IoT security warning: Cyber-attacks on medical devices could put patients at risk
http://ift.tt/2Du1FW8
Submitted March 17, 2018 at 12:06AM by EvanConover
via reddit http://ift.tt/2GBCOTu
http://ift.tt/2Du1FW8
Submitted March 17, 2018 at 12:06AM by EvanConover
via reddit http://ift.tt/2GBCOTu
ZDNet
IoT security warning: Cyber-attacks on medical devices could put patients at risk
More collaboration is needed in order to ensure internet-connected medical devices can't cause harm to patients, says research.
This alert from DHS/FBI on Russian intrusions into U.S. power companies is a good read if you are interested in how these kind of hacks are pulled off.
http://ift.tt/2hUJUXw
Submitted March 16, 2018 at 07:23AM by IUsedToBeACave
via reddit http://ift.tt/2IxTig7
http://ift.tt/2hUJUXw
Submitted March 16, 2018 at 07:23AM by IUsedToBeACave
via reddit http://ift.tt/2IxTig7
www.us-cert.gov
Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors
Since at least May 2017, threat actors have targeted government entities and the energy, water, aviation, nuclear, and critical manufacturing sectors, and, in some cases, have leveraged their capabilities to compromise victims’ networks. Historically, cyber…
Signature Spoofing Patcher for Android [Full Sources]
http://ift.tt/2fXAb1m
Submitted March 17, 2018 at 02:02AM by TechLord2
via reddit http://ift.tt/2pn5pUK
http://ift.tt/2fXAb1m
Submitted March 17, 2018 at 02:02AM by TechLord2
via reddit http://ift.tt/2pn5pUK
GitHub
Lanchon/haystack
haystack - Signature Spoofing Patcher for Android
Assassination Attempt on AMD by Viceroy Research & CTS Labs, AMD "Should Be $0"
http://ift.tt/2FETVmf
Submitted March 17, 2018 at 01:30AM by volci
via reddit http://ift.tt/2GzAAnD
http://ift.tt/2FETVmf
Submitted March 17, 2018 at 01:30AM by volci
via reddit http://ift.tt/2GzAAnD
www.gamersnexus.net
Assassination Attempt on AMD by Viceroy Research & CTS Labs, AMD 'Should Be $0' | GamersNexus - Gaming PC Builds & Hardware Benchmarks
There are roots in legitimacy here, but as we dug deep into the origins of the companies involved in this new hit piece on AMD, we found peculiar financial connections that make us question the motive behind the reportage.
Ex-Hacker Adrian Lamo Dies at Age 37 - RIP
http://ift.tt/2HDW8Pn
Submitted March 17, 2018 at 01:27AM by alessiodelv
via reddit http://ift.tt/2DzgCq2
http://ift.tt/2HDW8Pn
Submitted March 17, 2018 at 01:27AM by alessiodelv
via reddit http://ift.tt/2DzgCq2
The Hacker News
Ex-Hacker Adrian Lamo Dies at Age 37
Former Hacker Adrian Lamo, Who Turned In Wikileaks Informant Chelsea Manning (then Bradley Manning) to the FBI, Dies at 37.
Assassination Attempt on AMD by Viceroy Research & CTS Labs
https://youtu.be/ZZ7H1WTqaeo
Submitted March 17, 2018 at 02:36AM by -Argih
via reddit http://ift.tt/2FJpMGI
https://youtu.be/ZZ7H1WTqaeo
Submitted March 17, 2018 at 02:36AM by -Argih
via reddit http://ift.tt/2FJpMGI
YouTube
Assassination Attempt on AMD by Viceroy Research & CTS Labs
We delve into a security issue presented by CTS Labs and Viceroy Research, who jointly paint AMD in a much more negative light than we think fair.
Ad: Buy the Thermaltake View 71 on Amazon (https://goo.gl/XeV1Vu)
READ THE Article: https://www.gamersnexu…
Ad: Buy the Thermaltake View 71 on Amazon (https://goo.gl/XeV1Vu)
READ THE Article: https://www.gamersnexu…
Microsoft password length.
Hello,I have a pretty long password for my Microsoft account. It is more that 40 characters.However, someone mentioned to me that the maximum password length is 38 characters, can anyone confirm this?If this is the case, why am i able to login with a longer password, or is it the case that the service would ignore characters 39 and above?Any help would be appreciated.
Submitted March 17, 2018 at 06:02AM by Bango-Fett
via reddit http://ift.tt/2pkFDAd
Hello,I have a pretty long password for my Microsoft account. It is more that 40 characters.However, someone mentioned to me that the maximum password length is 38 characters, can anyone confirm this?If this is the case, why am i able to login with a longer password, or is it the case that the service would ignore characters 39 and above?Any help would be appreciated.
Submitted March 17, 2018 at 06:02AM by Bango-Fett
via reddit http://ift.tt/2pkFDAd
reddit
Microsoft password length. • r/security
Hello, I have a pretty long password for my Microsoft account. It is more that 40 characters. However, someone mentioned to me that the...
Microsoft password length.
Hello,I have a pretty long password for my Microsoft account. It is more that 40 characters.However, someone mentioned to me that the maximum password length is 38 characters, can anyone confirm this?If this is the case, why am i able to login with a longer password, or is it the case that the service would ignore characters 39 and above?Any help would be appreciated.
Submitted March 17, 2018 at 06:02AM by Bango-Fett
via reddit http://ift.tt/2pkFDAd
Hello,I have a pretty long password for my Microsoft account. It is more that 40 characters.However, someone mentioned to me that the maximum password length is 38 characters, can anyone confirm this?If this is the case, why am i able to login with a longer password, or is it the case that the service would ignore characters 39 and above?Any help would be appreciated.
Submitted March 17, 2018 at 06:02AM by Bango-Fett
via reddit http://ift.tt/2pkFDAd
reddit
Microsoft password length. • r/security
Hello, I have a pretty long password for my Microsoft account. It is more that 40 characters. However, someone mentioned to me that the...
Open Source Attack simulator - Infection Monkey
I'm pretty sure I posted about this a few years ago. I've been working on/off on an open source attack simulation tool, link to code http://github.com/guardicore/monkeyIt sits somewhere between a automated "vuln scanner" and a real pen tester using metasploit, in that it's nearly 100% automated, but it does things a real attacker does, such as stealing credentials, scanning for new hosts, brute forcing logins. Since it's automated and I hope people use it in production networks, it's also safe. There's no MS17-010, no binary exploits, which is less fun but anything statistical is not something I'd run in a worm fashion.It's not crazy polished, as fits something that's done part time, but I think it can help defense people who don't have red teams (the vast majority) or who understand that a once a year pen test is mostly irrelevant.I'd love to get some feedback, interest, tell me if it's something you can see yourself using, what features you'd want.
Submitted March 15, 2018 at 02:04PM by Ace_pace
via reddit http://ift.tt/2u2K2h5
I'm pretty sure I posted about this a few years ago. I've been working on/off on an open source attack simulation tool, link to code http://github.com/guardicore/monkeyIt sits somewhere between a automated "vuln scanner" and a real pen tester using metasploit, in that it's nearly 100% automated, but it does things a real attacker does, such as stealing credentials, scanning for new hosts, brute forcing logins. Since it's automated and I hope people use it in production networks, it's also safe. There's no MS17-010, no binary exploits, which is less fun but anything statistical is not something I'd run in a worm fashion.It's not crazy polished, as fits something that's done part time, but I think it can help defense people who don't have red teams (the vast majority) or who understand that a once a year pen test is mostly irrelevant.I'd love to get some feedback, interest, tell me if it's something you can see yourself using, what features you'd want.
Submitted March 15, 2018 at 02:04PM by Ace_pace
via reddit http://ift.tt/2u2K2h5
GitHub
GitHub - guardicore/monkey: Infection Monkey - An open-source adversary emulation platform
Infection Monkey - An open-source adversary emulation platform - guardicore/monkey
Best security product
I recommend you a best security product is LTS Secure. LTS Secure Intelligence Driven SOC is integrated Context-aware Security protection platforms that provides and integrate prediction, prevention, detection and response capabilities by leveraging adaptive security framework. For more information about this product https://goo.gl/7J79so
Submitted March 17, 2018 at 11:41AM by uvyas727
via reddit http://ift.tt/2ItVHZ8
I recommend you a best security product is LTS Secure. LTS Secure Intelligence Driven SOC is integrated Context-aware Security protection platforms that provides and integrate prediction, prevention, detection and response capabilities by leveraging adaptive security framework. For more information about this product https://goo.gl/7J79so
Submitted March 17, 2018 at 11:41AM by uvyas727
via reddit http://ift.tt/2ItVHZ8
Ltssecure
LTS Secure - Adaptive SOC platform for cyber security LTS Secure
LTS Secure Intelligence Driven SOC is integrated Context-aware Security protection platforms that provides and integrate prediction, prevention, detection and response capabilities by leveraging adaptive security framework.
Kaspersky Free VS Avast Free
Hello, I have Avast on the max settings + Hitman Pro + Malwarebytes Should I switch to Kaspersky Free?Please suggest an alternative if possible.Thanks,
Submitted March 17, 2018 at 03:53PM by RevolutionarySerpent
via reddit http://ift.tt/2FNB3S1
Hello, I have Avast on the max settings + Hitman Pro + Malwarebytes Should I switch to Kaspersky Free?Please suggest an alternative if possible.Thanks,
Submitted March 17, 2018 at 03:53PM by RevolutionarySerpent
via reddit http://ift.tt/2FNB3S1
reddit
Kaspersky Free VS Avast Free • r/security
Hello, I have Avast on the max settings + Hitman Pro + Malwarebytes Should I switch to Kaspersky Free? Please suggest an alternative if...
I would like to be able to see what my PC is connected to. Advice please.
There was a program I had which had somewhat of a bad reputation but worked well. It monitored what bodies were connected my PC. Could someone advice me please. Thanks. It's not for anything illegal or unsavoury. I occasionally torrent a movie but more often than not I play games via Steam and am a little active in political fora. Cheers.
Submitted March 17, 2018 at 06:48PM by InformedChoice
via reddit http://ift.tt/2DzGG4v
There was a program I had which had somewhat of a bad reputation but worked well. It monitored what bodies were connected my PC. Could someone advice me please. Thanks. It's not for anything illegal or unsavoury. I occasionally torrent a movie but more often than not I play games via Steam and am a little active in political fora. Cheers.
Submitted March 17, 2018 at 06:48PM by InformedChoice
via reddit http://ift.tt/2DzGG4v
reddit
I would like to be able to see what my PC is... • r/security
There was a program I had which had somewhat of a bad reputation but worked well. It monitored what bodies were connected my PC. Could someone...
Top 5 Best Internet Security Software 2018
http://ift.tt/2pjN7Eq
Submitted March 17, 2018 at 06:45PM by tomasstatkus
via reddit http://ift.tt/2DAfTF5
http://ift.tt/2pjN7Eq
Submitted March 17, 2018 at 06:45PM by tomasstatkus
via reddit http://ift.tt/2DAfTF5
Reviewedbypro
Top 5 Best Internet Security Software 2018
Kaspersky Internet Security 2018. Kaspersky Internet Security Suite is one of the best antivirus products on the market. It offers excellent malware protection rates
BrrCon is a free infosec con in the Twin Cities, and our CFP is open until 4/25
https://goo.gl/forms/ckdnX1wIgbTa40XL2
Submitted March 17, 2018 at 08:56PM by yecti
via reddit http://ift.tt/2pkHBkg
https://goo.gl/forms/ckdnX1wIgbTa40XL2
Submitted March 17, 2018 at 08:56PM by yecti
via reddit http://ift.tt/2pkHBkg
Google Docs
BrrCon 2018 - Call for Papers
CFP Closes April 25th, 2018. Conference is June 8th, 2018 at the Minneapolis Convention Center
Help understanding these IP addresses
http://ift.tt/2DyWch5
Submitted March 17, 2018 at 09:18PM by thematrix1001
via reddit http://ift.tt/2FYcbKV
http://ift.tt/2DyWch5
Submitted March 17, 2018 at 09:18PM by thematrix1001
via reddit http://ift.tt/2FYcbKV
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
http://ift.tt/2tVgqC6
Submitted March 17, 2018 at 09:16PM by digicat
via reddit http://ift.tt/2HHnIeA
http://ift.tt/2tVgqC6
Submitted March 17, 2018 at 09:16PM by digicat
via reddit http://ift.tt/2HHnIeA
| bohops |
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
Background Last Wednesday, I had some down time so I decided to hunt around in \System32 to see if I could find anything of potential interest. I located a few DLL files that shared an interesting…
Empire 2.5 was released 3/15. New features, updates, and bug fixes
http://ift.tt/2gkK39z
Submitted March 17, 2018 at 11:20PM by cpeacock15
via reddit http://ift.tt/2G2hEQA
http://ift.tt/2gkK39z
Submitted March 17, 2018 at 11:20PM by cpeacock15
via reddit http://ift.tt/2G2hEQA
GitHub
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
Empire - a PowerShell and Python post-exploitation agent [Full Sources, Video DEMOs and Docs - See Comments]
http://ift.tt/2oJReqM
Submitted March 18, 2018 at 12:08AM by TechLord2
via reddit http://ift.tt/2GARqCE
http://ift.tt/2oJReqM
Submitted March 18, 2018 at 12:08AM by TechLord2
via reddit http://ift.tt/2GARqCE
GitHub
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent. - EmpireProject/Empire
Exploiting Eternalblue for shell with Empire & Msfconsole
http://ift.tt/2poO1iq
Submitted March 18, 2018 at 12:01AM by TechLord2
via reddit http://ift.tt/2tSc9PW
http://ift.tt/2poO1iq
Submitted March 18, 2018 at 12:01AM by TechLord2
via reddit http://ift.tt/2tSc9PW
Hacking Tutorials
Exploiting Eternalblue for shell with Empire & Msfconsole - Hacking Tutorials
In this tutorial we will be exploiting a SMB vulnerability using Eternalblue. Eternalblue exploits a remote code execution vulnerability in SMBv1.
Android Frida library to hunt Android Malware [Sources and Videos - See Comment]
http://ift.tt/2tXvOOk
Submitted March 18, 2018 at 12:17AM by TechLord2
via reddit http://ift.tt/2GDHOHp
http://ift.tt/2tXvOOk
Submitted March 18, 2018 at 12:17AM by TechLord2
via reddit http://ift.tt/2GDHOHp
GitHub
brompwnie/uitkyk
uitkyk - Android Frida library to hunt Android Malware
Tool that monitors OS changes after installation
Is there any tool that can monitor the changes that were made to Windows 10 (Registry, services, startup, etc...) and file system by an installer? If not, is there any tool that can compare the OS and file system before the installation and after?I'm installing some shady software (on a VM of course), and I would love to see the changes made by the installer.
Submitted March 18, 2018 at 12:27AM by xorserq
via reddit http://ift.tt/2pksoR3
Is there any tool that can monitor the changes that were made to Windows 10 (Registry, services, startup, etc...) and file system by an installer? If not, is there any tool that can compare the OS and file system before the installation and after?I'm installing some shady software (on a VM of course), and I would love to see the changes made by the installer.
Submitted March 18, 2018 at 12:27AM by xorserq
via reddit http://ift.tt/2pksoR3
reddit
Tool that monitors OS changes after installation • r/security
Is there any tool that can monitor the changes that were made to Windows 10 (Registry, services, startup, etc...) and file system by an installer?...