honeytrap: Advanced Honeypot framework
http://ift.tt/2oBuwCB
Submitted February 27, 2018 at 01:07PM by dgryski
via reddit http://ift.tt/2ovWiRT
http://ift.tt/2oBuwCB
Submitted February 27, 2018 at 01:07PM by dgryski
via reddit http://ift.tt/2ovWiRT
GitHub
honeytrap/honeytrap
honeytrap - Advanced Honeypot framework.
New SAML Vulnerabilities Affecting Multiple Implementations
http://ift.tt/2EXHL7F
Submitted February 27, 2018 at 09:52PM by kelbyludwig
via reddit http://ift.tt/2oxpDeH
http://ift.tt/2EXHL7F
Submitted February 27, 2018 at 09:52PM by kelbyludwig
via reddit http://ift.tt/2oxpDeH
The Duo Security Bulletin
Duo Finds SAML Vulnerabilities Affecting Multiple Implementations
This blog post describes a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of…
Alexa Top 1 Million Analysis - February 2018
http://ift.tt/2ER2z4W
Submitted February 27, 2018 at 09:40PM by speckz
via reddit http://ift.tt/2ozRnyl
http://ift.tt/2ER2z4W
Submitted February 27, 2018 at 09:40PM by speckz
via reddit http://ift.tt/2ozRnyl
Scott Helme
Alexa Top 1 Million Analysis - February 2018
It's that time of year again! I'm really excited to publish the 6th installment of my Alexa Top 1 Million analysis so we can take a look over our progress on securing the web over the last 6 months. Previous Crawls It's hard to believe there are now 5 previous
Phishing is probably now the biggest cybersecurity threat businesses face online. We give recommendations on how to defend against it.
http://ift.tt/2oCc78H
Submitted February 27, 2018 at 10:16PM by htbridgedigital
via reddit http://ift.tt/2over2h
http://ift.tt/2oCc78H
Submitted February 27, 2018 at 10:16PM by htbridgedigital
via reddit http://ift.tt/2over2h
Htbridge
Phishing Hits the Big Time
Phishing is probably the biggest threat businesses face online, but what can you do to defend against it?...
Analyzing the nasty .NET protection of the Ploutus.D malware.
http://ift.tt/2EWzPI0
Submitted February 27, 2018 at 01:01PM by aparata_s4tan
via reddit http://ift.tt/2HM0lRX
http://ift.tt/2EWzPI0
Submitted February 27, 2018 at 01:01PM by aparata_s4tan
via reddit http://ift.tt/2HM0lRX
antonioparata.blogspot.co.uk
Analyzing the nasty .NET protection of the Ploutus.D malware.
Twitter: @s4tan Recently the ATM malware Ploutus.D reappeared in the news as being used to attack US ATM ([1]). In this post I'll show a p...
Animated Video - Common Cybersecurity Mistakes That May Cause Breaches
https://www.youtube.com/watch?v=MicjzECoLe4
Submitted February 27, 2018 at 11:25PM by Electrojay
via reddit http://ift.tt/2GOX4Qu
https://www.youtube.com/watch?v=MicjzECoLe4
Submitted February 27, 2018 at 11:25PM by Electrojay
via reddit http://ift.tt/2GOX4Qu
YouTube
GlassHouse Systems - Common Cybersecurity Mistakes
For over 20 years, GlassHouse Systems has served private and public customers across Canada and the US. Our highly experienced team will design and develop i...
Why Cybersecurity Is More Difficult Today Than 2 Years Ago
http://ift.tt/2ozuye9
Submitted February 27, 2018 at 11:12PM by volci
via reddit http://ift.tt/2HR1QhU
http://ift.tt/2ozuye9
Submitted February 27, 2018 at 11:12PM by volci
via reddit http://ift.tt/2HR1QhU
Recorded Future
Why Cybersecurity Is More Difficult Today Than 2 Years Ago
Research from ESG says cybersecurity professionals have found their jobs becoming more difficult over the last two years. Find out what a threat intelligence solution should entail to make your job easier.
A Breakdown of the New SAML Authentication Bypass Vulnerability
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
Okta
A Breakdown of the New SAML Authentication Bypass Vulnerability | Okta Developer
An in-depth look at the new SAML authentication bypass vulnerability: what it is, how it works, and how you can protect yourself against it.
AVG Secure VPN review
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
Reviewedbypro
AVG Secure VPN review
AVG Secure VPN or Virtual Private Network provides users with a secure and private Internet connection without any restrictions. VPN is able to protect the
Privilege Escalation in 2.3M WooCommerce Shops
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
reddit
Privilege Escalation in 2.3M WooCommerce Shops • r/netsec
9 points and 1 comments so far on reddit
Free Ethical Hacking Course - Module 5 - System Hacking
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
en.gburu.net
Ethical Hacking Course - Module 5 - System Hacking - en.gburu.net
Free Ethical Hacking Course. Module 5 - System Hacking, you will learn the techniques that hackers use to attack objective systems.
From gamer to hacker to SecOps. Caroline Wong sits down with Mike Shema to discuss his InfoSec journey in a new podcast series, Humans of InfoSec:
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
SoundCloud
Ep 1 Mike Shema: OG Web Hacker
Humans Of InfoSec Episode 1, Mike Shema started out as a gamer and hacker in the late 90’s. He was part of the elite Foundstone consulting group, built a web application security scanner at Qualys, an
Steal Funds from TenX Users – Just Another Bug Bounty Story
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
slashcrypto.org
Steal Funds from TenX Users – Just Another Bug Bounty Story - slashcrypto
##TL;DR**Attention – spoiler alert!** I was able to bypass the rate-limiting protection of the login system of TenX w...
EnvKey wants to create a smarter place to store a company’s API keys and credentials
http://ift.tt/2sZJQ1g
Submitted February 28, 2018 at 01:16AM by danenania
via reddit http://ift.tt/2F6R0Wx
http://ift.tt/2sZJQ1g
Submitted February 28, 2018 at 01:16AM by danenania
via reddit http://ift.tt/2F6R0Wx
TechCrunch
EnvKey wants to create a smarter place to store a company’s API keys and credentials
If an engineer ends up leaving a company, on their own, or for any other reason, the company work is going to have to quickly work to change all of their keys for their credentials and keys…
No boundaries for credentials: New password leaks to Mixpanel and Session Replay Companies
http://ift.tt/2F95gxQ
Submitted February 28, 2018 at 02:16AM by speckz
via reddit http://ift.tt/2Cr9D6L
http://ift.tt/2F95gxQ
Submitted February 28, 2018 at 02:16AM by speckz
via reddit http://ift.tt/2Cr9D6L
Feds Need a Defense Strategy for IoT
http://ift.tt/2ESvyFb
Submitted February 28, 2018 at 02:43AM by newsalert_88
via reddit http://ift.tt/2FCLecX
http://ift.tt/2ESvyFb
Submitted February 28, 2018 at 02:43AM by newsalert_88
via reddit http://ift.tt/2FCLecX
Technology Solutions That Drive Government
Feds Need a Defense Strategy for IoT
Agencies, manufacturers and regulators must work together to secure the billions of connected devices coming online.
Bettercap 2.0, One Tool to Rule Them All.
http://ift.tt/2BUq0aG
Submitted February 28, 2018 at 03:15AM by kvqyzx
via reddit http://ift.tt/2FatkjO
http://ift.tt/2BUq0aG
Submitted February 28, 2018 at 03:15AM by kvqyzx
via reddit http://ift.tt/2FatkjO
evilsocket
All Hail Bettercap 2.0, One Tool to Rule Them All.
It’s with immense pleasure that I announce the release of the second generation of bettercap, a complete reimplementation of the most complete and advanced Man-in-the-Middle attack framework. This rel
U.S. Chamber's departing Beauchesne cites IoT risks among top cyber policy challenges
http://ift.tt/2GOWjHr
Submitted February 28, 2018 at 04:14AM by Iot_Security
via reddit http://ift.tt/2HSqFtA
http://ift.tt/2GOWjHr
Submitted February 28, 2018 at 04:14AM by Iot_Security
via reddit http://ift.tt/2HSqFtA
Insidecybersecurity
U.S. Chamber's departing Beauchesne cites IoT risks among top cyber policy challenges | InsideCyberSecurity.com
The U.S. Chamber of Commerce's Ann Beauchesne, who will be leaving her post next week as the business group's top cybersecurity official, says emerging risks from the Internet of Things will be a major challenge for federal policymakers over the next decade.
Android P: Google plans big to guard your Privacy!
http://ift.tt/2GOg7KN
Submitted February 28, 2018 at 04:06AM by anonywise
via reddit http://ift.tt/2HSFSLl
http://ift.tt/2GOg7KN
Submitted February 28, 2018 at 04:06AM by anonywise
via reddit http://ift.tt/2HSFSLl
SpaceX's Starlink satellite internet: It's time for tough talk on cyber *space* security
http://ift.tt/2CBNGNG
Submitted February 28, 2018 at 03:31AM by volci
via reddit http://ift.tt/2EWZqAB
http://ift.tt/2CBNGNG
Submitted February 28, 2018 at 03:31AM by volci
via reddit http://ift.tt/2EWZqAB
Deutsche Welle
SpaceX's Starlink satellite internet: It's time for tough talk on cyber security in space
On Wednesday, SpaceX postponed the launch of two tester satellites for a super-fleet of 12,000 — part of its Starlink space-based global internet. Good. That gives us an extra day to talk about cyber security in space.
SecOps Hub a community for Security Professionals
http://ift.tt/2BVnYXR
Submitted February 28, 2018 at 03:28AM by SecOpsHub
via reddit http://ift.tt/2EYEglC
http://ift.tt/2BVnYXR
Submitted February 28, 2018 at 03:28AM by SecOpsHub
via reddit http://ift.tt/2EYEglC
SecOps Hub
SecOps Hub is a one-stop shop for security professionals to discuss strategies, incident response best practices, and ways to simplify it all through automation.