List of JavaScript Antidebugging techniques (browsers)
http://ift.tt/2BNYgoY
Submitted February 14, 2018 at 12:48AM by gid0rah
via reddit http://ift.tt/2EpYlgf
http://ift.tt/2BNYgoY
Submitted February 14, 2018 at 12:48AM by gid0rah
via reddit http://ift.tt/2EpYlgf
x-c3ll.github.io
JavaScript AntiDebugging Tricks ::
DoomsDay Vault
DoomsDay Vault
List of antidebugging techniques applied to JavaScript (focused on browsers)
Loading "fileless" Shared Objects (memfd_create + dlopen)
http://ift.tt/2CioAU4
Submitted February 14, 2018 at 02:01AM by gid0rah
via reddit http://ift.tt/2F0iaf1
http://ift.tt/2CioAU4
Submitted February 14, 2018 at 02:01AM by gid0rah
via reddit http://ift.tt/2F0iaf1
x-c3ll.github.io
Loading "fileless" Shared Objects (memfd_create + dlopen) ::
DoomsDay Vault
DoomsDay Vault
An example of how to drop modules on a target using the syscall memfd_create
PLEASE HELP - FACEBOOK HACK
I logged into someone's Messenger app to access my FB account from their phone (iPhone X) and now I can't get them out of my account. I've tried changing my password, logging out of all devices, they're still able to log into my facebook from their messenger appPLEASE HELP
Submitted February 14, 2018 at 08:00AM by Lost_Boi7
via reddit http://ift.tt/2sszt5Q
I logged into someone's Messenger app to access my FB account from their phone (iPhone X) and now I can't get them out of my account. I've tried changing my password, logging out of all devices, they're still able to log into my facebook from their messenger appPLEASE HELP
Submitted February 14, 2018 at 08:00AM by Lost_Boi7
via reddit http://ift.tt/2sszt5Q
reddit
PLEASE HELP - FACEBOOK HACK • r/security
I logged into someone's Messenger app to access my FB account from their phone (iPhone X) and now I can't get them out of my account. I've tried...
Is this a non-virus website?
http://3hry.weebly.com/games.html (website) I came upon this when I was looking for games to play on my computer. I played two of the games, and experienced no problems.Is this a safe website?
Submitted February 14, 2018 at 07:14AM by masulsa
via reddit http://ift.tt/2EpPRpz
http://3hry.weebly.com/games.html (website) I came upon this when I was looking for games to play on my computer. I played two of the games, and experienced no problems.Is this a safe website?
Submitted February 14, 2018 at 07:14AM by masulsa
via reddit http://ift.tt/2EpPRpz
2HRY
Games
You can navigate our top games from each category from this page.
Zero-Day Vulnerability in Telegram
http://ift.tt/2EEWIys
Submitted February 14, 2018 at 05:59AM by thestarflyer
via reddit http://ift.tt/2EnroRx
http://ift.tt/2EEWIys
Submitted February 14, 2018 at 05:59AM by thestarflyer
via reddit http://ift.tt/2EnroRx
Securelist - Information about Viruses, Hackers and Spam
Zero-day vulnerability in Telegram
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.
Microsoft to bring Windows Defender APT to other Windows Versions.
http://ift.tt/2Bwny9Y
Submitted February 14, 2018 at 03:38PM by akapranos
via reddit http://ift.tt/2ECjyHd
http://ift.tt/2Bwny9Y
Submitted February 14, 2018 at 03:38PM by akapranos
via reddit http://ift.tt/2ECjyHd
easy InfoSec for all, for everyone
Windows Defender – ATP extended to other platforms: Business relevant.
Initially, Advanced Threat Protection was introduced only with systems shipped with the last Microsoft Operating System: Windows 10; but soon it will be included in previous versions as well, at le…
Cisco: Severe bug in our security appliances is now under attack | ZDNet
http://ift.tt/2smyILw
Submitted February 14, 2018 at 03:29PM by wlscr
via reddit http://ift.tt/2ED2f8V
http://ift.tt/2smyILw
Submitted February 14, 2018 at 03:29PM by wlscr
via reddit http://ift.tt/2ED2f8V
ZDNet
Cisco: Severe bug in our security appliances is now under attack | ZDNet
A proof-of-concept exploit for Cisco's 10-out-of-10 severity bug surfaces days after researcher details his attack.
best placement service for security guard in delhi ncr
http://ift.tt/2nXqqVY
Submitted February 14, 2018 at 04:07PM by irmaenterprises1
via reddit http://ift.tt/2o5IdK1
http://ift.tt/2nXqqVY
Submitted February 14, 2018 at 04:07PM by irmaenterprises1
via reddit http://ift.tt/2o5IdK1
irmaenterprises.co.in
Best Placement Service For Security Guard In Delhi NCR - +919953721776
Irma enterprises offering the best placement service for security guard in Delhi NCR, We are the security guard placement agency, we provides the all types of security guard in over the Delhi ncr India.
The SCRAM Authentication Protocol
http://ift.tt/2EqnHdS
Submitted February 14, 2018 at 06:49PM by cleeus
via reddit http://ift.tt/2o5m8Ly
http://ift.tt/2EqnHdS
Submitted February 14, 2018 at 06:49PM by cleeus
via reddit http://ift.tt/2o5m8Ly
Does anyone else find a public security issue on VirusTotal ironic?
http://ift.tt/2BY89AC
Submitted February 14, 2018 at 07:11PM by Gobo42
via reddit http://ift.tt/2Bs9uyy
http://ift.tt/2BY89AC
Submitted February 14, 2018 at 07:11PM by Gobo42
via reddit http://ift.tt/2Bs9uyy
Rogue AD Accounts
Hey guys - this topic has been on my mind as of late and I wanted to know if you could reccomend any software products that could scan for rogue AD accounts. Basically, we've had turnover in our IT dept and a former co-worker mentioned to me (after the fact) that he at some point created AD accounts with a decent amount of permissions. I want to a) possibly have reporting on thiis 2) possibly prevent this. We also have had a unique situation where someone else was let go and I want to ensure they dont have access. Any knowledge will be helpful. Thanks!
Submitted February 14, 2018 at 06:50PM by gabesans
via reddit http://ift.tt/2C0LbbO
Hey guys - this topic has been on my mind as of late and I wanted to know if you could reccomend any software products that could scan for rogue AD accounts. Basically, we've had turnover in our IT dept and a former co-worker mentioned to me (after the fact) that he at some point created AD accounts with a decent amount of permissions. I want to a) possibly have reporting on thiis 2) possibly prevent this. We also have had a unique situation where someone else was let go and I want to ensure they dont have access. Any knowledge will be helpful. Thanks!
Submitted February 14, 2018 at 06:50PM by gabesans
via reddit http://ift.tt/2C0LbbO
reddit
Rogue AD Accounts • r/security
Hey guys - this topic has been on my mind as of late and I wanted to know if you could reccomend any software products that could scan for rogue...
Cybersecurity & Technology Risk in Healthcare
http://ift.tt/2svtH3y
Submitted February 14, 2018 at 06:34PM by Uminekoshi
via reddit http://ift.tt/2BY1YMG
http://ift.tt/2svtH3y
Submitted February 14, 2018 at 06:34PM by Uminekoshi
via reddit http://ift.tt/2BY1YMG
SoundCloud
Episode 6 - Cybersecurity & Technology Risk in Healthcare
In this CyberTangent episode, we are joined by Tiffany Rosik, a Healthcare Business and Operations Consultant. Our podcast host is Landon Johnson.
Today's topic is "Cybersecurity & Technology Risk in
Today's topic is "Cybersecurity & Technology Risk in
DoubleDoor IoT Botnet Abuses Two Bugs to Bypass Firewalls, Modems
http://ift.tt/2F08RMd
Submitted February 14, 2018 at 06:24PM by Iot_Security
via reddit http://ift.tt/2BwICx4
http://ift.tt/2F08RMd
Submitted February 14, 2018 at 06:24PM by Iot_Security
via reddit http://ift.tt/2BwICx4
The State of Security
DoubleDoor IoT Botnet Abuses Two Bugs to Bypass Firewalls, Modems
The DoubleDoor Internet of Things (IoT) botnet circumvents firewall protection and other security measures by abusing two vulnerabilities.
Water Utility Infected by Cryptocurrency Mining Software
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
Water Utility Infected by Cryptocurrency Mining Software
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
reddit
Water Utility Infected by Cryptocurrency Mining Software • r/security
2 points and 0 comments so far on reddit
Telegram zero-day exploit is a warning
http://ift.tt/2o5H5WJ
Submitted February 14, 2018 at 07:56PM by wlscr
via reddit http://ift.tt/2EuF8Or
http://ift.tt/2o5H5WJ
Submitted February 14, 2018 at 07:56PM by wlscr
via reddit http://ift.tt/2EuF8Or
Roses are red, Kaspersky is blue: 'That ban's unconstitutional!' Boo hoo hoo
http://ift.tt/2Bv7bLd
Submitted February 14, 2018 at 07:55PM by wlscr
via reddit http://ift.tt/2BY5Kpo
http://ift.tt/2Bv7bLd
Submitted February 14, 2018 at 07:55PM by wlscr
via reddit http://ift.tt/2BY5Kpo
www.theregister.co.uk
Roses are red, Kaspersky is blue: 'That ban's unconstitutional!' Boo hoo hoo
New front opens in Russian firm's legal fight with US gov
Security In 5: Episode 174 - How To Create An Incident Response Plan In A Few Easy Steps
http://ift.tt/2BtR9AV
Submitted February 14, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2C2zIZs
http://ift.tt/2BtR9AV
Submitted February 14, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2C2zIZs
Libsyn
Security In Five Podcast: Episode 174 - How To Create An Incident Response Plan In A Few Easy Steps
When you have an incident in your business, from a virus infection or massive outage, do you and your business know how to react? Incident response plans are an important part of an effective security program. This episode lays out some simple steps to begin…
Why the hack-back is still the worst idea in cybersecurity
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
TechBeacon
Why the hack-back is still the worst idea in cybersecurity
Too much can go wrong when private firms have permission to pursue attackers into other companies' networks, security experts say.
Using Google Analytics for data extraction - How to Bypassing CSP with Google Analytics
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
reddit
Using Google Analytics for data extraction - How to... • r/security
1 points and 0 comments so far on reddit
Forensic Readiness: Setting the Foundation For Cybersecurity
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
CrossRealms
Forensic Readiness: Setting the Foundation For Cybersecurity
Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient.