Machine Learning Use Cases for Security Orchestration and Automation
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
Demisto
Demisto’s Top Machine Learning Use Cases – Part 1
Learn how Demisto's machine learning helps enhance responder productivity, accelerate workflow creation, and enable leaner, more efficient security operations.
I'm looking to set up an attack/defense capture-the-flag competition. Do you guys know of any open-source systems out there that I could use for that?
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
reddit
I'm looking to set up an attack/defense... • r/security
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different...
Tesla's Amazon Cloud Account Hacked to Mine Cryptocurrency
http://ift.tt/2EGcHxa
Submitted February 21, 2018 at 03:39AM by Iot_Security
via reddit http://ift.tt/2GywY4d
http://ift.tt/2EGcHxa
Submitted February 21, 2018 at 03:39AM by Iot_Security
via reddit http://ift.tt/2GywY4d
Fortune
Tesla Hackers Hijacked Amazon Cloud Account to Mine Cryptocurrency
Security researchers said Tesla paid them $3,3117 for reporting the data breach.
Your opinion on anti malware & virus protection
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be running something different or better for every day surfing and simple stuff?
Submitted February 21, 2018 at 06:28AM by chull2058
via reddit http://ift.tt/2ERjh3j
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be running something different or better for every day surfing and simple stuff?
Submitted February 21, 2018 at 06:28AM by chull2058
via reddit http://ift.tt/2ERjh3j
reddit
Your opinion on anti malware & virus protection • r/security
I run a dell laptop running Windows 10 (64 bit). I currently have Windows Defender and Malwarebytes premium running. In your opinion, should I be...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims' Systems
http://ift.tt/2GG6oaj
Submitted February 21, 2018 at 06:07AM by chull2058
via reddit http://ift.tt/2GxNlxN
http://ift.tt/2GG6oaj
Submitted February 21, 2018 at 06:07AM by chull2058
via reddit http://ift.tt/2GxNlxN
McAfee Blogs
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims' Systems
McAfee ATR recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics.
Tesla cloud systems exploited by hackers to mine cryptocurrency | ZDNet
http://ift.tt/2EVFopm
Submitted February 21, 2018 at 06:02AM by chull2058
via reddit http://ift.tt/2HwJG4U
http://ift.tt/2EVFopm
Submitted February 21, 2018 at 06:02AM by chull2058
via reddit http://ift.tt/2HwJG4U
ZDNet
Tesla cloud systems exploited by hackers to mine cryptocurrency
Updated: Researchers have discovered that Tesla's AWS cloud systems were compromised for the purpose of cryptojacking.
Polish DeWalt website provides no TLS, creating account is mandatory for extended warranty
https://twitter.com/radoslawc/status/960880267169812480
Submitted February 21, 2018 at 05:17AM by radoslawc
via reddit http://ift.tt/2Fi8DjO
https://twitter.com/radoslawc/status/960880267169812480
Submitted February 21, 2018 at 05:17AM by radoslawc
via reddit http://ift.tt/2Fi8DjO
Twitter
radoslawc
@DEWALTtough No SSL/TLS on polish site, how do I register my tool without sending my personal data over unencrypted connection?
Breaking into iOS 11 : Jailbreak Methods Discussion and Links to Tools
http://ift.tt/2oe5Lx3
Submitted February 21, 2018 at 07:36AM by TechLord2
via reddit http://ift.tt/2GsDbOY
http://ift.tt/2oe5Lx3
Submitted February 21, 2018 at 07:36AM by TechLord2
via reddit http://ift.tt/2GsDbOY
reddit
Breaking into iOS 11 : Jailbreak Methods Discussion and... • r/netsec
1 points and 1 comments so far on reddit
MADLIRA : Malware detection using learning and information retrieval for Android
http://ift.tt/2EVX8Rm
Submitted February 21, 2018 at 06:35AM by TechLord2
via reddit http://ift.tt/2BGJS0T
http://ift.tt/2EVX8Rm
Submitted February 21, 2018 at 06:35AM by TechLord2
via reddit http://ift.tt/2BGJS0T
GitHub
dkhuuthe/MADLIRA
MADLIRA - Malware detection using learning and information retrieval for Android
A Static Binary Rewriter that does not use heuristics and with an emphasis on simplicity and correctness
http://ift.tt/2ol0xyB
Submitted February 21, 2018 at 06:27AM by TechLord2
via reddit http://ift.tt/2C9EULk
http://ift.tt/2ol0xyB
Submitted February 21, 2018 at 06:27AM by TechLord2
via reddit http://ift.tt/2C9EULk
GitHub
utds3lab/multiverse
multiverse - A static binary rewriter that does not use heuristics
Remote Code Execution in IDA by double clicking string
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:40AM by MalwareSeattle
via reddit http://ift.tt/2FiK5qW
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:40AM by MalwareSeattle
via reddit http://ift.tt/2FiK5qW
CSS keylogger that exploits react
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
GitHub
maxchehab/CSS-Keylogging
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
Htbridge
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
High-Tech Bridge opens a series of interviews with cybersecurity influencers and thought leaders who shape the industry. Please meet Andy Bates, Director of Global Cyber Alliance.
OWASP Automated Threat Handbook [pdf]
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya
SUPERAntiSpyware VS SpyBot
http://ift.tt/2EHBOeV
Submitted February 21, 2018 at 04:00PM by tomasstatkus
via reddit http://ift.tt/2Fiv4FB
http://ift.tt/2EHBOeV
Submitted February 21, 2018 at 04:00PM by tomasstatkus
via reddit http://ift.tt/2Fiv4FB
Reviewedbypro
SUPERAntiSpyware VS SpyBot
SuperAntiSpyware and SpyBot are both similar anti-spyware applications that aim to detect and remove malicious software and various types of malware. Both applications provide low-budget
Hackers have turned the Nintendo Switch into a functional Linux tablet
http://ift.tt/2okzlQC
Submitted February 21, 2018 at 05:30PM by Iot_Security
via reddit http://ift.tt/2ogy262
http://ift.tt/2okzlQC
Submitted February 21, 2018 at 05:30PM by Iot_Security
via reddit http://ift.tt/2ogy262
The Verge
Hackers have turned the Nintendo Switch into a functional Linux tablet
But you’ll have to guess how they did it.
Hardware vs. Software-based detection: Why it can’t be one or the other
http://ift.tt/2olkC7Y
Submitted February 21, 2018 at 05:04PM by shleimeleh
via reddit http://ift.tt/2EItkbz
http://ift.tt/2olkC7Y
Submitted February 21, 2018 at 05:04PM by shleimeleh
via reddit http://ift.tt/2EItkbz
Perception Point
Hardware vs. Software-based detection | Perception Point
As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This market is so dynamic because it follows a cat-and-mouse model where the defenders are continuously trying to…
CVEs are dead
http://ift.tt/2C36pWT
Submitted February 21, 2018 at 04:50PM by Iot_Security
via reddit http://ift.tt/2FiejKw
http://ift.tt/2C36pWT
Submitted February 21, 2018 at 04:50PM by Iot_Security
via reddit http://ift.tt/2FiejKw
Help Net Security
Still relying solely on CVE and NVD for vulnerability tracking? Bad idea - Help Net Security
Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year.
Bogus Linux vulnerability gets publicity
http://ift.tt/2sHE3xk
Submitted February 21, 2018 at 05:53PM by Iot_Security
via reddit http://ift.tt/2EIo9Vb
http://ift.tt/2sHE3xk
Submitted February 21, 2018 at 05:53PM by Iot_Security
via reddit http://ift.tt/2EIo9Vb
ZDNet
Bogus Linux vulnerability gets publicity | ZDNet
No, there's not a new security hole that gives attackers complete control over Linux servers. But, if you use a poor password, yes, you can still get hacked. Imagine!
Internet of Baby Monitors: 56.000 Baby Monitors Can Be Spied On With Ease
http://ift.tt/2GxaD7a
Submitted February 21, 2018 at 06:16PM by kafbas
via reddit http://ift.tt/2ogAKZg
http://ift.tt/2GxaD7a
Submitted February 21, 2018 at 06:16PM by kafbas
via reddit http://ift.tt/2ogAKZg
Sec-Consult
Internet of Babies – When baby monitors fail to be smart | SEC Consult
Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a
Disabling Docker ICC Still Allows Raw Ethernet Communications Between Containers
http://ift.tt/2Gwe5ie
Submitted February 21, 2018 at 08:02PM by The_Giant_Panda
via reddit http://ift.tt/2BHVBMP
http://ift.tt/2Gwe5ie
Submitted February 21, 2018 at 08:02PM by The_Giant_Panda
via reddit http://ift.tt/2BHVBMP
GitHub
brthor/docker-layer2-icc
docker-layer2-icc - Demonstrating that disabling ICC in docker does not block raw packets between containers.