Psono's new security report checks 5 billion passwords
http://ift.tt/2p5AA6K
Submitted March 11, 2018 at 12:34PM by chickahoona
via reddit http://ift.tt/2Gf7euB
http://ift.tt/2p5AA6K
Submitted March 11, 2018 at 12:34PM by chickahoona
via reddit http://ift.tt/2Gf7euB
Psono
New Security Report
Adding haveibeenpwned.com API to Psono
China has no security flaws. Honest.
http://ift.tt/2IdjufP
Submitted March 11, 2018 at 10:51AM by Alan976
via reddit http://ift.tt/2HocOdP
http://ift.tt/2IdjufP
Submitted March 11, 2018 at 10:51AM by Alan976
via reddit http://ift.tt/2HocOdP
BleepingComputer
Chinese Intelligence Agencies Are Doctoring the Country's Vulnerability Database
Chinese intelligence agencies are doctoring the Chinese National Vulnerabilities Database (CNNVD) to hide security flaws that government hackers might have an interest in, according to a report released on Friday by US threat intelligence firm Recorded Future.
New IoT security rules: Stop using default passwords and allow software updates
http://zd.net/2tmj4jX
Submitted March 11, 2018 at 02:44PM by Iot_Security
via reddit http://ift.tt/2p2Oqra
http://zd.net/2tmj4jX
Submitted March 11, 2018 at 02:44PM by Iot_Security
via reddit http://ift.tt/2p2Oqra
ZDNet
New IoT security rules: Stop using default passwords and allow software updates | ZDNet
New rules set out best practice for IoT devices, but are the makers going to listen?
Various Docker Images for Pentesting
http://ift.tt/2HngNHj
Submitted March 11, 2018 at 04:40PM by ZephrX112
via reddit http://ift.tt/2FLAFHf
http://ift.tt/2HngNHj
Submitted March 11, 2018 at 04:40PM by ZephrX112
via reddit http://ift.tt/2FLAFHf
GitHub
ZephrFish/DockerAttack
DockerAttack - Various Tools and Docker Images
Defeating WordPress Security Plugins (file integrity)
http://ift.tt/2FwU1fK
Submitted March 11, 2018 at 04:28PM by gid0rah
via reddit http://ift.tt/2FKdDjG
http://ift.tt/2FwU1fK
Submitted March 11, 2018 at 04:28PM by gid0rah
via reddit http://ift.tt/2FKdDjG
x-c3ll.github.io
Defeating WordPress Security Plugins (Revisited) ::
DoomsDay Vault
DoomsDay Vault
Article about how to subvert file integrity checks made by most popular WordPress Plugins
Docker for Hackers, a pen tester’s guide
http://ift.tt/2IgI7bB
Submitted March 11, 2018 at 04:19PM by m0rv4i
via reddit http://ift.tt/2p6omL5
http://ift.tt/2IgI7bB
Submitted March 11, 2018 at 04:19PM by m0rv4i
via reddit http://ift.tt/2p6omL5
Pentestpartners
Docker for Hackers? A pen tester's guide | Pen Test Partners
I recently started using Docker as my main platform for penetration testing and exploring the advantages it can provide. If you're interested in running self-contained, lightweight environments that take seconds to start, then read on. I guess the first question…
PyREBox - a Python noscriptable Reverse Engineering sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU [With Full Sources - See Comment]
http://ift.tt/2FHHEkh
Submitted March 11, 2018 at 05:49PM by TechLord2
via reddit http://ift.tt/2FyJxfU
http://ift.tt/2FHHEkh
Submitted March 11, 2018 at 05:49PM by TechLord2
via reddit http://ift.tt/2FyJxfU
My solution to Imagination crackme by kratorius
http://ift.tt/2p0wQ7k
Submitted March 11, 2018 at 05:21PM by khasaia
via reddit http://ift.tt/2tvqiSE
http://ift.tt/2p0wQ7k
Submitted March 11, 2018 at 05:21PM by khasaia
via reddit http://ift.tt/2tvqiSE
secrary[dot]com
Imagination by kratorius
This blog is about malware analysis and reverse engineering. I’m Lasha Khasaia
Northern Ireland's police have released an 'anonymised' database containing details about every firearm license holder in the country, except serving law enforcement.
http://ift.tt/2FyOVQb
Submitted March 11, 2018 at 05:36PM by Nyxi26
via reddit http://ift.tt/2FspGmF
http://ift.tt/2FyOVQb
Submitted March 11, 2018 at 05:36PM by Nyxi26
via reddit http://ift.tt/2FspGmF
the Guardian
Northern Ireland's firearms licence holders: the full list
Data released by the Police Service of Northern Ireland has provided a rare insight into the service's firearms licensing database. Kathryn Torney from The Detail investigative news website in Belfast explores the data
Router - Hacking 'Slingshot' Spy Operation Compromised More Than 100 Targets
http://ift.tt/2FKdw7R
Submitted March 11, 2018 at 06:21PM by Iot_Security
via reddit http://ift.tt/2Hqnrg9
http://ift.tt/2FKdw7R
Submitted March 11, 2018 at 06:21PM by Iot_Security
via reddit http://ift.tt/2Hqnrg9
WIRED
Router-Hacking 'Slingshot' Spy Operation Compromised More Than 100 Targets
A sophisticated hacking campaign used routers as a stepping stone to plant spyware deep in target machines across the Middle East and Africa.
GitHub just suffered the world’s biggest DDoS attack—and barely blinked
http://ift.tt/2Dk2q49
Submitted March 11, 2018 at 09:01PM by yhuag
via reddit http://ift.tt/2txy66B
http://ift.tt/2Dk2q49
Submitted March 11, 2018 at 09:01PM by yhuag
via reddit http://ift.tt/2txy66B
MIT Technology Review
GitHub just suffered the world’s biggest DDoS attack—and barely blinked
The site, which many developers use to store code, was knocked offline briefly this week by hackers who flooded it with fake traffic.
The CISO at Skyscanner talks about third-party pen testing
http://ift.tt/2FePW3D
Submitted March 11, 2018 at 10:28PM by ju1i3k
via reddit http://ift.tt/2FzGsw0
http://ift.tt/2FePW3D
Submitted March 11, 2018 at 10:28PM by ju1i3k
via reddit http://ift.tt/2FzGsw0
Help Net Security
How to choose a penetration testing service - Help Net Security
Outsourcing your penetration testing efforts can offer fresh and customized methodologies that can be utilized by the external resources which usually means better quality and coverage.
How to: Alibaba CDN Domain Fronting
http://ift.tt/2tBpJXt
Submitted March 11, 2018 at 10:46PM by vysec
via reddit http://ift.tt/2tAhg71
http://ift.tt/2tBpJXt
Submitted March 11, 2018 at 10:46PM by vysec
via reddit http://ift.tt/2tAhg71
Medium
Alibaba CDN Domain Fronting
Author: @vysecurity
Avoid pentesting firms who piggyback security buzz words and price-dump with low-quality reports.
http://ift.tt/2Fn1bqK
Submitted March 11, 2018 at 10:31PM by xrna
via reddit http://ift.tt/2IhqhFm
http://ift.tt/2Fn1bqK
Submitted March 11, 2018 at 10:31PM by xrna
via reddit http://ift.tt/2IhqhFm
Cyber Sins Security Blog
Security is not a buzz-word business model, but our cumulative effort
This article conveys my personal opinion towards security and it's underlying revenue model; I would recommend to read it with a pinch of salt (+ tequila, while we are on it). I shall be covering either side of the coin, the heads where pentesters try to…
The simplest things that should change on your site for GDPR compliance.
http://ift.tt/2IkpP9A
Submitted March 12, 2018 at 01:25AM by ded1cated
via reddit http://ift.tt/2p6GKDE
http://ift.tt/2IkpP9A
Submitted March 12, 2018 at 01:25AM by ded1cated
via reddit http://ift.tt/2p6GKDE
WebARX
GDPR - What is on stake for website owners?
In the process of understanding GDPR the most important this is to read, learn and also communicate it to your employees so that everyone understands the severity of this regulation.
Surprise: Norks not actually behind Olympic Destroyer malware outbreak – Kaspersky
http://ift.tt/2DjtXCL
Submitted March 12, 2018 at 01:17AM by NetAbel
via reddit http://ift.tt/2IiwdxZ
http://ift.tt/2DjtXCL
Submitted March 12, 2018 at 01:17AM by NetAbel
via reddit http://ift.tt/2IiwdxZ
www.theregister.co.uk
Surprise: Norks not actually behind Olympic Destroyer malware outbreak – Kaspersky
Who framed Pyongyang, then, we wonder
Looking for information on Australia university Information Assurance / Security certification course
About 3 years ago, I read an article on a Australia university that was starting a certification program in Information Assurance / Security that was to be about a year long. The program was designed to take folks off the street with no background and get them prepared for entry level IA positions. I would like to find some additional information on it....what university?the overall outcome of the certificate course?how things went?how successful the participants have been?I thought that I had bookmarked the article, but can't find it, and searching has not provided any information.If someone knows of, or remembers this or has a link to the article - I would appreciate it very much.TIA!!
Submitted March 12, 2018 at 12:57AM by io-io
via reddit http://ift.tt/2p6oHxu
About 3 years ago, I read an article on a Australia university that was starting a certification program in Information Assurance / Security that was to be about a year long. The program was designed to take folks off the street with no background and get them prepared for entry level IA positions. I would like to find some additional information on it....what university?the overall outcome of the certificate course?how things went?how successful the participants have been?I thought that I had bookmarked the article, but can't find it, and searching has not provided any information.If someone knows of, or remembers this or has a link to the article - I would appreciate it very much.TIA!!
Submitted March 12, 2018 at 12:57AM by io-io
via reddit http://ift.tt/2p6oHxu
reddit
Looking for information on Australia university... • r/security
About 3 years ago, I read an article on a Australia university that was starting a certification program in Information Assurance / Security that...
Any Run – Free interactive malware hunting service
https://any.run/
Submitted March 12, 2018 at 02:42AM by Fake4d
via reddit http://ift.tt/2FrY2Gq
https://any.run/
Submitted March 12, 2018 at 02:42AM by Fake4d
via reddit http://ift.tt/2FrY2Gq
any.run
ANY.RUN - Interactive Online Malware Sandbox
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
Cyber Espionage Campaign 'Slingshot' Targets Victims Via Routers | Threatpost
http://ift.tt/2p4m8Mk
Submitted March 12, 2018 at 02:35AM by majorllama
via reddit http://ift.tt/2GhAwZM
http://ift.tt/2p4m8Mk
Submitted March 12, 2018 at 02:35AM by majorllama
via reddit http://ift.tt/2GhAwZM
Threatpost | The first stop for security news
Cyber Espionage Campaign 'Slingshot' Targets Victims Via Routers
Researchers have uncovered a new cyber-espionage threat that uses MikroTik routers as a springboard to launch attacks within a network.
Weird routing table when using LTE should I worry?
http://ift.tt/2FuT23S
Submitted March 12, 2018 at 05:57AM by SimonBaston
via reddit http://ift.tt/2Dj15uB
http://ift.tt/2FuT23S
Submitted March 12, 2018 at 05:57AM by SimonBaston
via reddit http://ift.tt/2Dj15uB
Fuzzing arbitrary functions in ELF binaries
http://ift.tt/2Dlh8rv
Submitted March 12, 2018 at 07:41AM by grajagandev
via reddit http://ift.tt/2Fu4tbV
http://ift.tt/2Dlh8rv
Submitted March 12, 2018 at 07:41AM by grajagandev
via reddit http://ift.tt/2Fu4tbV
blahcat.github.io
Fuzzing arbitrary functions in ELF binaries - Blah Cats
Tales of a binary encoded life...