Elk + Osquery + Kolide Fleet = Love
http://ift.tt/2EA37rm
Submitted February 17, 2018 at 05:16AM by ok_bye_now_
via reddit http://ift.tt/2BxL4n7
http://ift.tt/2EA37rm
Submitted February 17, 2018 at 05:16AM by ok_bye_now_
via reddit http://ift.tt/2BxL4n7
JP
Elk + Osquery + Kolide Fleet = Love
Threat hunting on Linux and Mac has probably never been easier. With the combination of these tools, we can query all of our hosts on demand for IOC’s, schedule queries to run on an automated…
Do you need an IPS Security?
http://ift.tt/2EIX7jF
Submitted February 17, 2018 at 04:50AM by accendadmin
via reddit http://ift.tt/2EzvRAU
http://ift.tt/2EIX7jF
Submitted February 17, 2018 at 04:50AM by accendadmin
via reddit http://ift.tt/2EzvRAU
Accend Networks
Do you need IPS Security In Addition to a Firewall?
Are you debating whether you need an IPS Security on your network in additional to your traditional firewall? This article helps to determine that.
Exfiltrating form data via CSS injection
http://ift.tt/2BN7ou5
Submitted February 17, 2018 at 12:54PM by xowx
via reddit http://ift.tt/2EyBlMf
http://ift.tt/2BN7ou5
Submitted February 17, 2018 at 12:54PM by xowx
via reddit http://ift.tt/2EyBlMf
Mike Gualtieri :: Home
Stealing Data With CSS: Attack and Defense
A method is detailed, dubbed CSS Exfil, which can be used to steal targeted data using Cascading Style Sheets (CSS) as an attack vector.
Detecting Lateral Movements in Windows Infrastructure - detailed whitepaper from CERT-EU
http://ift.tt/2pn9Myo
Submitted February 17, 2018 at 04:50PM by digicat
via reddit http://ift.tt/2CoZXF3
http://ift.tt/2pn9Myo
Submitted February 17, 2018 at 04:50PM by digicat
via reddit http://ift.tt/2CoZXF3
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols
http://ift.tt/2ss7NxY
Submitted February 17, 2018 at 09:08PM by domysee
via reddit http://ift.tt/2Hl4Sup
http://ift.tt/2ss7NxY
Submitted February 17, 2018 at 09:08PM by domysee
via reddit http://ift.tt/2Hl4Sup
Think Bitcoin, but instead of mining, a global community of anti-malware experts compete to best detect today’s threats
https://polyswarm.io/
Submitted February 17, 2018 at 10:27PM by Dianailler
via reddit http://ift.tt/2Gn5deP
https://polyswarm.io/
Submitted February 17, 2018 at 10:27PM by Dianailler
via reddit http://ift.tt/2Gn5deP
polyswarm.io
PolySwarm - Crowdsourced threat detection
PolySwarm is a crowdsourced threat detection marketplace where security experts & AV companies compete to protect you.
The Cost of Malicious Cyber Activity to the U.S. Economy, The Council of Economic Advisers February 2018
http://ift.tt/2HnfqsY
Submitted February 18, 2018 at 12:32AM by newsalert_88
via reddit http://ift.tt/2FbbTNU
http://ift.tt/2HnfqsY
Submitted February 18, 2018 at 12:32AM by newsalert_88
via reddit http://ift.tt/2FbbTNU
What's a good secure OS for a generally non-technical user base?
I'm configuring some computers that will be used by residents at multiple domestic violence shelters and safe houses. They're mostly Dell Optiplex 755's.What's a good OS for that environment? It has to be easy to maintain, but also easy to use for an audience that is generally used to windows. They'll mostly use it for basic functions like accessing web-based email, job-hunting, resumes, etc.Ideally, it would also be easy for the shelter / safe house staff to wipe and restore it as needed.I was thinking about setting up a persistent Tails instance, largely because we give people live USBs with Tails installed while they're planning their escape. If the shelters were using Tails as well, it would be easy for them to use the chat function during the planning phase.On the other hand, Qubes OS seems built for this sort of thing, but I'm not sure how user-friendly it is.Any recommendations?
Submitted February 18, 2018 at 01:51AM by CDSEChris
via reddit http://ift.tt/2HqiuVo
I'm configuring some computers that will be used by residents at multiple domestic violence shelters and safe houses. They're mostly Dell Optiplex 755's.What's a good OS for that environment? It has to be easy to maintain, but also easy to use for an audience that is generally used to windows. They'll mostly use it for basic functions like accessing web-based email, job-hunting, resumes, etc.Ideally, it would also be easy for the shelter / safe house staff to wipe and restore it as needed.I was thinking about setting up a persistent Tails instance, largely because we give people live USBs with Tails installed while they're planning their escape. If the shelters were using Tails as well, it would be easy for them to use the chat function during the planning phase.On the other hand, Qubes OS seems built for this sort of thing, but I'm not sure how user-friendly it is.Any recommendations?
Submitted February 18, 2018 at 01:51AM by CDSEChris
via reddit http://ift.tt/2HqiuVo
reddit
What's a good secure OS for a generally non-technical... • r/security
I'm configuring some computers that will be used by residents at multiple domestic violence shelters and safe houses. They're mostly Dell Optiplex...
Telugu letter is crashing iMessage on iPhone X
http://ift.tt/2sCVjnj
Submitted February 18, 2018 at 03:21AM by wazdesign
via reddit http://ift.tt/2C758xG
http://ift.tt/2sCVjnj
Submitted February 18, 2018 at 03:21AM by wazdesign
via reddit http://ift.tt/2C758xG
mytechnews.net
Telugu letter is crashing iMessage on iPhone X | My Blog
McAfee discovers new Lazarus Group malware for possible theft of bitcoins
http://ift.tt/2EKlwVY
Submitted February 18, 2018 at 04:01AM by 33alicia33
via reddit http://ift.tt/2BzT7Qq
http://ift.tt/2EKlwVY
Submitted February 18, 2018 at 04:01AM by 33alicia33
via reddit http://ift.tt/2BzT7Qq
reddit
McAfee discovers new Lazarus Group malware for... • r/security
2 points and 0 comments so far on reddit
Free Ethical Hacking Course - Practice 4 - Enumeration of Systems
http://ift.tt/2HrOwjJ
Submitted February 18, 2018 at 05:40AM by gburu
via reddit http://ift.tt/2Go4EBq
http://ift.tt/2HrOwjJ
Submitted February 18, 2018 at 05:40AM by gburu
via reddit http://ift.tt/2Go4EBq
en.gburu.net
Ethical Hacking Course - Practice 4!
In the fourth free computer security course, we will search for information about Windows and Linux.
Think Bitcoin, but instead of mining, a global community of anti-malware experts compete to best detect today’s threats.
https://polyswarm.io/
Submitted February 18, 2018 at 08:08AM by Michellehite
via reddit http://ift.tt/2BCJDEe
https://polyswarm.io/
Submitted February 18, 2018 at 08:08AM by Michellehite
via reddit http://ift.tt/2BCJDEe
polyswarm.io
PolySwarm - Crowdsourced threat detection
PolySwarm is a crowdsourced threat detection marketplace where security experts & AV companies compete to protect you.
Multiple vulnerabilities in RubyGems fixed
http://ift.tt/2EOMdc3
Submitted February 18, 2018 at 09:09AM by numinit
via reddit http://ift.tt/2FaoS2g
http://ift.tt/2EOMdc3
Submitted February 18, 2018 at 09:09AM by numinit
via reddit http://ift.tt/2FaoS2g
Google Discloses Microsoft Edge Security Feature Bypass
http://ift.tt/2Bym1QL
Submitted February 18, 2018 at 10:52AM by iYassr
via reddit http://ift.tt/2ofuNLj
http://ift.tt/2Bym1QL
Submitted February 18, 2018 at 10:52AM by iYassr
via reddit http://ift.tt/2ofuNLj
Does anyone use these apps and are they trustworthy?
https://www.secuso.informatik.tu-darmstadt.de/en/secuso/research/results/privacy-friendly-apps/Specifically the password generator, but I have used a few others and I like them. It all looks legitimate to me and they're open source, but I'm not skilled enough to verify the code myself. So I'm just wondering if anyone else uses these and what are your thoughts?I use LastPass for all my passwords, but I am considering using the password generator app from this website for some of my more important accounts. I'd create a master password, save it on LastPass, and then use that password to generate my account passwords via the password generator app. It would be a little more work, but sometimes I am not sure having all my passwords on LastPass is the best idea, at least this way if my LastPass account was compromised I would still be the only one who could generate the actual account passwords. Thoughts?
Submitted February 18, 2018 at 12:22PM by Nabatsu
via reddit http://ift.tt/2oeZ8K3
https://www.secuso.informatik.tu-darmstadt.de/en/secuso/research/results/privacy-friendly-apps/Specifically the password generator, but I have used a few others and I like them. It all looks legitimate to me and they're open source, but I'm not skilled enough to verify the code myself. So I'm just wondering if anyone else uses these and what are your thoughts?I use LastPass for all my passwords, but I am considering using the password generator app from this website for some of my more important accounts. I'd create a master password, save it on LastPass, and then use that password to generate my account passwords via the password generator app. It would be a little more work, but sometimes I am not sure having all my passwords on LastPass is the best idea, at least this way if my LastPass account was compromised I would still be the only one who could generate the actual account passwords. Thoughts?
Submitted February 18, 2018 at 12:22PM by Nabatsu
via reddit http://ift.tt/2oeZ8K3
www.secuso.informatik.tu-darmstadt.de
Privacy Friendly Apps
#Information about the Technische Universität Darmstadt
REVEALED: New era of state sponsored HACKING can turn oil rigs into 'BOMB that can KILL'
http://ift.tt/2FdiHL0
Submitted February 18, 2018 at 01:53PM by Bastet1
via reddit http://ift.tt/2EAxjCW
http://ift.tt/2FdiHL0
Submitted February 18, 2018 at 01:53PM by Bastet1
via reddit http://ift.tt/2EAxjCW
Express.co.uk
REVEALED: New era of state sponsored HACKING can turn oil rigs into 'BOMB that can KILL'
EXPERTS fear that hackers who seized control of a Saudi Arabian petrochemical site using malicious software labelled as 'Triton' and 'Trisis' could be being used by Iran, Russia and North Korea, marking a new era of cybercrime.
The Inside Story Behind MS08-067 (2015)
http://ift.tt/2bQFsnY
Submitted February 18, 2018 at 02:16PM by 746865626c617a
via reddit http://ift.tt/2oawzOw
http://ift.tt/2bQFsnY
Submitted February 18, 2018 at 02:16PM by 746865626c617a
via reddit http://ift.tt/2oawzOw
reddit
The Inside Story Behind MS08-067 (2015) • r/netsec
2 points and 0 comments so far on reddit
The Mirai Botnet Is Attacking Again...
http://ift.tt/2BvDrh0
Submitted February 18, 2018 at 02:53PM by Iot_Security
via reddit http://ift.tt/2EKOUeT
http://ift.tt/2BvDrh0
Submitted February 18, 2018 at 02:53PM by Iot_Security
via reddit http://ift.tt/2EKOUeT
Dark Reading
The Mirai Botnet Is Attacking Again... - Dark Reading
And the spinoff bots - and all their command and control hostnames buried in the morass of digital data - are hilarious.
Bypasss User-Mode Hooks
http://ift.tt/2Ez9wmO
Submitted February 18, 2018 at 04:48PM by khasaia
via reddit http://ift.tt/2o6P1HY
http://ift.tt/2Ez9wmO
Submitted February 18, 2018 at 04:48PM by khasaia
via reddit http://ift.tt/2o6P1HY
secrary[dot]com
Bypasss User-Mode Hooks
This blog is about malware analysis and reverse engineering. But Does it matter?
The Top Hackers of All Time - Anonywise
http://ift.tt/2o8b5ll
Submitted February 18, 2018 at 09:00PM by anonywise
via reddit http://ift.tt/2of9ee0
http://ift.tt/2o8b5ll
Submitted February 18, 2018 at 09:00PM by anonywise
via reddit http://ift.tt/2of9ee0
Anonywise
The Top Hackers of All Time - Anonywise
Quick Read: Top Hackers: Kevin Mitnick Adrian Lamo Albert Gonzalez Matthew Bevan and Richard Pryce Anonymous In today’s Digital World the growth of technology is unstoppable, as it grows the vulnerabilities are also being discovered which are being exploited…
Sydney man has Opal card implanted into hand to make catching public transport easier
http://ift.tt/2ubuJ0v
Submitted February 18, 2018 at 08:43PM by Iot_Security
via reddit http://ift.tt/2EzXwp6
http://ift.tt/2ubuJ0v
Submitted February 18, 2018 at 08:43PM by Iot_Security
via reddit http://ift.tt/2EzXwp6
ABC News
Sydney man has Opal card implanted into hand to make catching public transport easier
Would you be more likely to catch public transport if your Opal card was under your very own skin? Well, one Sydney man has done just this and now taps on with his hand.