Bombing the Cloud: Why Amazon, Microsoft, and Google Cloud Should Be Classified as Critical Infrastructure
http://ift.tt/2FfHVIo
Submitted February 20, 2018 at 11:08PM by DEAF-LAMONT
via reddit http://ift.tt/2BFhoV6
http://ift.tt/2FfHVIo
Submitted February 20, 2018 at 11:08PM by DEAF-LAMONT
via reddit http://ift.tt/2BFhoV6
Inc.com
Bombing the Cloud: Why an Attack on Amazon, Microsoft, or Google Cloud Could Lead to 'Cybergeddon'
A study projects $15 billion in economic damage to U.S. companies triggered by a three-day cloud computing outage
Identify vulnerability in the code
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how exactly it is vulnerable? Can someone explain it to me pls?#include <stdio.h>int main(int argc, char * argv[]) {
Submitted February 20, 2018 at 11:28PM by Brain2life
via reddit http://ift.tt/2okS7HF
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how exactly it is vulnerable? Can someone explain it to me pls?#include <stdio.h>int main(int argc, char * argv[]) {
char user_input[64]; fgets(user_input, 64, stdin); printf(user_input); return 0;}
Submitted February 20, 2018 at 11:28PM by Brain2life
via reddit http://ift.tt/2okS7HF
reddit
Identify vulnerability in the code • r/security
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how...
Petya Ransomware: What is it and How does it work?
http://ift.tt/2odszNd
Submitted February 20, 2018 at 11:17PM by anonywise
via reddit http://ift.tt/2ojew84
http://ift.tt/2odszNd
Submitted February 20, 2018 at 11:17PM by anonywise
via reddit http://ift.tt/2ojew84
Anonywise
Petya Ransomware: What is it and How does it work? - Anonywise
In short: Petya, a malware belonging to the encrypting ransomware family that attacked thousands of computers worldwide in 2016 and 2017. The Petya ransomware aims to attack Microsoft Windows-based systems and it encrypts the hard drive. It afterward demands…
utorrent: various JSON-RPC issues resulting in remote code execution, information disclosure, etc.
http://ift.tt/2Hy1LQa
Submitted February 20, 2018 at 11:57PM by weirdasianfaces
via reddit http://ift.tt/2CamLgo
http://ift.tt/2Hy1LQa
Submitted February 20, 2018 at 11:57PM by weirdasianfaces
via reddit http://ift.tt/2CamLgo
reddit
utorrent: various JSON-RPC issues resulting in remote... • r/netsec
19 points and 1 comments so far on reddit
New Research: Crypto-mining Drives Almost 90% of All Remote Code Execution Attacks – Blog | Imperva
http://ift.tt/2GuuKCT
Submitted February 21, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2ERG7Yn
http://ift.tt/2GuuKCT
Submitted February 21, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2ERG7Yn
Blog | Imperva
New Research: Crypto-mining Drives Almost 90% of All Remote Code Execution Attacks – Blog | Imperva
It’s early in 2018 and we have already witnessed one of the top contenders in this year’s web application attacks. Continuing the trend from the last months of 2017, crypto-mining malware is quickly becoming attackers’ favorite modus operandi. In December…
Convergence of Messaging, Payments and Cryptocurrency
http://ift.tt/2Filqmb
Submitted February 21, 2018 at 01:18AM by Mi3Security
via reddit http://ift.tt/2Gw1Pya
http://ift.tt/2Filqmb
Submitted February 21, 2018 at 01:18AM by Mi3Security
via reddit http://ift.tt/2Gw1Pya
Mi3 Security
Convergence of Messaging, Payments and Cryptocurrency
The growth of mobility has seen an explosion of messaging applications. Instant messaging has been the “killer app” for smartphones. As messaging providers look to enhance their product offerings beyond sending text and emojis, payments and money transfer…
Smart home devices can be risky, but not for the reasons you think Siri vs Alexa
https://youtu.be/f_1dhKsELzs
Submitted February 21, 2018 at 03:27AM by Iot_Security
via reddit http://ift.tt/2CxqeRP
https://youtu.be/f_1dhKsELzs
Submitted February 21, 2018 at 03:27AM by Iot_Security
via reddit http://ift.tt/2CxqeRP
YouTube
Siri vs Alexa
I'm on cameo if you want some sort of personalised message from a man with zero integrity.
www.cameo.com/jamesveitch
James's Tech Reviews! Episode 1
With thanks to www.upclosefilms.com
www.cameo.com/jamesveitch
James's Tech Reviews! Episode 1
With thanks to www.upclosefilms.com
Machine Learning Use Cases for Security Orchestration and Automation
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
Demisto
Demisto’s Top Machine Learning Use Cases – Part 1
Learn how Demisto's machine learning helps enhance responder productivity, accelerate workflow creation, and enable leaner, more efficient security operations.
I'm looking to set up an attack/defense capture-the-flag competition. Do you guys know of any open-source systems out there that I could use for that?
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
reddit
I'm looking to set up an attack/defense... • r/security
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different...
Tesla's Amazon Cloud Account Hacked to Mine Cryptocurrency
http://ift.tt/2EGcHxa
Submitted February 21, 2018 at 03:39AM by Iot_Security
via reddit http://ift.tt/2GywY4d
http://ift.tt/2EGcHxa
Submitted February 21, 2018 at 03:39AM by Iot_Security
via reddit http://ift.tt/2GywY4d
Fortune
Tesla Hackers Hijacked Amazon Cloud Account to Mine Cryptocurrency
Security researchers said Tesla paid them $3,3117 for reporting the data breach.
Your opinion on anti malware & virus protection
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be running something different or better for every day surfing and simple stuff?
Submitted February 21, 2018 at 06:28AM by chull2058
via reddit http://ift.tt/2ERjh3j
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be running something different or better for every day surfing and simple stuff?
Submitted February 21, 2018 at 06:28AM by chull2058
via reddit http://ift.tt/2ERjh3j
reddit
Your opinion on anti malware & virus protection • r/security
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims' Systems
http://ift.tt/2GG6oaj
Submitted February 21, 2018 at 06:07AM by chull2058
via reddit http://ift.tt/2GxNlxN
http://ift.tt/2GG6oaj
Submitted February 21, 2018 at 06:07AM by chull2058
via reddit http://ift.tt/2GxNlxN
McAfee Blogs
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims' Systems
McAfee ATR recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics.
Tesla cloud systems exploited by hackers to mine cryptocurrency | ZDNet
http://ift.tt/2EVFopm
Submitted February 21, 2018 at 06:02AM by chull2058
via reddit http://ift.tt/2HwJG4U
http://ift.tt/2EVFopm
Submitted February 21, 2018 at 06:02AM by chull2058
via reddit http://ift.tt/2HwJG4U
ZDNet
Tesla cloud systems exploited by hackers to mine cryptocurrency
Updated: Researchers have discovered that Tesla's AWS cloud systems were compromised for the purpose of cryptojacking.
Polish DeWalt website provides no TLS, creating account is mandatory for extended warranty
https://twitter.com/radoslawc/status/960880267169812480
Submitted February 21, 2018 at 05:17AM by radoslawc
via reddit http://ift.tt/2Fi8DjO
https://twitter.com/radoslawc/status/960880267169812480
Submitted February 21, 2018 at 05:17AM by radoslawc
via reddit http://ift.tt/2Fi8DjO
Twitter
radoslawc
@DEWALTtough No SSL/TLS on polish site, how do I register my tool without sending my personal data over unencrypted connection?
Breaking into iOS 11 : Jailbreak Methods Discussion and Links to Tools
http://ift.tt/2oe5Lx3
Submitted February 21, 2018 at 07:36AM by TechLord2
via reddit http://ift.tt/2GsDbOY
http://ift.tt/2oe5Lx3
Submitted February 21, 2018 at 07:36AM by TechLord2
via reddit http://ift.tt/2GsDbOY
reddit
Breaking into iOS 11 : Jailbreak Methods Discussion and... • r/netsec
1 points and 1 comments so far on reddit
MADLIRA : Malware detection using learning and information retrieval for Android
http://ift.tt/2EVX8Rm
Submitted February 21, 2018 at 06:35AM by TechLord2
via reddit http://ift.tt/2BGJS0T
http://ift.tt/2EVX8Rm
Submitted February 21, 2018 at 06:35AM by TechLord2
via reddit http://ift.tt/2BGJS0T
GitHub
dkhuuthe/MADLIRA
MADLIRA - Malware detection using learning and information retrieval for Android
A Static Binary Rewriter that does not use heuristics and with an emphasis on simplicity and correctness
http://ift.tt/2ol0xyB
Submitted February 21, 2018 at 06:27AM by TechLord2
via reddit http://ift.tt/2C9EULk
http://ift.tt/2ol0xyB
Submitted February 21, 2018 at 06:27AM by TechLord2
via reddit http://ift.tt/2C9EULk
GitHub
utds3lab/multiverse
multiverse - A static binary rewriter that does not use heuristics
Remote Code Execution in IDA by double clicking string
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:40AM by MalwareSeattle
via reddit http://ift.tt/2FiK5qW
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:40AM by MalwareSeattle
via reddit http://ift.tt/2FiK5qW
CSS keylogger that exploits react
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
GitHub
maxchehab/CSS-Keylogging
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
Htbridge
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
High-Tech Bridge opens a series of interviews with cybersecurity influencers and thought leaders who shape the industry. Please meet Andy Bates, Director of Global Cyber Alliance.
OWASP Automated Threat Handbook [pdf]
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya