Nissan Canada Finance Data Breach - Is this real?
Lot of customers getting letters in the mail regarding a data breach of customer data including credit scores, personal information.
Submitted February 09, 2018 at 10:07AM by CC4Red
via reddit http://ift.tt/2C5OAlz
Lot of customers getting letters in the mail regarding a data breach of customer data including credit scores, personal information.
Submitted February 09, 2018 at 10:07AM by CC4Red
via reddit http://ift.tt/2C5OAlz
reddit
Nissan Canada Finance Data Breach - Is this real? • r/security
Lot of customers getting letters in the mail regarding a data breach of customer data including credit scores, personal information.
Phishing catcher using Certstream
http://ift.tt/2hOTGLt
Submitted February 09, 2018 at 01:06PM by digicat
via reddit http://ift.tt/2Ef50hm
http://ift.tt/2hOTGLt
Submitted February 09, 2018 at 01:06PM by digicat
via reddit http://ift.tt/2Ef50hm
Just another infosec blog type of thing
Catching phishing before they catch you
Paypal phishing, paypal phishing everywhere
Cryptocurrency marketplaces hit by serious cyber attacks
http://ift.tt/2nW5zkS
Submitted February 09, 2018 at 05:11PM by imr2017
via reddit http://ift.tt/2so4UhY
http://ift.tt/2nW5zkS
Submitted February 09, 2018 at 05:11PM by imr2017
via reddit http://ift.tt/2so4UhY
http://www.v3.co.uk
Cryptocurrency marketplaces hit by serious cyber attacks | V3
Hackers are using bots and location spoofing tools to target crypto exchanges
Podcast: A Look Back at Cybersecurity with Graham Cluley
http://ift.tt/2EfoEJQ
Submitted February 09, 2018 at 06:22PM by Uminekoshi
via reddit http://ift.tt/2EgfSeU
http://ift.tt/2EfoEJQ
Submitted February 09, 2018 at 06:22PM by Uminekoshi
via reddit http://ift.tt/2EgfSeU
SoundCloud
Episode 5 - A Look Back at Cybersecurity with Graham Cluley
In this CyberTangent episode, we are joined by none other than Graham Cluley! Our podcast host is Landon Johnson.
Today's topic is "A Look Back at Cybersecurity with Graham Cluley." Let's jump in!
L
Today's topic is "A Look Back at Cybersecurity with Graham Cluley." Let's jump in!
L
Security In 5: Episode 171 - Tools, Tips and Tricks - bWapp, a very buggy web application
http://ift.tt/2H3jUVC
Submitted February 09, 2018 at 07:37PM by BinaryBlog
via reddit http://ift.tt/2G1i1aq
http://ift.tt/2H3jUVC
Submitted February 09, 2018 at 07:37PM by BinaryBlog
via reddit http://ift.tt/2G1i1aq
Libsyn
Security In Five Podcast: Episode 171 - Tools, Tips and Tricks - bWapp, a very buggy web application
This week's tools, tips and tricks episode talks about bWapp, a very buggy web application. bWapp is a fully functional web application you can download and install locally for security research, penetration testing, education and remediation exercises. If…
GDPR: how does it relate to Cybersecurity?
http://ift.tt/2H1quMh
Submitted February 09, 2018 at 07:05PM by akapranos
via reddit http://ift.tt/2FYELIs
http://ift.tt/2H1quMh
Submitted February 09, 2018 at 07:05PM by akapranos
via reddit http://ift.tt/2FYELIs
easy InfoSec for all, for everyone
GDPR: how does it relate to Cybersecurity?
What is the General Data Protection Regulation (GDPR)? It’s a law, a regulation that is relevant for those that market or have processes involving European Union (28 countries) data from end users,…
Spectre Cascade – there may be no safe timer mitigation
http://ift.tt/2Ede6XO
Submitted February 09, 2018 at 08:10PM by imr2017
via reddit http://ift.tt/2EQtiLq
http://ift.tt/2Ede6XO
Submitted February 09, 2018 at 08:10PM by imr2017
via reddit http://ift.tt/2EQtiLq
Does anyone know if IBM Rational Developer for i is TLS 1.2 compliant?
Working on a project for work, can't find any documentation about this. Does anyone know?
Submitted February 09, 2018 at 08:03PM by violentcactus
via reddit http://ift.tt/2EhpoKF
Working on a project for work, can't find any documentation about this. Does anyone know?
Submitted February 09, 2018 at 08:03PM by violentcactus
via reddit http://ift.tt/2EhpoKF
reddit
Does anyone know if IBM Rational Developer for i is... • r/security
Working on a project for work, can't find any documentation about this. Does anyone know?
Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878
http://ift.tt/2EcZdZq
Submitted February 09, 2018 at 08:01PM by dmchell
via reddit http://ift.tt/2sjXZGu
http://ift.tt/2EcZdZq
Submitted February 09, 2018 at 08:01PM by dmchell
via reddit http://ift.tt/2sjXZGu
reddit
Adobe Flash Exploitation, Then and Now: From... • r/netsec
17 points and 1 comments so far on reddit
Analyzing CVE-2018-6376 - Joomla!, Second Order SQL Injection
http://ift.tt/2EeQ7LT
Submitted February 09, 2018 at 07:03PM by anantshri
via reddit http://ift.tt/2siTaNn
http://ift.tt/2EeQ7LT
Submitted February 09, 2018 at 07:03PM by anantshri
via reddit http://ift.tt/2siTaNn
NotSoSecure
Analyzing CVE-2018-6376 - Joomla!, Second Order SQL Injection
We analyze the second order SQL Injection CVE-2018-6376 identified in Joomla!. We then attempt to exploit and automated the data extraction process.
Replicator - A Burp extension to help developers replicate pen test findings
http://ift.tt/2Eru7gf
Submitted February 09, 2018 at 09:47PM by netsecwarrior
via reddit http://ift.tt/2ERvKBs
http://ift.tt/2Eru7gf
Submitted February 09, 2018 at 09:47PM by netsecwarrior
via reddit http://ift.tt/2ERvKBs
portswigger.net
Replicator
Helps developers replicate findings discovered in pen tests.
osueta - exploit the OpenSSH User Enumeration Timing Attack
http://ift.tt/2H4J1Y3
Submitted February 09, 2018 at 10:14PM by howucan
via reddit http://ift.tt/2nMahTh
http://ift.tt/2H4J1Y3
Submitted February 09, 2018 at 10:14PM by howucan
via reddit http://ift.tt/2nMahTh
Week 6 in Information Security, 2018
http://ift.tt/2nOLmhS
Submitted February 09, 2018 at 11:58PM by undercomm
via reddit http://ift.tt/2nUm1Co
http://ift.tt/2nOLmhS
Submitted February 09, 2018 at 11:58PM by undercomm
via reddit http://ift.tt/2nUm1Co
Malgregator
InfoSec Week 6, 2018
A buffer overflow vulnerability in older Starcraft version enabled modders to create new maps, so Blizzard tasked reverse engineer to...
Advisories and Exploits - Shimo and PureVPN for macOS
http://ift.tt/2Bkjl9y
Submitted February 10, 2018 at 12:29AM by rotlogix_
via reddit http://ift.tt/2BNhdIg
http://ift.tt/2Bkjl9y
Submitted February 10, 2018 at 12:29AM by rotlogix_
via reddit http://ift.tt/2BNhdIg
GitHub
VerSprite/research
research - VerSprite Security Research
WEBINAR | HOW TO BUILD YOUR SECURITY AWARENESS PROGRAM PLAN
http://ift.tt/2Efte6V
Submitted February 10, 2018 at 02:19AM by Inkyandthebrain
via reddit http://ift.tt/2ETc93W
http://ift.tt/2Efte6V
Submitted February 10, 2018 at 02:19AM by Inkyandthebrain
via reddit http://ift.tt/2ETc93W
Habitu8
WEBINAR | How to build your security awareness program plan
Watch now to hear Jason show you how to build your security awareness program plan! You can even follow along with our free program plan template on our Strategy Guide Page.
Lesson almost learned: how not to use a driver to execute code with kernel privileges
http://ift.tt/2sgr45x
Submitted February 10, 2018 at 02:15AM by DerBootsMann
via reddit http://ift.tt/2EgO2uK
http://ift.tt/2sgr45x
Submitted February 10, 2018 at 02:15AM by DerBootsMann
via reddit http://ift.tt/2EgO2uK
Securelist - Information about Viruses, Hackers and Spam
Lesson almost learned: how not to use a driver to execute code with kernel privileges
At first, it looked like we’d found a zero-day local privilege escalation vulnerability for Windows, but the sample that was triggering Exploit Checker events turned out to be the clean signed executable file, part of the multiplayer online game.
Monero mining botnet operating on Nanopool uses its infected machines' IP addresses as worker names. : Monero
http://ift.tt/2Eco23L
Submitted February 10, 2018 at 02:49AM by DeleteMyOldAccount
via reddit http://ift.tt/2EfWEC7
http://ift.tt/2Eco23L
Submitted February 10, 2018 at 02:49AM by DeleteMyOldAccount
via reddit http://ift.tt/2EfWEC7
xmr.nanopool.org
Nanopool | Monero | Account
Account statistics. Check your hashrate, balance, payments.
LibreOffice Remote Arbitrary File Disclosure Vulnerability
http://ift.tt/2nSiQvN
Submitted February 10, 2018 at 02:21AM by boramalper
via reddit http://ift.tt/2G0owud
http://ift.tt/2nSiQvN
Submitted February 10, 2018 at 02:21AM by boramalper
via reddit http://ift.tt/2G0owud
GitHub
jollheef/libreoffice-remote-arbitrary-file-disclosure
libreoffice-remote-arbitrary-file-disclosure - Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability
GitHub Shouldn't Allow Username Reuse
http://ift.tt/2EytZLR
Submitted February 10, 2018 at 04:25AM by speckz
via reddit http://ift.tt/2Eg0cZ9
http://ift.tt/2EytZLR
Submitted February 10, 2018 at 04:25AM by speckz
via reddit http://ift.tt/2Eg0cZ9
Donat Studios
Github's Total Security Facepalm
Free Ethical Hacking Course - Practice 3 - Network Scanning
http://ift.tt/2C9ufvt
Submitted February 10, 2018 at 04:18AM by gburu
via reddit http://ift.tt/2EeDxw5
http://ift.tt/2C9ufvt
Submitted February 10, 2018 at 04:18AM by gburu
via reddit http://ift.tt/2EeDxw5
en.gburu.net
Free Ethical Hacking Course - Practice 3 - Network Scanning - en.gburu.net
In the third free ethical hacking course, we will scan a network looking for open ports and vulnerabilities in them.