New Mirai Variant Focuses on Turning IoT Devices into Proxy Servers
http://ift.tt/2CKWRvx
Submitted February 27, 2018 at 03:00PM by alessiodelv
via reddit http://ift.tt/2t04vCp
http://ift.tt/2CKWRvx
Submitted February 27, 2018 at 03:00PM by alessiodelv
via reddit http://ift.tt/2t04vCp
BleepingComputer
New Mirai Variant Focuses on Turning IoT Devices into Proxy Servers
Security researchers have spotted a new variant of the Mirai malware that focuses on infecting IoT and networking equipment with the main purpose of turning these devices into a network of proxy servers used to relay malicious traffic.
New bypass and protection techniques for ASLR on Linux
http://ift.tt/2GAReCe
Submitted February 27, 2018 at 02:49PM by mrquackalot
via reddit http://ift.tt/2ETGmmw
http://ift.tt/2GAReCe
Submitted February 27, 2018 at 02:49PM by mrquackalot
via reddit http://ift.tt/2ETGmmw
Ptsecurity
New bypass and protection techniques for ASLR on Linux
By Ilya Smith (@blackzert), Positive Technologies researcher 0. Abstract The Linux kernel is used on systems of all kinds througho...
Very nice & thorough Guide to using YubiKey as a SmartCard for GPG and SSH
http://ift.tt/1Ta9Ok1
Submitted February 27, 2018 at 05:17PM by al-maisan
via reddit http://ift.tt/2otGpv7
http://ift.tt/1Ta9Ok1
Submitted February 27, 2018 at 05:17PM by al-maisan
via reddit http://ift.tt/2otGpv7
GitHub
drduh/YubiKey-Guide
Guide to using YubiKey for GPG and SSH. Contribute to drduh/YubiKey-Guide development by creating an account on GitHub.
Concrete and Abstract Interpretation, Explained through Chess [Rolf Rolles]
http://ift.tt/2BQOa5M
Submitted February 27, 2018 at 06:44PM by TechLord2
via reddit http://ift.tt/2CLUpog
http://ift.tt/2BQOa5M
Submitted February 27, 2018 at 06:44PM by TechLord2
via reddit http://ift.tt/2CLUpog
Möbius Strip Reverse Engineering
Concrete and Abstract Interpretation, Explained through Chess
I've decided to release my presentation (two slide decks) on the theoretical foundations of abstract interpretation, illustrated through the game of chess. It has been collecting dust on my hard drive for five years, so I figured I may as well give it a proper…
Security In 5: Episode 183 - How To Stop Websites Using Your PC To Mine Bitcoin
http://ift.tt/2FynXZD
Submitted February 27, 2018 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2F0tAi3
http://ift.tt/2FynXZD
Submitted February 27, 2018 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2F0tAi3
Libsyn
Security In Five Podcast: Episode 183 - How To Stop Websites Using Your PC To Mine Bitcoin
Bitcoin or cryptocurrency mining is becoming the new thing websites and hackers are doing. Legitimate websites could be using your PC computing power to mine for bitcoin and you won't know it. This episode goes into the details on how to prevent your PC being…
Ad network uses advanced malware technique to conceal CPU-draining mining ads
http://ift.tt/2Cn2Evj
Submitted February 27, 2018 at 07:32PM by matoas7
via reddit http://ift.tt/2FzFXCW
http://ift.tt/2Cn2Evj
Submitted February 27, 2018 at 07:32PM by matoas7
via reddit http://ift.tt/2FzFXCW
Ars Technica
Ad network uses advanced malware technique to conceal CPU-draining mining ads
Domain generation algorithm allows noscripts to bypass ad blockers.
Unsecured AWS led to cryptojacking attack on LA Times
http://ift.tt/2GQbJey
Submitted February 27, 2018 at 08:12PM by volci
via reddit http://ift.tt/2HM5edX
http://ift.tt/2GQbJey
Submitted February 27, 2018 at 08:12PM by volci
via reddit http://ift.tt/2HM5edX
Naked Security
Unsecured AWS led to cryptojacking attack on LA Times
Cryptojackers have been discovered sneaking mining code on to a big brand’s website through the back door of a poorly secured Amazon AWS (Amazon Web Service) S3 bucket.
Now we can transfer large files from user to user directly
http://ift.tt/2qJWRuJ
Submitted February 27, 2018 at 09:32PM by bustabob454
via reddit http://ift.tt/2sZdXG6
http://ift.tt/2qJWRuJ
Submitted February 27, 2018 at 09:32PM by bustabob454
via reddit http://ift.tt/2sZdXG6
Kwiqflickfeatures
KwiqFlick Features
Upload and store files and send them to anyone in seconds.
honeytrap: Advanced Honeypot framework
http://ift.tt/2oBuwCB
Submitted February 27, 2018 at 01:07PM by dgryski
via reddit http://ift.tt/2ovWiRT
http://ift.tt/2oBuwCB
Submitted February 27, 2018 at 01:07PM by dgryski
via reddit http://ift.tt/2ovWiRT
GitHub
honeytrap/honeytrap
honeytrap - Advanced Honeypot framework.
New SAML Vulnerabilities Affecting Multiple Implementations
http://ift.tt/2EXHL7F
Submitted February 27, 2018 at 09:52PM by kelbyludwig
via reddit http://ift.tt/2oxpDeH
http://ift.tt/2EXHL7F
Submitted February 27, 2018 at 09:52PM by kelbyludwig
via reddit http://ift.tt/2oxpDeH
The Duo Security Bulletin
Duo Finds SAML Vulnerabilities Affecting Multiple Implementations
This blog post describes a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of…
Alexa Top 1 Million Analysis - February 2018
http://ift.tt/2ER2z4W
Submitted February 27, 2018 at 09:40PM by speckz
via reddit http://ift.tt/2ozRnyl
http://ift.tt/2ER2z4W
Submitted February 27, 2018 at 09:40PM by speckz
via reddit http://ift.tt/2ozRnyl
Scott Helme
Alexa Top 1 Million Analysis - February 2018
It's that time of year again! I'm really excited to publish the 6th installment of my Alexa Top 1 Million analysis so we can take a look over our progress on securing the web over the last 6 months. Previous Crawls It's hard to believe there are now 5 previous
Phishing is probably now the biggest cybersecurity threat businesses face online. We give recommendations on how to defend against it.
http://ift.tt/2oCc78H
Submitted February 27, 2018 at 10:16PM by htbridgedigital
via reddit http://ift.tt/2over2h
http://ift.tt/2oCc78H
Submitted February 27, 2018 at 10:16PM by htbridgedigital
via reddit http://ift.tt/2over2h
Htbridge
Phishing Hits the Big Time
Phishing is probably the biggest threat businesses face online, but what can you do to defend against it?...
Analyzing the nasty .NET protection of the Ploutus.D malware.
http://ift.tt/2EWzPI0
Submitted February 27, 2018 at 01:01PM by aparata_s4tan
via reddit http://ift.tt/2HM0lRX
http://ift.tt/2EWzPI0
Submitted February 27, 2018 at 01:01PM by aparata_s4tan
via reddit http://ift.tt/2HM0lRX
antonioparata.blogspot.co.uk
Analyzing the nasty .NET protection of the Ploutus.D malware.
Twitter: @s4tan Recently the ATM malware Ploutus.D reappeared in the news as being used to attack US ATM ([1]). In this post I'll show a p...
Animated Video - Common Cybersecurity Mistakes That May Cause Breaches
https://www.youtube.com/watch?v=MicjzECoLe4
Submitted February 27, 2018 at 11:25PM by Electrojay
via reddit http://ift.tt/2GOX4Qu
https://www.youtube.com/watch?v=MicjzECoLe4
Submitted February 27, 2018 at 11:25PM by Electrojay
via reddit http://ift.tt/2GOX4Qu
YouTube
GlassHouse Systems - Common Cybersecurity Mistakes
For over 20 years, GlassHouse Systems has served private and public customers across Canada and the US. Our highly experienced team will design and develop i...
Why Cybersecurity Is More Difficult Today Than 2 Years Ago
http://ift.tt/2ozuye9
Submitted February 27, 2018 at 11:12PM by volci
via reddit http://ift.tt/2HR1QhU
http://ift.tt/2ozuye9
Submitted February 27, 2018 at 11:12PM by volci
via reddit http://ift.tt/2HR1QhU
Recorded Future
Why Cybersecurity Is More Difficult Today Than 2 Years Ago
Research from ESG says cybersecurity professionals have found their jobs becoming more difficult over the last two years. Find out what a threat intelligence solution should entail to make your job easier.
A Breakdown of the New SAML Authentication Bypass Vulnerability
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
Okta
A Breakdown of the New SAML Authentication Bypass Vulnerability | Okta Developer
An in-depth look at the new SAML authentication bypass vulnerability: what it is, how it works, and how you can protect yourself against it.
AVG Secure VPN review
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
Reviewedbypro
AVG Secure VPN review
AVG Secure VPN or Virtual Private Network provides users with a secure and private Internet connection without any restrictions. VPN is able to protect the
Privilege Escalation in 2.3M WooCommerce Shops
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
reddit
Privilege Escalation in 2.3M WooCommerce Shops • r/netsec
9 points and 1 comments so far on reddit
Free Ethical Hacking Course - Module 5 - System Hacking
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
en.gburu.net
Ethical Hacking Course - Module 5 - System Hacking - en.gburu.net
Free Ethical Hacking Course. Module 5 - System Hacking, you will learn the techniques that hackers use to attack objective systems.
From gamer to hacker to SecOps. Caroline Wong sits down with Mike Shema to discuss his InfoSec journey in a new podcast series, Humans of InfoSec:
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
SoundCloud
Ep 1 Mike Shema: OG Web Hacker
Humans Of InfoSec Episode 1, Mike Shema started out as a gamer and hacker in the late 90’s. He was part of the elite Foundstone consulting group, built a web application security scanner at Qualys, an
Steal Funds from TenX Users – Just Another Bug Bounty Story
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
slashcrypto.org
Steal Funds from TenX Users – Just Another Bug Bounty Story - slashcrypto
##TL;DR**Attention – spoiler alert!** I was able to bypass the rate-limiting protection of the login system of TenX w...