I emailed the Equifax hackers... And they emailed back
http://ift.tt/2eMw73Z
Submitted September 09, 2017 at 06:47AM by lgats
via reddit http://ift.tt/2xVAzGa
http://ift.tt/2eMw73Z
Submitted September 09, 2017 at 06:47AM by lgats
via reddit http://ift.tt/2xVAzGa
R Blog
An email from the Russian Equifax Hackers - R Blog
I emailed the Equifax hackers at the and they responded with the following: We are processing information is not a single file and we must still unite which data correspond to which people. We are not going to give interviews. We do not have expectations…
A reliable automated tool for testing and exploiting Apache Struts CVE-2017-9805
http://ift.tt/2xjwtuv
Submitted September 09, 2017 at 07:21AM by mazen160
via reddit http://ift.tt/2vUBgCc
http://ift.tt/2xjwtuv
Submitted September 09, 2017 at 07:21AM by mazen160
via reddit http://ift.tt/2vUBgCc
GitHub
mazen160/struts-pwn_CVE-2017-9805
struts-pwn_CVE-2017-9805 - An exploit for Apache Struts CVE-2017-9805
Over 32 character password is apparently weak for an apple ID
http://ift.tt/2jbFUWA
Submitted September 09, 2017 at 08:33AM by JBaczuk
via reddit http://ift.tt/2xc5XCh
http://ift.tt/2jbFUWA
Submitted September 09, 2017 at 08:33AM by JBaczuk
via reddit http://ift.tt/2xc5XCh
Jordan Baczuk
Over 32 character password is apparently weak for an apple ID
I went to appleid.apple.com to change my password using a psuedorandom character generator and apparently 32 characters is weak: I'm sure it was just overlooked, I just thought it was funny.
Equifax blaming Apache Struts
http://ift.tt/2xRUEMF
Submitted September 09, 2017 at 09:31AM by cdtoad
via reddit http://ift.tt/2wfTXLK
http://ift.tt/2xRUEMF
Submitted September 09, 2017 at 09:31AM by cdtoad
via reddit http://ift.tt/2wfTXLK
New York Post
Equifax blames giant breach on vendor software flaw
Equifax on Friday blamed a flaw in the software running its online databases for allowing hackers to steal the personal information of as many as 143 million Americans, The Post has learned. Hackers
How the Equifax Breach page should have read
http://ift.tt/2vUlg37
Submitted September 09, 2017 at 11:26AM by devillius1
via reddit http://ift.tt/2wPKb6K
http://ift.tt/2vUlg37
Submitted September 09, 2017 at 11:26AM by devillius1
via reddit http://ift.tt/2wPKb6K
reddit
How the Equifax Breach page should have read • r/netsec
3 points and 0 comments so far on reddit
Q&A: Web Application Security Scanning with Netsparker » CyberPunk
http://ift.tt/2jI9bD4
Submitted September 09, 2017 at 03:15PM by ClickWD
via reddit http://ift.tt/2eTN7ce
http://ift.tt/2jI9bD4
Submitted September 09, 2017 at 03:15PM by ClickWD
via reddit http://ift.tt/2eTN7ce
CyberPunk
Q&A: Web Application Security Scanning with Netsparker » CyberPunk
Q&A with Huseyin Tufekcilerli, the lead developer of Netsparker Desktop web application security scanner More than 70% of all cyber breaches invol
Awesome AI Security - curated list of AI security resources
http://ift.tt/2gSiPaz
Submitted September 10, 2017 at 03:11AM by RandomAdversary
via reddit http://ift.tt/2eUWnwK
http://ift.tt/2gSiPaz
Submitted September 10, 2017 at 03:11AM by RandomAdversary
via reddit http://ift.tt/2eUWnwK
GitHub
RandomAdversary/Awesome-AI-Security
Awesome-AI-Security - :file_folder: #AISecurity
Researcher Publishes Details on Unpatched D-Link Router Flaws
http://ift.tt/2xmtt0o
Submitted September 10, 2017 at 06:56AM by majorllama
via reddit http://ift.tt/2xmTCMp
http://ift.tt/2xmtt0o
Submitted September 10, 2017 at 06:56AM by majorllama
via reddit http://ift.tt/2xmTCMp
BleepingComputer
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers.
Apache Struts Statement on Equifax Security Breach
http://ift.tt/2whrNjG
Submitted September 10, 2017 at 08:36AM by ffyns
via reddit http://ift.tt/2wRDMI0
http://ift.tt/2whrNjG
Submitted September 10, 2017 at 08:36AM by ffyns
via reddit http://ift.tt/2wRDMI0
reddit
Apache Struts Statement on Equifax Security Breach • r/netsec
2 points and 1 comments so far on reddit
Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
http://ift.tt/2vWSNtx
Submitted September 10, 2017 at 04:40PM by balajinm
via reddit http://ift.tt/2wi8iY4
http://ift.tt/2vWSNtx
Submitted September 10, 2017 at 04:40PM by balajinm
via reddit http://ift.tt/2wi8iY4
GBHackers On Security
Kali Linux Tutorial - Toolkit for mitm, Spoofing, DOS, Images Sniffing
Kali Linux Tutorial for Xerosploit to Perform mitm, Spoofing, DOS, Images Sniffing/Replacement, Webpage Defacement Attacks.
Intro. to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shell
http://ift.tt/2jg2KMr
Submitted September 10, 2017 at 04:34PM by Glenny5
via reddit http://ift.tt/2wRNuKw
http://ift.tt/2jg2KMr
Submitted September 10, 2017 at 04:34PM by Glenny5
via reddit http://ift.tt/2wRNuKw
glem
Introduction to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shell
In this article, we will go through and exploit the simplest vulnerability in the HEVD driver - the stack buffer overflow. First things first, let's load up the driver .sys file in IDA and have a look at how it is structured. You'll be glad to know that the…
Reverse Engineering and Exploitation of a “Connected Alarm Clock”
http://ift.tt/2eOOAwP
Submitted September 10, 2017 at 08:08PM by Kefused
via reddit http://ift.tt/2wiHU0h
http://ift.tt/2eOOAwP
Submitted September 10, 2017 at 08:08PM by Kefused
via reddit http://ift.tt/2wiHU0h
Ahead of Touch IDs replacement, I took a close look at the security mechanisms employed to store a fingerprint on iOS.
http://ift.tt/2xeBh3m
Submitted September 11, 2017 at 01:15AM by GravitasQ1
via reddit http://ift.tt/2fbZ0ap
http://ift.tt/2xeBh3m
Submitted September 11, 2017 at 01:15AM by GravitasQ1
via reddit http://ift.tt/2fbZ0ap
Medium
Demystifying Apple’s Touch ID
The new iPhone will replace Touch ID with Face ID; But what are the mechanisms that for years stored our Fingerprints so safely? I took a…
This is a walkthrough of Kioptrix Level 1.1 from Vulnhub.com. In this walkthrough I use SQL injection and a kernel exploit to root this vulnerable machine. This is one of many vms I worked on while studying for the OSCP.
http://ift.tt/2wj53j6
Submitted September 11, 2017 at 04:27AM by InfoSecJim
via reddit http://ift.tt/2wTmf0y
http://ift.tt/2wj53j6
Submitted September 11, 2017 at 04:27AM by InfoSecJim
via reddit http://ift.tt/2wTmf0y
Jim Wilbur's Blog
Kioptrix: Level 1.1 Walkthrough – Vulnhub - Jim Wilbur's Blog
Kioptrix Level 1.1 Walkthrough from Vulnhub.com. In this walkthrough I take advantage of SQLi and a kernel exploit. Kioptrix Level 1.2 coming soon
How to protect yourself from the Equifax hack
http://ift.tt/2xWQO5y
Submitted September 11, 2017 at 05:59AM by rhinoplzno
via reddit http://ift.tt/2eXLpa5
http://ift.tt/2xWQO5y
Submitted September 11, 2017 at 05:59AM by rhinoplzno
via reddit http://ift.tt/2eXLpa5
Medium
How To Protect Yourself From The Equifax Hack
Equifax, one of the nation’s three major credit reporting agencies, has reported a massive hack potentially exposing the sensitive personal…
Equifax Data Breach - i24News
http://ift.tt/2jfCEcu
Submitted September 11, 2017 at 01:16PM by Skellem
via reddit http://ift.tt/2xf5NKm
http://ift.tt/2jfCEcu
Submitted September 11, 2017 at 01:16PM by Skellem
via reddit http://ift.tt/2xf5NKm
Mazebolt
Live on i24 MazeBolt CEO: Equifax Data Breach
Matthew Andriani hosted on i24
Found this pearl of wisdom on redhat's documentation regarding password policy. "consider a variation of a word, such as a1rPl4nE for airplane. "
http://ift.tt/2wjBqy9
Submitted September 11, 2017 at 01:57PM by meeds122
via reddit http://ift.tt/2xq0lFk
http://ift.tt/2wjBqy9
Submitted September 11, 2017 at 01:57PM by meeds122
via reddit http://ift.tt/2xq0lFk
Why do you need a strong Data Protection Policy for your website?
http://ift.tt/2xZzL2T
Submitted September 11, 2017 at 05:49PM by designdirect123
via reddit http://ift.tt/2wUTJxv
http://ift.tt/2xZzL2T
Submitted September 11, 2017 at 05:49PM by designdirect123
via reddit http://ift.tt/2wUTJxv
Designdirectuk
Why do you need a strong Data Protection Policy for your website?
strong Data Protection Policy, website,
A Method for Web Security Policies
http://ift.tt/2xoV3tA
Submitted September 11, 2017 at 07:00PM by benichmt1
via reddit http://ift.tt/2ePSyVY
http://ift.tt/2xoV3tA
Submitted September 11, 2017 at 07:00PM by benichmt1
via reddit http://ift.tt/2ePSyVY
datatracker.ietf.org
draft-foudil-securitytxt-00 - A Method for Web Security Policies
A Method for Web Security Policies (Internet-Draft, 2017)
BSidesCHS 2016: "Shellcoding basics" - Max Harley
http://ift.tt/2eZYuQ7
Submitted September 11, 2017 at 07:33PM by iamhabibone
via reddit http://ift.tt/2wSnfoj
http://ift.tt/2eZYuQ7
Submitted September 11, 2017 at 07:33PM by iamhabibone
via reddit http://ift.tt/2wSnfoj
IAMHABIB.NET
[Video] BSidesCHS 2016: "Shellcoding basics" - Max Harley - IAMHABIB.NET
IAMHABIB.NET is the videos tube site on Hacking, Security, Reverse Engineering and Social Engineeering
How can decentralised storage models prevent massive data breaches?
http://ift.tt/2jizHrO
Submitted September 11, 2017 at 09:16PM by milly1993
via reddit http://ift.tt/2fd3TjJ
http://ift.tt/2jizHrO
Submitted September 11, 2017 at 09:16PM by milly1993
via reddit http://ift.tt/2fd3TjJ
Medium
How can decentralised storage models prevent massive data breaches?
Is India’s biometric database a massive achievement or a dystopian nightmare? Can blockchain technology transform the security industry?