wotmate: a GnuPG keyring paths grapher
http://ift.tt/2HAHTvD
Submitted February 22, 2018 at 07:24AM by mricon
via reddit http://ift.tt/2sGOYHK
http://ift.tt/2HAHTvD
Submitted February 22, 2018 at 07:24AM by mricon
via reddit http://ift.tt/2sGOYHK
GitHub
mricon/wotmate
wotmate - Web of trust grapher
Finding a mentor
How and where do I find one? What are some learning resources that I can use to actually do instead of read only? I've been doing picoctf and am learning a lot, but want to know and learn more " real life" every day skills. Can soneone help?
Submitted February 22, 2018 at 08:10AM by TSTEAD
via reddit http://ift.tt/2FjRUfU
How and where do I find one? What are some learning resources that I can use to actually do instead of read only? I've been doing picoctf and am learning a lot, but want to know and learn more " real life" every day skills. Can soneone help?
Submitted February 22, 2018 at 08:10AM by TSTEAD
via reddit http://ift.tt/2FjRUfU
reddit
Finding a mentor • r/security
How and where do I find one? What are some learning resources that I can use to actually do instead of read only? I've been doing picoctf and am...
Devirtualizing FinSpy, Phases #1-4 : Deobfuscating FinSpy VM Bytecode Programs
http://ift.tt/2Fl4hIJ
Submitted February 22, 2018 at 10:05AM by TechLord2
via reddit http://ift.tt/2osntfJ
http://ift.tt/2Fl4hIJ
Submitted February 22, 2018 at 10:05AM by TechLord2
via reddit http://ift.tt/2osntfJ
Möbius Strip Reverse Engineering
Devirtualizing FinSpy, Phase #1: Deobfuscating FinSpy VM Bytecode Programs
1. Introduction In part one of this series, we analyzed the obfuscation on the x86 implementation of the FinSpy VM, and wrote a tool to deobfuscate it to allow easier analysis. In the second part of this series, we analyzed the VM instruction set, wrote a…
Userland API Monitoring and Code Injection Detection
http://ift.tt/2GzsKJv
Submitted February 22, 2018 at 10:19AM by TechLord2
via reddit http://ift.tt/2okv6W7
http://ift.tt/2GzsKJv
Submitted February 22, 2018 at 10:19AM by TechLord2
via reddit http://ift.tt/2okv6W7
FlightSim Labs publicly admits to blatantly breaking the law by stealing passwords. Claims it's fine because it only targeted other law breakers.
http://ift.tt/2EJibHw
Submitted February 22, 2018 at 01:04PM by GregoryPanic
via reddit http://ift.tt/2GzEA6A
http://ift.tt/2EJibHw
Submitted February 22, 2018 at 01:04PM by GregoryPanic
via reddit http://ift.tt/2GzEA6A
Flight Sim Labs Forums
A320-X DRM - what happened
Hello all,
We feel that it's only fair that we disclose fully the extent of our DRM efforts here. So let's discuss exactly that now - but first, I need to p...
We feel that it's only fair that we disclose fully the extent of our DRM efforts here. So let's discuss exactly that now - but first, I need to p...
Check if your internet-connected devices are public on Shodan.
http://ift.tt/1U66yJ5
Submitted February 22, 2018 at 02:48PM by hubbabubbahobo
via reddit http://ift.tt/2sNXncc
http://ift.tt/1U66yJ5
Submitted February 22, 2018 at 02:48PM by hubbabubbahobo
via reddit http://ift.tt/2sNXncc
Bullguard
Internet of Things (IoT) Scanner - BullGuard
Check if your internet-connected devices at home (webcams, smart TVs etc) are public on Shodan. If they are, this means they are accessible to the public, and hackers.
I just published a blog on few tips on #BugBounty "Bug Bounty - Tips / Tricks / JS (JavaScript Files)" #TogetherWeHitHarder #InfoSec #InformationSecurity
https://twitter.com/prateek_0490/status/966397683446370304
https://twitter.com/prateek_0490/status/966397683446370304
Twitter
Prateek Tiwari
I just published a blog on few tips on #BugBounty "Bug Bounty - Tips / Tricks / JS (JavaScript Files)" #TogetherWeHitHarder #InfoSec #InformationSecurity https://t.co/CCfPGRIFKv
Android Malware Harvests Facebook Account Details
http://ift.tt/2GAXt93
Submitted February 22, 2018 at 05:19PM by Iot_Security
via reddit http://ift.tt/2FnjHMI
http://ift.tt/2GAXt93
Submitted February 22, 2018 at 05:19PM by Iot_Security
via reddit http://ift.tt/2FnjHMI
Symantec
Android Malware Harvests Facebook Account Details
New Fakeapp variants log into Facebook accounts to harvest user credentials directly from victims’ devices.
Cyber Security Company WebARX Creates Tool to Detect Cryptojacking
http://ift.tt/2oiu0Ko
Submitted February 22, 2018 at 05:07PM by ded1cated
via reddit http://ift.tt/2GBLMim
http://ift.tt/2oiu0Ko
Submitted February 22, 2018 at 05:07PM by ded1cated
via reddit http://ift.tt/2GBLMim
Coinsquare Discover
Cyber Security Company WebARX Creates Tool to Detect Cryptojacking
To combat cryptojacking, cybersecurity company WebARX created a tool designed to allow website owners to detect unwanted digital currency mining noscripts.
Tesla Cloud Account Data Breached!
http://ift.tt/2FlQ1iZ
Submitted February 22, 2018 at 05:04PM by vaxfms
via reddit http://ift.tt/2GBybaS
http://ift.tt/2FlQ1iZ
Submitted February 22, 2018 at 05:04PM by vaxfms
via reddit http://ift.tt/2GBybaS
OSRadar
Tesla Cloud Account Data Breached! - OSRadar
According to the security company RedLock, a Tesla Cloud account is breached using an unsecured Kubernetes container management console. Hackers used the account to mine cryptocurrency. Learn more about the incident and stay secured from cryptojacking.
OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers
http://ift.tt/2CCXK98
Submitted February 22, 2018 at 04:58PM by Iot_Security
via reddit http://ift.tt/2HEiHnM
http://ift.tt/2CCXK98
Submitted February 22, 2018 at 04:58PM by Iot_Security
via reddit http://ift.tt/2HEiHnM
reddit
OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers • r/security
6 points and 0 comments so far on reddit
Cryptomining accounted for 49% of IoT malware detections in 2017
http://ift.tt/2CD8moq
Submitted February 22, 2018 at 04:57PM by Iot_Security
via reddit http://ift.tt/2EJEWeq
http://ift.tt/2CD8moq
Submitted February 22, 2018 at 04:57PM by Iot_Security
via reddit http://ift.tt/2EJEWeq
securitybrief.co.nz
Cryptomining accounted for 49% of IoT malware detections in 2017
Smart homes, smart buildings and smart devices are giving cybercriminals a helping hand, and many device owners may not even know it is happening.
Unsecured Connected Cameras Installed in Public Space Undermine Our Privacy
http://ift.tt/2HBytA9
Submitted February 22, 2018 at 06:19PM by Iot_Security
via reddit http://ift.tt/2CANrCF
http://ift.tt/2HBytA9
Submitted February 22, 2018 at 06:19PM by Iot_Security
via reddit http://ift.tt/2CANrCF
reddit
Unsecured Connected Cameras Installed in Public Space... • r/security
1 points and 0 comments so far on reddit
lol this dude left himself logged in on a public computer
y'all better let him know to be more cautious next time
Submitted February 22, 2018 at 08:11PM by Y0h_513nn_R3n
via reddit http://ift.tt/2EZMYis
y'all better let him know to be more cautious next time
Submitted February 22, 2018 at 08:11PM by Y0h_513nn_R3n
via reddit http://ift.tt/2EZMYis
reddit
lol this dude left himself logged in on a public computer • r/security
y'all better let him know to be more cautious next time
Max Secure Spyware Detector VS Plumbytes Anti-Malware
http://ift.tt/2sT8BMT
Submitted February 22, 2018 at 08:09PM by tomasstatkus
via reddit http://ift.tt/2EURRJR
http://ift.tt/2sT8BMT
Submitted February 22, 2018 at 08:09PM by tomasstatkus
via reddit http://ift.tt/2EURRJR
Reviewedbypro
Max Secure Spyware Detector VS Plumbytes Anti-Malware
Max Secure Spyware Detector and Plumbytes Anti-Malware were developed in order to protect PC users against cyber threats and clean their system from infected and
Security In 5: Episode 180 - How To Avoid Torpedoing Your Own Security Plans
http://ift.tt/2BIPSpK
Submitted February 22, 2018 at 07:34PM by BinaryBlog
via reddit http://ift.tt/2Ceu1Yr
http://ift.tt/2BIPSpK
Submitted February 22, 2018 at 07:34PM by BinaryBlog
via reddit http://ift.tt/2Ceu1Yr
Libsyn
Security In Five Podcast: Episode 180 - How To Avoid Torpedoing Your Own Security Plans
There are threats everywhere looking to disrupt and try to break your security plans and projects. Most teams forget to look at themselves and realize that their own actions and inactions can do just as much damage to their security plans as something external.…
Poisoning llmnr/nbns lookups using a TAP adapter
http://ift.tt/2Fmjdq2
Submitted February 22, 2018 at 09:13PM by fridgehead
via reddit http://ift.tt/2HEL3yf
http://ift.tt/2Fmjdq2
Submitted February 22, 2018 at 09:13PM by fridgehead
via reddit http://ift.tt/2HEL3yf
Orangewi.re Labs
Stealing hashes using TAP adapters
One problem with Responder etc is that running it as a low-privilege user on a Windows box is damned near impossible. Windows already claims the ports that it needs, so any form of poisoning isnt g…
Signal Foundation is founded with help from former WhatsApp leader.
http://ift.tt/2FkPZYr
Submitted February 22, 2018 at 09:11PM by pompeiitype
via reddit http://ift.tt/2GC78fA
http://ift.tt/2FkPZYr
Submitted February 22, 2018 at 09:11PM by pompeiitype
via reddit http://ift.tt/2GC78fA
signal.org
Signal Foundation
Long before we knew that it would be called Signal, we knew what we wanted it to be. Instead of teaching the rest of the world cryptography, we wanted to see if we could develop cryptography that worked for the rest of the world. At the time, the industry…
NoMachine - The Road To Code Execution Without Fuzzing - CVE-2018-6947
http://ift.tt/2BFXnOt
Submitted February 22, 2018 at 08:50PM by JustAPenTester
via reddit http://ift.tt/2HExAH4
http://ift.tt/2BFXnOt
Submitted February 22, 2018 at 08:50PM by JustAPenTester
via reddit http://ift.tt/2HExAH4
Fidus InfoSecurity | Cyber Security, Penetration Testing, Red Teaming
NoMachine - The Road To Code Execution Without Fuzzing - CVE-2018-6947
CVE-2018-6947 NoMachine Code Execution walkthrough. A tutorial on how the exploit was identified, investigated and ultimately turned into a working exploit.
One-stop counterfeit certificate shops for all your malware-signing needs
http://ift.tt/2ELAo7p
Submitted February 22, 2018 at 09:06PM by DJRWolf
via reddit http://ift.tt/2EJugby
http://ift.tt/2ELAo7p
Submitted February 22, 2018 at 09:06PM by DJRWolf
via reddit http://ift.tt/2EJugby
Ars Technica
One-stop counterfeit certificate shops for all your malware-signing needs
Certificates registered in names of real corporations are surprisingly easy to come by.
The Use of Counterfeit Code Signing Certificates Is on the Rise
http://ift.tt/2ENcnbK
Submitted February 22, 2018 at 09:54PM by EvanConover
via reddit http://ift.tt/2ELVti3
http://ift.tt/2ENcnbK
Submitted February 22, 2018 at 09:54PM by EvanConover
via reddit http://ift.tt/2ELVti3
Recorded Future
The Use of Counterfeit Code Signing Certificates Is on the Rise
Researchers are seeing an increase in code signing certificates being used for malicious payload distribution campaigns. Recorded Future investigated the criminal underground to find answers.