A Breakdown of the New SAML Authentication Bypass Vulnerability
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
http://ift.tt/2ou7RZB
Submitted February 27, 2018 at 10:53PM by rdegges
via reddit http://ift.tt/2sYMnZH
Okta
A Breakdown of the New SAML Authentication Bypass Vulnerability | Okta Developer
An in-depth look at the new SAML authentication bypass vulnerability: what it is, how it works, and how you can protect yourself against it.
AVG Secure VPN review
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
http://ift.tt/2FcNjPf
Submitted February 27, 2018 at 10:41PM by tomasstatkus
via reddit http://ift.tt/2t44BJ8
Reviewedbypro
AVG Secure VPN review
AVG Secure VPN or Virtual Private Network provides users with a secure and private Internet connection without any restrictions. VPN is able to protect the
Privilege Escalation in 2.3M WooCommerce Shops
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
http://ift.tt/2FEoppq
Submitted February 27, 2018 at 11:04PM by zit-hb
via reddit http://ift.tt/2BW5mHn
reddit
Privilege Escalation in 2.3M WooCommerce Shops • r/netsec
9 points and 1 comments so far on reddit
Free Ethical Hacking Course - Module 5 - System Hacking
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
http://ift.tt/2ozgsK2
Submitted February 27, 2018 at 10:50PM by gburu
via reddit http://ift.tt/2CqJ3up
en.gburu.net
Ethical Hacking Course - Module 5 - System Hacking - en.gburu.net
Free Ethical Hacking Course. Module 5 - System Hacking, you will learn the techniques that hackers use to attack objective systems.
From gamer to hacker to SecOps. Caroline Wong sits down with Mike Shema to discuss his InfoSec journey in a new podcast series, Humans of InfoSec:
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
http://ift.tt/2FCoSZ8
Submitted February 27, 2018 at 11:48PM by ju1i3k
via reddit http://ift.tt/2F2BZlj
SoundCloud
Ep 1 Mike Shema: OG Web Hacker
Humans Of InfoSec Episode 1, Mike Shema started out as a gamer and hacker in the late 90’s. He was part of the elite Foundstone consulting group, built a web application security scanner at Qualys, an
Steal Funds from TenX Users – Just Another Bug Bounty Story
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
http://ift.tt/2F7iawj
Submitted February 28, 2018 at 12:03AM by slashcrypto
via reddit http://ift.tt/2t3A0vs
slashcrypto.org
Steal Funds from TenX Users – Just Another Bug Bounty Story - slashcrypto
##TL;DR**Attention – spoiler alert!** I was able to bypass the rate-limiting protection of the login system of TenX w...
EnvKey wants to create a smarter place to store a company’s API keys and credentials
http://ift.tt/2sZJQ1g
Submitted February 28, 2018 at 01:16AM by danenania
via reddit http://ift.tt/2F6R0Wx
http://ift.tt/2sZJQ1g
Submitted February 28, 2018 at 01:16AM by danenania
via reddit http://ift.tt/2F6R0Wx
TechCrunch
EnvKey wants to create a smarter place to store a company’s API keys and credentials
If an engineer ends up leaving a company, on their own, or for any other reason, the company work is going to have to quickly work to change all of their keys for their credentials and keys…
No boundaries for credentials: New password leaks to Mixpanel and Session Replay Companies
http://ift.tt/2F95gxQ
Submitted February 28, 2018 at 02:16AM by speckz
via reddit http://ift.tt/2Cr9D6L
http://ift.tt/2F95gxQ
Submitted February 28, 2018 at 02:16AM by speckz
via reddit http://ift.tt/2Cr9D6L
Feds Need a Defense Strategy for IoT
http://ift.tt/2ESvyFb
Submitted February 28, 2018 at 02:43AM by newsalert_88
via reddit http://ift.tt/2FCLecX
http://ift.tt/2ESvyFb
Submitted February 28, 2018 at 02:43AM by newsalert_88
via reddit http://ift.tt/2FCLecX
Technology Solutions That Drive Government
Feds Need a Defense Strategy for IoT
Agencies, manufacturers and regulators must work together to secure the billions of connected devices coming online.
Bettercap 2.0, One Tool to Rule Them All.
http://ift.tt/2BUq0aG
Submitted February 28, 2018 at 03:15AM by kvqyzx
via reddit http://ift.tt/2FatkjO
http://ift.tt/2BUq0aG
Submitted February 28, 2018 at 03:15AM by kvqyzx
via reddit http://ift.tt/2FatkjO
evilsocket
All Hail Bettercap 2.0, One Tool to Rule Them All.
It’s with immense pleasure that I announce the release of the second generation of bettercap, a complete reimplementation of the most complete and advanced Man-in-the-Middle attack framework. This rel
U.S. Chamber's departing Beauchesne cites IoT risks among top cyber policy challenges
http://ift.tt/2GOWjHr
Submitted February 28, 2018 at 04:14AM by Iot_Security
via reddit http://ift.tt/2HSqFtA
http://ift.tt/2GOWjHr
Submitted February 28, 2018 at 04:14AM by Iot_Security
via reddit http://ift.tt/2HSqFtA
Insidecybersecurity
U.S. Chamber's departing Beauchesne cites IoT risks among top cyber policy challenges | InsideCyberSecurity.com
The U.S. Chamber of Commerce's Ann Beauchesne, who will be leaving her post next week as the business group's top cybersecurity official, says emerging risks from the Internet of Things will be a major challenge for federal policymakers over the next decade.
Android P: Google plans big to guard your Privacy!
http://ift.tt/2GOg7KN
Submitted February 28, 2018 at 04:06AM by anonywise
via reddit http://ift.tt/2HSFSLl
http://ift.tt/2GOg7KN
Submitted February 28, 2018 at 04:06AM by anonywise
via reddit http://ift.tt/2HSFSLl
SpaceX's Starlink satellite internet: It's time for tough talk on cyber *space* security
http://ift.tt/2CBNGNG
Submitted February 28, 2018 at 03:31AM by volci
via reddit http://ift.tt/2EWZqAB
http://ift.tt/2CBNGNG
Submitted February 28, 2018 at 03:31AM by volci
via reddit http://ift.tt/2EWZqAB
Deutsche Welle
SpaceX's Starlink satellite internet: It's time for tough talk on cyber security in space
On Wednesday, SpaceX postponed the launch of two tester satellites for a super-fleet of 12,000 — part of its Starlink space-based global internet. Good. That gives us an extra day to talk about cyber security in space.
SecOps Hub a community for Security Professionals
http://ift.tt/2BVnYXR
Submitted February 28, 2018 at 03:28AM by SecOpsHub
via reddit http://ift.tt/2EYEglC
http://ift.tt/2BVnYXR
Submitted February 28, 2018 at 03:28AM by SecOpsHub
via reddit http://ift.tt/2EYEglC
SecOps Hub
SecOps Hub is a one-stop shop for security professionals to discuss strategies, incident response best practices, and ways to simplify it all through automation.
Can the FBI really unlock ANY iPhone in existence?
http://ift.tt/2CNf5MJ
Submitted February 28, 2018 at 03:25AM by volci
via reddit http://ift.tt/2BUAzuj
http://ift.tt/2CNf5MJ
Submitted February 28, 2018 at 03:25AM by volci
via reddit http://ift.tt/2BUAzuj
Naked Security
Can the FBI really unlock ANY iPhone in existence?
According to Forbes, law enforcement agencies may be able to unlock many or most iPhones in use out there.
Get Smart Today, Succeed Tomorrow: Building Smart Cities & A Smarter Youth Population:
http://ift.tt/2EVNM98
Submitted February 28, 2018 at 05:19AM by apelszynska
via reddit http://ift.tt/2BWuldh
http://ift.tt/2EVNM98
Submitted February 28, 2018 at 05:19AM by apelszynska
via reddit http://ift.tt/2BWuldh
Forbes
Building Smart Cities And A Smarter Youth Population
We must begin to see people as critical factors in facilitating desired technology advancements. Aligning the training supporting each phase of new capability with human response capacity will provide a strong foundation.
TCP connection hijacking in rust
http://ift.tt/2GNXhDI
Submitted February 28, 2018 at 05:46AM by kpcyrd
via reddit http://ift.tt/2HQNa24
http://ift.tt/2GNXhDI
Submitted February 28, 2018 at 05:46AM by kpcyrd
via reddit http://ift.tt/2HQNa24
GitHub
GitHub - kpcyrd/rshijack: tcp connection hijacker, rust rewrite of shijack
tcp connection hijacker, rust rewrite of shijack. Contribute to kpcyrd/rshijack development by creating an account on GitHub.
Using Deep Learning to protect data in IoT
http://ift.tt/2F3bPP6
Submitted February 28, 2018 at 05:53AM by k3170makan
via reddit http://ift.tt/2EY8mWj
http://ift.tt/2F3bPP6
Submitted February 28, 2018 at 05:53AM by k3170makan
via reddit http://ift.tt/2EY8mWj
Y Combinator Alumni Raise $3 Million for Security Startup Temblarbit
http://ift.tt/2EY4gfU
Submitted February 28, 2018 at 05:47AM by zinsi-
via reddit http://ift.tt/2F3ceRC
http://ift.tt/2EY4gfU
Submitted February 28, 2018 at 05:47AM by zinsi-
via reddit http://ift.tt/2F3ceRC
Fortune
Exclusive: Ex-Synack Engineers Raise $3 Million for Security Startup
The founders graduated from startup accelerator YCombinator last summer.
SGX SPectre Attacks: Leaking Enclave Secrets via Speculative Execution
http://ift.tt/2EYdQw9
Submitted February 28, 2018 at 08:32AM by TechLord2
via reddit http://ift.tt/2BUTZ2k
http://ift.tt/2EYdQw9
Submitted February 28, 2018 at 08:32AM by TechLord2
via reddit http://ift.tt/2BUTZ2k
Security Breach Case Studies
Hey everyone,So I'm looking and putting together a bit of material to eventually present to prospective clients at Law Firms and/or HIPAA compliant businesses. I am more or less looking for any case studies surrounding data breaches with small HIPAA compliant businesses or legal firms and figured that this sub reddit would likely have seen some articles around the place. I've done a bit of searching myself but am finding nothing but "case studies" done by anti-virus vendors.If anyone could point me in the right direction of some case studies I'd be eternally grateful.Thanks!
Submitted February 28, 2018 at 09:24AM by Noisyink
via reddit http://ift.tt/2CLsuoH
Hey everyone,So I'm looking and putting together a bit of material to eventually present to prospective clients at Law Firms and/or HIPAA compliant businesses. I am more or less looking for any case studies surrounding data breaches with small HIPAA compliant businesses or legal firms and figured that this sub reddit would likely have seen some articles around the place. I've done a bit of searching myself but am finding nothing but "case studies" done by anti-virus vendors.If anyone could point me in the right direction of some case studies I'd be eternally grateful.Thanks!
Submitted February 28, 2018 at 09:24AM by Noisyink
via reddit http://ift.tt/2CLsuoH