Justifying Security Spend, a Response
https://www.youtube.com/watch?v=s8RrLtj8oBA&t=1s
Submitted March 08, 2018 at 07:26PM by Uminekoshi
via reddit http://ift.tt/2D983SM
https://www.youtube.com/watch?v=s8RrLtj8oBA&t=1s
Submitted March 08, 2018 at 07:26PM by Uminekoshi
via reddit http://ift.tt/2D983SM
YouTube
Justifying Security Spend, a Response from Nehemiah Security: Part 1
In this video, Jerry Caponera responds to an entry in our eBook about "7 Experts on Justifying Security Spend" written by Surinder Lall. If your friend was p...
How to secure communications on your smartphone
http://ift.tt/2FlzKh5
Submitted March 08, 2018 at 08:25PM by LoiSmuts
via reddit http://ift.tt/2FpOtDK
http://ift.tt/2FlzKh5
Submitted March 08, 2018 at 08:25PM by LoiSmuts
via reddit http://ift.tt/2FpOtDK
Punch Newspapers
How to secure communications on your smartphone
Due to the overnight success of smartphones, millions of people are connecting with others. Most of this communication is happening in the open where any hacker can intercept and share in the discu...
Hardcoded password and Java deserialization flaws found in Cisco products
http://ift.tt/2Fsqqnw
Submitted March 08, 2018 at 08:06PM by CasperVPN
via reddit http://ift.tt/2twen7m
http://ift.tt/2Fsqqnw
Submitted March 08, 2018 at 08:06PM by CasperVPN
via reddit http://ift.tt/2twen7m
Security Affairs
Hardcoded password and Java deserialization flaw found in Cisco products
The set of security updates recently released by Cisco also includes two advisories for critical vulnerabilities, a hardcoded password, and a Java deserialization flaw.
Malware: LokiBot malware is actively being distributed via a spam email campaign in the UK.
http://ift.tt/2tnmOS8
Submitted March 08, 2018 at 08:20PM by EclecticIQ
via reddit http://ift.tt/2oT6Pqh
http://ift.tt/2tnmOS8
Submitted March 08, 2018 at 08:20PM by EclecticIQ
via reddit http://ift.tt/2oT6Pqh
EclecticIQ
Large Lokibot Malspam Campaign Hitting The UK
Malware: LokiBot malware is actively being distributed via a spam email campaign in the UK.
Phishing done right with a little help from the banks
http://ift.tt/2HiJzsJ
Submitted March 08, 2018 at 09:49PM by jekapats
via reddit http://ift.tt/2DaweAn
http://ift.tt/2HiJzsJ
Submitted March 08, 2018 at 09:49PM by jekapats
via reddit http://ift.tt/2DaweAn
PhishAI
With a Little Help From The Banks | PhishAI
In this post, I’ll analyse a phishing attack we recently encountered in the wild targeting NAB (National Australia Bank) implementing two phishing techniques: “The Phishing Collage” (you can read about it in a previous post) and a new technique we … Read…
Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns
http://ift.tt/2Fmmc4d
Submitted March 08, 2018 at 08:48PM by whitehattracker
via reddit http://ift.tt/2Fm86AB
http://ift.tt/2Fmmc4d
Submitted March 08, 2018 at 08:48PM by whitehattracker
via reddit http://ift.tt/2Fm86AB
Blog | Imperva
Hunting for Insider Threats: Using Activity Modeling to Detect Suspicious Database Commands and Access Patterns
Common practices insiders use to infiltrate databases and introduce new detection techniques developed to detect suspicious database commands and access patterns.
Does SSL prevent or help with DDoS and other attacks?
We are running a media website with 20.000 daily visitors. Quite often we are attacked with DDoS and other nasty things. Currently we don't have SSL installed. Could somebody please confirm, will SSL help to mitigate any attacks and will it be useful for us?
Submitted March 08, 2018 at 08:37PM by vadikcoma
via reddit http://ift.tt/2HiR8iS
We are running a media website with 20.000 daily visitors. Quite often we are attacked with DDoS and other nasty things. Currently we don't have SSL installed. Could somebody please confirm, will SSL help to mitigate any attacks and will it be useful for us?
Submitted March 08, 2018 at 08:37PM by vadikcoma
via reddit http://ift.tt/2HiR8iS
reddit
Does SSL prevent or help with DDoS and other attacks? • r/security
We are running a media website with 20.000 daily visitors. Quite often we are attacked with DDoS and other nasty things. Currently we don't have...
Windows AD/ MIT Kerberos password policy project. Full Source provided, supports blocking on similar previous and breached password lists (ordered md5,sha1,sha256,etc).
http://ift.tt/2Dan86F
Submitted March 08, 2018 at 10:45PM by gizzardbus
via reddit http://ift.tt/2FDKlTO
http://ift.tt/2Dan86F
Submitted March 08, 2018 at 10:45PM by gizzardbus
via reddit http://ift.tt/2FDKlTO
GitHub
CboeSecurity/password_pwncheck
password_pwncheck - Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules
A House of Cards: An Exploration of Security When Building Docker Containers
http://ift.tt/2FD8J8f
Submitted March 08, 2018 at 11:08PM by cji
via reddit http://ift.tt/2FyGLdR
http://ift.tt/2FD8J8f
Submitted March 08, 2018 at 11:08PM by cji
via reddit http://ift.tt/2FyGLdR
Heroku
A House of Cards: An Exploration of Security When Building Docker Containers
Docker likely features somewhere in your CI pipeline. We examine some pitfalls that could lead to security vulnerabilities in these build environments.
memcachedump - Use your Shodan API Key to dump all the contents of exposed memcached servers. (There are +108000 on Shodan as of today.)
http://ift.tt/2FyMvEr
Submitted March 08, 2018 at 11:42PM by jalospinoso
via reddit http://ift.tt/2FlhjZW
http://ift.tt/2FyMvEr
Submitted March 08, 2018 at 11:42PM by jalospinoso
via reddit http://ift.tt/2FlhjZW
GitHub
JLospinoso/memcachedump
memcachedump - Use your Shodan API Key to dump all the contents of exposed memcached servers.
memcachedump - Use your Shodan API Key to dump all the contents of exposed memcached servers. (There are +108000 on Shodan as of today.)
http://ift.tt/2FyMvEr
Submitted March 08, 2018 at 11:42PM by jalospinoso
via reddit http://ift.tt/2FlhjZW
http://ift.tt/2FyMvEr
Submitted March 08, 2018 at 11:42PM by jalospinoso
via reddit http://ift.tt/2FlhjZW
GitHub
JLospinoso/memcachedump
memcachedump - Use your Shodan API Key to dump all the contents of exposed memcached servers.
Look-Alike Domains and Visual Confusion
http://ift.tt/2FBUbFH
Submitted March 09, 2018 at 12:12AM by volci
via reddit http://ift.tt/2G82jf1
http://ift.tt/2FBUbFH
Submitted March 09, 2018 at 12:12AM by volci
via reddit http://ift.tt/2G82jf1
reddit
Look-Alike Domains and Visual Confusion • r/security
2 points and 0 comments so far on reddit
Smart traffic lights cause jams when fed spoofed data
http://ift.tt/2IbkxNp
Submitted March 09, 2018 at 12:08AM by volci
via reddit http://ift.tt/2FpMRtK
http://ift.tt/2IbkxNp
Submitted March 09, 2018 at 12:08AM by volci
via reddit http://ift.tt/2FpMRtK
Naked Security
Smart traffic lights cause jams when fed spoofed data
Researchers have found that attack cars sending out fake trajectory data can plug up an intersection solid.
Kill Switch Can Mitigate Massive DDoS Attacks Via Memcached Servers
http://ift.tt/2G7JoRH
Submitted March 09, 2018 at 12:55AM by Horus_Sirius
via reddit http://ift.tt/2D92Zxz
http://ift.tt/2G7JoRH
Submitted March 09, 2018 at 12:55AM by Horus_Sirius
via reddit http://ift.tt/2D92Zxz
TSecurity Portal
Kill Switch Can Mitigate Massive DDoS Attacks Via Memcached Servers
RedisWannaMine Unveiled: New Cryptojacking Attack Powered by Redis and NSA Exploits
http://ift.tt/2p3EwoG
Submitted March 09, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2G7JsRr
http://ift.tt/2p3EwoG
Submitted March 09, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2G7JsRr
Blog | Imperva
RedisWannaMine Unveiled: New Cryptojacking Attack Powered by Redis and NSA Exploits
Recently cryptojacking attacks have been spreading like wildfire. This week we saw a new generation of cryptojacking attacks aimed at both database servers and application servers. We dubbed one of these attacks RedisWannaMine. Read on.
Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.
http://ift.tt/2G826Zq
Submitted March 09, 2018 at 01:24AM by digicat
via reddit http://ift.tt/2FqyDJ2
http://ift.tt/2G826Zq
Submitted March 09, 2018 at 01:24AM by digicat
via reddit http://ift.tt/2FqyDJ2
GitHub
shellster/DCSYNCMonitor
DCSYNCMonitor - Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.
Getting a Cybersecurity Job
http://ift.tt/2Fl2mqE
Submitted March 09, 2018 at 03:43AM by 1cmk
via reddit http://ift.tt/2DbvOK2
http://ift.tt/2Fl2mqE
Submitted March 09, 2018 at 03:43AM by 1cmk
via reddit http://ift.tt/2DbvOK2
reddit
Getting a Cybersecurity Job • u/1cmk
After passing my CEH I have for the last 5 months been job hunting. How do I get into cybersecurity without experience? I don't have any IT...
What dangers/exploits might present if you were to add servers to the NTP Pool?
DO has a tutorial on adding Ubuntu servers to the NTP Pool (https://www.digitalocean.com/community/tutorials/how-to-configure-ntp-for-use-in-the-ntp-pool-project-on-ubuntu-16-04).I'm all for helping-out others (I run a couple mirrors in Germany for CentOS and Haiku OS, for example - but those are "just" websites).Are there any inherent dangers or possibe exploits in adding servers to the public NTP Pool, presuming you have the estimated bandwidth available (that article claims peak demand shouldn't exceed 150KB/s, which totals to <300GB, if it sits at that theoretical peak for 30 days).
Submitted March 09, 2018 at 05:31AM by volci
via reddit http://ift.tt/2oTwQpA
DO has a tutorial on adding Ubuntu servers to the NTP Pool (https://www.digitalocean.com/community/tutorials/how-to-configure-ntp-for-use-in-the-ntp-pool-project-on-ubuntu-16-04).I'm all for helping-out others (I run a couple mirrors in Germany for CentOS and Haiku OS, for example - but those are "just" websites).Are there any inherent dangers or possibe exploits in adding servers to the public NTP Pool, presuming you have the estimated bandwidth available (that article claims peak demand shouldn't exceed 150KB/s, which totals to <300GB, if it sits at that theoretical peak for 30 days).
Submitted March 09, 2018 at 05:31AM by volci
via reddit http://ift.tt/2oTwQpA
Digitalocean
How to Configure NTP for Use in the NTP Pool Project on Ubuntu 16.04 | DigitalOcean
Accurate time keeping is critical for almost any service or software. Emails, loggers, event systems and schedulers, user authentication mechanisms, and serv…
NSA tracking program watched foreign hackers in action
http://ift.tt/2G6JxF3
Submitted March 09, 2018 at 08:43AM by chull2058
via reddit http://ift.tt/2Fu5nku
http://ift.tt/2G6JxF3
Submitted March 09, 2018 at 08:43AM by chull2058
via reddit http://ift.tt/2Fu5nku
SearchSecurity
NSA tracking program watched foreign hackers in action
Research into the data leaked by the Shadow Brokers in 2017 showed an NSA tracking program to watch foreign hackers in real time and see what data is being stolen.
Malware attacks rocket, while SSL holds traffic keys
http://ift.tt/2oYUYGE
Submitted March 09, 2018 at 08:42AM by chull2058
via reddit http://ift.tt/2G5Oa1T
http://ift.tt/2oYUYGE
Submitted March 09, 2018 at 08:42AM by chull2058
via reddit http://ift.tt/2G5Oa1T
Htbridge
Malware attacks rocket, while SSL holds traffic keys
Growth in SSL having considerable impact on attacker strategies, as malware charts considerable rise.
CIGslip attack could allow hacker to bypass Microsoft Code Integrity Guard
http://ift.tt/2Dclj9j
Submitted March 09, 2018 at 03:52PM by CasperVPN
via reddit http://ift.tt/2G8pZ31
http://ift.tt/2Dclj9j
Submitted March 09, 2018 at 03:52PM by CasperVPN
via reddit http://ift.tt/2G8pZ31
Security Affairs
CIGslip attack could allow hacker to bypass Microsoft Code Integrity Guard
Security experts devised a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass Microsoft Code Integrity Guard (CIG)