Awesome AI Security - curated list of AI security resources
http://ift.tt/2gSiPaz
Submitted September 10, 2017 at 03:11AM by RandomAdversary
via reddit http://ift.tt/2eUWnwK
http://ift.tt/2gSiPaz
Submitted September 10, 2017 at 03:11AM by RandomAdversary
via reddit http://ift.tt/2eUWnwK
GitHub
RandomAdversary/Awesome-AI-Security
Awesome-AI-Security - :file_folder: #AISecurity
Researcher Publishes Details on Unpatched D-Link Router Flaws
http://ift.tt/2xmtt0o
Submitted September 10, 2017 at 06:56AM by majorllama
via reddit http://ift.tt/2xmTCMp
http://ift.tt/2xmtt0o
Submitted September 10, 2017 at 06:56AM by majorllama
via reddit http://ift.tt/2xmTCMp
BleepingComputer
Researcher Publishes Details on Unpatched D-Link Router Flaws
South Korean security researcher Pierre Kim has published details about ten vulnerabilities he discovered in the firmware of D-Link DIR 850L routers.
Apache Struts Statement on Equifax Security Breach
http://ift.tt/2whrNjG
Submitted September 10, 2017 at 08:36AM by ffyns
via reddit http://ift.tt/2wRDMI0
http://ift.tt/2whrNjG
Submitted September 10, 2017 at 08:36AM by ffyns
via reddit http://ift.tt/2wRDMI0
reddit
Apache Struts Statement on Equifax Security Breach • r/netsec
2 points and 1 comments so far on reddit
Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
http://ift.tt/2vWSNtx
Submitted September 10, 2017 at 04:40PM by balajinm
via reddit http://ift.tt/2wi8iY4
http://ift.tt/2vWSNtx
Submitted September 10, 2017 at 04:40PM by balajinm
via reddit http://ift.tt/2wi8iY4
GBHackers On Security
Kali Linux Tutorial - Toolkit for mitm, Spoofing, DOS, Images Sniffing
Kali Linux Tutorial for Xerosploit to Perform mitm, Spoofing, DOS, Images Sniffing/Replacement, Webpage Defacement Attacks.
Intro. to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shell
http://ift.tt/2jg2KMr
Submitted September 10, 2017 at 04:34PM by Glenny5
via reddit http://ift.tt/2wRNuKw
http://ift.tt/2jg2KMr
Submitted September 10, 2017 at 04:34PM by Glenny5
via reddit http://ift.tt/2wRNuKw
glem
Introduction to Windows Kernel Driver Exploitation (Pt. 2) - Stack Buffer Overflow to System Shell
In this article, we will go through and exploit the simplest vulnerability in the HEVD driver - the stack buffer overflow. First things first, let's load up the driver .sys file in IDA and have a look at how it is structured. You'll be glad to know that the…
Reverse Engineering and Exploitation of a “Connected Alarm Clock”
http://ift.tt/2eOOAwP
Submitted September 10, 2017 at 08:08PM by Kefused
via reddit http://ift.tt/2wiHU0h
http://ift.tt/2eOOAwP
Submitted September 10, 2017 at 08:08PM by Kefused
via reddit http://ift.tt/2wiHU0h
Ahead of Touch IDs replacement, I took a close look at the security mechanisms employed to store a fingerprint on iOS.
http://ift.tt/2xeBh3m
Submitted September 11, 2017 at 01:15AM by GravitasQ1
via reddit http://ift.tt/2fbZ0ap
http://ift.tt/2xeBh3m
Submitted September 11, 2017 at 01:15AM by GravitasQ1
via reddit http://ift.tt/2fbZ0ap
Medium
Demystifying Apple’s Touch ID
The new iPhone will replace Touch ID with Face ID; But what are the mechanisms that for years stored our Fingerprints so safely? I took a…
This is a walkthrough of Kioptrix Level 1.1 from Vulnhub.com. In this walkthrough I use SQL injection and a kernel exploit to root this vulnerable machine. This is one of many vms I worked on while studying for the OSCP.
http://ift.tt/2wj53j6
Submitted September 11, 2017 at 04:27AM by InfoSecJim
via reddit http://ift.tt/2wTmf0y
http://ift.tt/2wj53j6
Submitted September 11, 2017 at 04:27AM by InfoSecJim
via reddit http://ift.tt/2wTmf0y
Jim Wilbur's Blog
Kioptrix: Level 1.1 Walkthrough – Vulnhub - Jim Wilbur's Blog
Kioptrix Level 1.1 Walkthrough from Vulnhub.com. In this walkthrough I take advantage of SQLi and a kernel exploit. Kioptrix Level 1.2 coming soon
How to protect yourself from the Equifax hack
http://ift.tt/2xWQO5y
Submitted September 11, 2017 at 05:59AM by rhinoplzno
via reddit http://ift.tt/2eXLpa5
http://ift.tt/2xWQO5y
Submitted September 11, 2017 at 05:59AM by rhinoplzno
via reddit http://ift.tt/2eXLpa5
Medium
How To Protect Yourself From The Equifax Hack
Equifax, one of the nation’s three major credit reporting agencies, has reported a massive hack potentially exposing the sensitive personal…
Equifax Data Breach - i24News
http://ift.tt/2jfCEcu
Submitted September 11, 2017 at 01:16PM by Skellem
via reddit http://ift.tt/2xf5NKm
http://ift.tt/2jfCEcu
Submitted September 11, 2017 at 01:16PM by Skellem
via reddit http://ift.tt/2xf5NKm
Mazebolt
Live on i24 MazeBolt CEO: Equifax Data Breach
Matthew Andriani hosted on i24
Found this pearl of wisdom on redhat's documentation regarding password policy. "consider a variation of a word, such as a1rPl4nE for airplane. "
http://ift.tt/2wjBqy9
Submitted September 11, 2017 at 01:57PM by meeds122
via reddit http://ift.tt/2xq0lFk
http://ift.tt/2wjBqy9
Submitted September 11, 2017 at 01:57PM by meeds122
via reddit http://ift.tt/2xq0lFk
Why do you need a strong Data Protection Policy for your website?
http://ift.tt/2xZzL2T
Submitted September 11, 2017 at 05:49PM by designdirect123
via reddit http://ift.tt/2wUTJxv
http://ift.tt/2xZzL2T
Submitted September 11, 2017 at 05:49PM by designdirect123
via reddit http://ift.tt/2wUTJxv
Designdirectuk
Why do you need a strong Data Protection Policy for your website?
strong Data Protection Policy, website,
A Method for Web Security Policies
http://ift.tt/2xoV3tA
Submitted September 11, 2017 at 07:00PM by benichmt1
via reddit http://ift.tt/2ePSyVY
http://ift.tt/2xoV3tA
Submitted September 11, 2017 at 07:00PM by benichmt1
via reddit http://ift.tt/2ePSyVY
datatracker.ietf.org
draft-foudil-securitytxt-00 - A Method for Web Security Policies
A Method for Web Security Policies (Internet-Draft, 2017)
BSidesCHS 2016: "Shellcoding basics" - Max Harley
http://ift.tt/2eZYuQ7
Submitted September 11, 2017 at 07:33PM by iamhabibone
via reddit http://ift.tt/2wSnfoj
http://ift.tt/2eZYuQ7
Submitted September 11, 2017 at 07:33PM by iamhabibone
via reddit http://ift.tt/2wSnfoj
IAMHABIB.NET
[Video] BSidesCHS 2016: "Shellcoding basics" - Max Harley - IAMHABIB.NET
IAMHABIB.NET is the videos tube site on Hacking, Security, Reverse Engineering and Social Engineeering
How can decentralised storage models prevent massive data breaches?
http://ift.tt/2jizHrO
Submitted September 11, 2017 at 09:16PM by milly1993
via reddit http://ift.tt/2fd3TjJ
http://ift.tt/2jizHrO
Submitted September 11, 2017 at 09:16PM by milly1993
via reddit http://ift.tt/2fd3TjJ
Medium
How can decentralised storage models prevent massive data breaches?
Is India’s biometric database a massive achievement or a dystopian nightmare? Can blockchain technology transform the security industry?
Triaging Java JAR Malware
http://ift.tt/2jiRBKX
Submitted September 11, 2017 at 10:40PM by majorllama
via reddit http://ift.tt/2gY9MRX
http://ift.tt/2jiRBKX
Submitted September 11, 2017 at 10:40PM by majorllama
via reddit http://ift.tt/2gY9MRX
Ringzerolabs
Triaging Java JAR Files
Today we show how to quickly triage Java JAR files with a free and straightforward Java decompiler.
Improve Your Security Online —The Essential Data Protection Guide
http://ift.tt/2w0YE0V
Submitted September 11, 2017 at 09:56PM by Krikrikris
via reddit http://ift.tt/2wSbOgb
http://ift.tt/2w0YE0V
Submitted September 11, 2017 at 09:56PM by Krikrikris
via reddit http://ift.tt/2wSbOgb
StopAd Blog
Improve Your Security Online —The Essential Data Protection Guide
Data protection are increasingly important in tech-savvy world. Learn the latest essentials of online security with valuable data protection tools and tips.
Chrome's Plan to Distrust Symantec Certificates
http://ift.tt/2eQ2xKQ
Submitted September 12, 2017 at 04:15AM by grepnork
via reddit http://ift.tt/2gZPPtQ
http://ift.tt/2eQ2xKQ
Submitted September 12, 2017 at 04:15AM by grepnork
via reddit http://ift.tt/2gZPPtQ
Google Online Security Blog
Chrome’s Plan to Distrust Symantec Certificates
Posted by Devon O’Brien, Ryan Sleevi, Andrew Whalley, Chrome Security This post is a broader announcement of plans already finalized on t...
Windows Event Forwarding for Network Defense – Palantir – Medium
http://ift.tt/2jkKIcj
Submitted September 12, 2017 at 04:14AM by jeffmcjunkin
via reddit http://ift.tt/2w2nY6P
http://ift.tt/2jkKIcj
Submitted September 12, 2017 at 04:14AM by jeffmcjunkin
via reddit http://ift.tt/2w2nY6P
Medium
Windows Event Forwarding for Network Defense
Incident detection and response across thousands of hosts requires a deep understanding of actions and behavior across users, applications…
The IoT Attack Vector “BlueBorne” Exposes Almost Every Connected Device
http://ift.tt/2jjIolw
Submitted September 12, 2017 at 08:04PM by RandomFlotsam
via reddit http://ift.tt/2w51VMz
http://ift.tt/2jjIolw
Submitted September 12, 2017 at 08:04PM by RandomFlotsam
via reddit http://ift.tt/2w51VMz
armis
Blueborne • armis
The IoT Attack Vector “BlueBorne” Exposes Almost Every Connected Device General Overview Affected Devices Technical Overview General Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android…
The CERT Guide to Coordinated Vulnerability Disclosure
http://ift.tt/2wcbKr3
Submitted September 12, 2017 at 07:15PM by ascaroth
via reddit http://ift.tt/2h2cTIC
http://ift.tt/2wcbKr3
Submitted September 12, 2017 at 07:15PM by ascaroth
via reddit http://ift.tt/2h2cTIC
insights.sei.cmu.edu
The CERT Guide to Coordinated Vulnerability Disclosure
We are happy to announce the release of the CERT® Guide to Coordinated Vulnerability Disclosure (CVD). The guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful CVD process. It also provides insights…