of experts vs non-experts on the topic of "top online safety practices" for individuals. Has anybody, Google or otherwise, published any more research since then on the differences between expert/non-expert security practice opinions?original link: https://security.googleblog.com/2015/07/new-research-comparing-how-security.html
Submitted February 02, 2018 at 07:55AM by lurk6524
via reddit http://ift.tt/2nv8rWR
Google Security published some research back in 23 July 2015 comparing the opinions of experts vs non-experts on the topic of "top online safety practices" for individuals. Has anybody, Google or otherwise, published any more research since then on the differences between expert/non-expert security practice opinions?original link: https://security.googleblog.com/2015/07/new-research-comparing-how-security.html
Submitted February 02, 2018 at 07:55AM by lurk6524
via reddit http://ift.tt/2nv8rWR
Google Online Security Blog
New research: Comparing how security experts and non-experts stay safe online
Posted by Iulia Ion, Software Engineer - Rob Reeder, Research Scientist - Sunny Consolvo, User Experience Researcher Today, you can find...
Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution
http://ift.tt/2FFi0sT
Submitted February 02, 2018 at 01:48PM by 0x4ndr3
via reddit http://ift.tt/2EzcGIe
http://ift.tt/2FFi0sT
Submitted February 02, 2018 at 01:48PM by 0x4ndr3
via reddit http://ift.tt/2EzcGIe
Pentester's life
Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution
A crypter is code that decrypts a previously encrypted payload, in this case a shellcode, and will then execute it. To encrypt it, and not do it as most others have, I chose one of the algorithms t…
Sickle - A python based shellcode development tool
http://ift.tt/2Eb9Taj
Submitted February 02, 2018 at 01:17PM by wetw0rk_
via reddit http://ift.tt/2FFoTKB
http://ift.tt/2Eb9Taj
Submitted February 02, 2018 at 01:17PM by wetw0rk_
via reddit http://ift.tt/2FFoTKB
GitHub
wetw0rk/Sickle
Sickle - A tool I have found incredibly useful whenever creating custom shellcode.
Web Application Firewall (WAF) Evasion Techniques by @theMiddle
http://ift.tt/2CTgfYZ
Submitted February 02, 2018 at 01:01PM by 0x4a616e
via reddit http://ift.tt/2DXfeyM
http://ift.tt/2CTgfYZ
Submitted February 02, 2018 at 01:01PM by 0x4a616e
via reddit http://ift.tt/2DXfeyM
Medium
Web Application Firewall (WAF) Evasion Techniques
I can read your passwd file with: “/???/??t /???/??ss??”. Having fun with Sucuri WAF, ModSecurity, Paranoia Level and more…
Snow cannon vs. unique snowflakes — testing registration forms
http://ift.tt/2s14pKr
Submitted February 02, 2018 at 02:55PM by dn3t
via reddit http://ift.tt/2DVzMaF
http://ift.tt/2s14pKr
Submitted February 02, 2018 at 02:55PM by dn3t
via reddit http://ift.tt/2DVzMaF
California Predicted to lose $329-million to Cybercrime in 2018
http://ift.tt/2nueLOi
Submitted February 02, 2018 at 04:20PM by imr2017
via reddit http://ift.tt/2Eb7VGT
http://ift.tt/2nueLOi
Submitted February 02, 2018 at 04:20PM by imr2017
via reddit http://ift.tt/2Eb7VGT
Hashed Out by The SSL Store™
California Predicted to lose $329-million to Cybercrime in 2018
Do you live in a state that is likely to be victimized by cybercrime? We've got the top ten states most likely to be victimized. Does your state have anything to worry about?
Locksmith Derby Road Nottingham
http://ift.tt/2FBswRW
Submitted February 02, 2018 at 06:02PM by mara55676999143
via reddit http://ift.tt/2E6f1wt
http://ift.tt/2FBswRW
Submitted February 02, 2018 at 06:02PM by mara55676999143
via reddit http://ift.tt/2E6f1wt
Unnoscriptd
Locksmith Derby Road Nottingham
Detective Agency in Chandigarh an ultimatum to thrive the fact
http://ift.tt/2DW9kh7
Submitted February 02, 2018 at 06:22PM by venusdetectiveagency
via reddit http://ift.tt/2Ezp9vy
http://ift.tt/2DW9kh7
Submitted February 02, 2018 at 06:22PM by venusdetectiveagency
via reddit http://ift.tt/2Ezp9vy
Venusdetective
Divorce Provoke in Chandigarh: An ultimatum to thrive the factVenus Detective
A failure relationship on the verge of separation undergoes complicated, sensitive, and at times malignant depending on the nature of divorce investigation.
Preventing data leaks by stripping path information in HTTP Referrers
http://ift.tt/2Gxugg6
Submitted February 02, 2018 at 07:33PM by craigtaub
via reddit http://ift.tt/2GGy6nt
http://ift.tt/2Gxugg6
Submitted February 02, 2018 at 07:33PM by craigtaub
via reddit http://ift.tt/2GGy6nt
Mozilla Security Blog
Preventing data leaks by stripping path information in HTTP Referrers
Starting in version 59, Firefox Private Browsing will remove path data from Referrers sent to third parties. This will help prevent accidentally leaking data to third parties.
Security In 5: Episode 166 - Tools, Tips and Tricks - ProtonMail
http://ift.tt/2s25K3E
Submitted February 02, 2018 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2GFc30p
http://ift.tt/2s25K3E
Submitted February 02, 2018 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2GFc30p
Libsyn
Security In Five Podcast: Episode 166 - Tools, Tips and Tricks - ProtonMail
This week's tools, tips and tricks is about secure communication. Privacy is becoming a huge issue and people are starting to come around to the need for it. That's where ProtonMail comes into play. This episode goes into the details of what ProtonMail is…
Slides and full exploit for execve() vulnerability in WSL (CVE-2018-0743)
http://ift.tt/2ECET0R
Submitted February 02, 2018 at 08:47PM by 0xdea
via reddit http://ift.tt/2DWBDvM
http://ift.tt/2ECET0R
Submitted February 02, 2018 at 08:47PM by 0xdea
via reddit http://ift.tt/2DWBDvM
GitHub
saaramar/execve_exploit
Hardcore corruption of my execve() vulnerability in WSL - saaramar/execve_exploit
Adobe Flash 0-Day Vulnerability APSA18-01
http://ift.tt/2BQ59l0
Submitted February 02, 2018 at 08:36PM by Topcity36
via reddit http://ift.tt/2s0AK3Q
http://ift.tt/2BQ59l0
Submitted February 02, 2018 at 08:36PM by Topcity36
via reddit http://ift.tt/2s0AK3Q