The Legitimisation of Have I Been Pwned
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
Troy Hunt
The Legitimisation of Have I Been Pwned
There's no way to sugar-coat this: Have I Been Pwned (HIBP) only exists due to a whole bunch of highly illegal activity that has harmed many individuals and organisations alike. That harm extends all the way from those in data breaches feeling a sense of…
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
Security Affairs
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
Saleem Rashid, a 15-year-old researcher from UK, has discovered a severe vulnerability in cryptocurrency hardware wallets made by the Ledger company.
Tracking Users with CSS
http://ift.tt/2DJen3F
Submitted March 21, 2018 at 10:08PM by zinsi-
via reddit http://ift.tt/2FQfLaK
http://ift.tt/2DJen3F
Submitted March 21, 2018 at 10:08PM by zinsi-
via reddit http://ift.tt/2FQfLaK
Templarbit Inc.
Tracking Users with CSS
In early 2018, a physics student named Jan Böhmer created...
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 09:38PM by campuscodi
via reddit http://ift.tt/2GP79hC
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 09:38PM by campuscodi
via reddit http://ift.tt/2GP79hC
Cyberscoop
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
CyberScoop has learned that Kaspersky's 'Slingshot' is an active, U.S.-led counterterrorism cyber-espionage operation used to target ISIS and Al-Qaeda.
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
rootkit
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
Overview In the previous part, we looked into an Uninitialized Stack Variable vulnerability. In this part, we’ll discuss about another vulnerability on similar lines, Uninitialized Heap Variable. We’d be grooming Paged Pool in this one, so as to direct our…
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
rootkit
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
Overview In the previous part, we looked into an Uninitialized Stack Variable vulnerability. In this part, we’ll discuss about another vulnerability on similar lines, Uninitialized Heap Variable. We’d be grooming Paged Pool in this one, so as to direct our…
The AG of India defends the security of the national biometric database by saying that the data center has walls around the place :/
https://twitter.com/CNBCTV18News/status/976500202541522945
Submitted March 21, 2018 at 11:08PM by DisjointedHuntsville
via reddit http://ift.tt/2IIMhsP
https://twitter.com/CNBCTV18News/status/976500202541522945
Submitted March 21, 2018 at 11:08PM by DisjointedHuntsville
via reddit http://ift.tt/2IIMhsP
Twitter
CNBC-TV18
The Attorney General kicks off his defence of Aadhaar's security by saying the data centre is surrounded by walls that are 13 feet high and 5 feet thick. @AshmitTejKumar brings us more. https://t.co/pk9Q9oBMhD
Kaspersky burn SOCOM malware operation
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 11:31PM by le-quack
via reddit http://ift.tt/2IDNbqG
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 11:31PM by le-quack
via reddit http://ift.tt/2IDNbqG
Cyberscoop
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
CyberScoop has learned that Kaspersky's 'Slingshot' is an active, U.S.-led counterterrorism cyber-espionage operation used to target ISIS and Al-Qaeda.
Are Bounty Programs Good as a Security Against Hackers? | CCG
http://ift.tt/2u9oEGW
Submitted March 22, 2018 at 12:44AM by BrunoCerqueira
via reddit http://ift.tt/2ptZLAH
http://ift.tt/2u9oEGW
Submitted March 22, 2018 at 12:44AM by BrunoCerqueira
via reddit http://ift.tt/2ptZLAH
www.cryptocurrencyguide.org
Are Bounty Programs Good as a Security Against Hackers?
loading...
Recovering deleted reddit posts
http://ift.tt/2FTziqu
Submitted March 22, 2018 at 01:54AM by learnie
via reddit http://ift.tt/2HPzTGn
http://ift.tt/2FTziqu
Submitted March 22, 2018 at 01:54AM by learnie
via reddit http://ift.tt/2HPzTGn
reddit
Recovering deleted reddit posts • r/netsec
0 points and 0 comments so far on reddit
Hiding from Autoruns.exe - Persistence using RunOnceEx
http://ift.tt/2IH8ure
Submitted March 22, 2018 at 02:37AM by oddvarmoe
via reddit http://ift.tt/2HTLg09
http://ift.tt/2IH8ure
Submitted March 22, 2018 at 02:37AM by oddvarmoe
via reddit http://ift.tt/2HTLg09
Oddvar Moe's Blog
Persistence using RunOnceEx – Hidden from Autoruns.exe
TL;DR – Found a technique to execute DLL files without being detected by autoruns.exe at logon. – Requires administrator rights and does not belong in userland. – Run this to Expl…
Second round of SecOps Tool Bracketology. Vote on your favorites by March 23rd!
http://ift.tt/2DKCor1
Submitted March 22, 2018 at 02:42AM by SecOpsHub
via reddit http://ift.tt/2Gf1oMi
http://ift.tt/2DKCor1
Submitted March 22, 2018 at 02:42AM by SecOpsHub
via reddit http://ift.tt/2Gf1oMi
SecOps Hub
Second round--Tool Bracketology Contest--End Friday, March 23
Vote on your favorites! VirusTotal Pastebin 0 voters Show results MXtoolbox Shodan 0 voters Show results Alientvault URLscan 0 voters Show results Malc0de DNS Sinkhole Abuse.ch 0 voters Show results…
Best password manager?
Hello all,Don't know ifs it's better in this subreddit or another.. but, you might have seen my post the other day, I've basically been hacked on every little thing linked to my main account. My hotmail was hacked first, meaning they saw everything I'm signed up to and tried accessing it, probably brute forcing the password as someone said.Now I'm not sure what I'm signed up to, and what I'm not, so undoubtedly they'll have got into a lot of things without me having any notification, nothing I can do about that.Just changed my main passwords like eBay. PayPal, etc. but I need somewhere to store them, so I am just wondering what's everyone's choice on the best password manager to use? Secure and easy to use of course. Nothing that costs please.Thanks all :)
Submitted March 22, 2018 at 04:43AM by Jianni12
via reddit http://ift.tt/2G7Ql7R
Hello all,Don't know ifs it's better in this subreddit or another.. but, you might have seen my post the other day, I've basically been hacked on every little thing linked to my main account. My hotmail was hacked first, meaning they saw everything I'm signed up to and tried accessing it, probably brute forcing the password as someone said.Now I'm not sure what I'm signed up to, and what I'm not, so undoubtedly they'll have got into a lot of things without me having any notification, nothing I can do about that.Just changed my main passwords like eBay. PayPal, etc. but I need somewhere to store them, so I am just wondering what's everyone's choice on the best password manager to use? Secure and easy to use of course. Nothing that costs please.Thanks all :)
Submitted March 22, 2018 at 04:43AM by Jianni12
via reddit http://ift.tt/2G7Ql7R
reddit
Best password manager? • r/security
Hello all, Don't know ifs it's better in this subreddit or another.. but, you might have seen my post the other day, I've basically been hacked...
Sample Fishing: VirusTotal-as-a-Dropbox For Asynchronous Exfiltration
http://ift.tt/2u9NUMX
Submitted March 22, 2018 at 04:58AM by ikotler
via reddit http://ift.tt/2GcMZjC
http://ift.tt/2u9NUMX
Submitted March 22, 2018 at 04:58AM by ikotler
via reddit http://ift.tt/2GcMZjC
WPHunter: A Wordpress Vulnerability Scanner v0.1 Beta
http://ift.tt/2HW8oLr
Submitted March 22, 2018 at 07:20AM by TechLord2
via reddit http://ift.tt/2GSvsLu
http://ift.tt/2HW8oLr
Submitted March 22, 2018 at 07:20AM by TechLord2
via reddit http://ift.tt/2GSvsLu
reddit
WPHunter: A Wordpress Vulnerability Scanner v0.1 Beta • r/netsec
2 points and 0 comments so far on reddit
TrickBot Banking Trojan Adapts with New Module
http://ift.tt/2ucWFG2
Submitted March 22, 2018 at 07:14AM by TechLord2
via reddit http://ift.tt/2G39YdF
http://ift.tt/2ucWFG2
Submitted March 22, 2018 at 07:14AM by TechLord2
via reddit http://ift.tt/2G39YdF
Webroot Threat Blog
TrickBot Banking Trojan Adapts with New Module | Webroot
TrickBot’s authors release new module, showing possible attempt to create an extortionary monetization scheme for the group.
WPSeku - Wordpress Security Scanner To Scan Remote WordPress Installations [Full Sources]
http://ift.tt/2os7r8i
Submitted March 22, 2018 at 07:13AM by TechLord2
via reddit http://ift.tt/2HUczqX
http://ift.tt/2os7r8i
Submitted March 22, 2018 at 07:13AM by TechLord2
via reddit http://ift.tt/2HUczqX
GitHub
m4ll0k/WPSeku
WPSeku - Wordpress Security Scanner . Contribute to m4ll0k/WPSeku development by creating an account on GitHub.
Visual Studio Code silently fixed a remote code execution vulnerability
http://ift.tt/2FOWOkq
Submitted March 22, 2018 at 08:20AM by CodeColorist
via reddit http://ift.tt/2DLL7sS
http://ift.tt/2FOWOkq
Submitted March 22, 2018 at 08:20AM by CodeColorist
via reddit http://ift.tt/2DLL7sS
Medium
Visual Studio Code has silently fixed a remote code execution vulnerability
This blog was written few weeks ago, since VSCode has been upgraded for a while, I made this public.
how to back door a nano ledger by a 15 year old kid
http://ift.tt/2puVDjV
Submitted March 22, 2018 at 11:12AM by gottathrowthisawayaw
via reddit http://ift.tt/2pv206X
http://ift.tt/2puVDjV
Submitted March 22, 2018 at 11:12AM by gottathrowthisawayaw
via reddit http://ift.tt/2pv206X
GitHub
saleemrashid/ledger-mcu-backdoor
ledger-mcu-backdoor - Proof of concept for Ledger MCU exploit
Threat Intelligence aggregation and analysis
Hi community, I'm looking for a threat intelligence platform with the following requirements:opensourcefreecan aggregate different feedsa new threat feed from API/email can be addedlightweightSo far I've found MISP and GOSINT; I'm going to test them during next couple of weeks. Are there any good tools other than those two? If you have experience with MISP/GOSINT, could you please share your impression? I know a little about such type of software, so my requirements are not a 'must have' but 'I'd like to have'. Thank you.
Submitted March 22, 2018 at 01:34PM by siniysv
via reddit http://ift.tt/2FSs8Tn
Hi community, I'm looking for a threat intelligence platform with the following requirements:opensourcefreecan aggregate different feedsa new threat feed from API/email can be addedlightweightSo far I've found MISP and GOSINT; I'm going to test them during next couple of weeks. Are there any good tools other than those two? If you have experience with MISP/GOSINT, could you please share your impression? I know a little about such type of software, so my requirements are not a 'must have' but 'I'd like to have'. Thank you.
Submitted March 22, 2018 at 01:34PM by siniysv
via reddit http://ift.tt/2FSs8Tn
reddit
Threat Intelligence aggregation and analysis • r/security
Hi community, I'm looking for a threat intelligence platform with the following requirements: * opensource * free * can aggregate different...
Important: 4 ways to prevent websites from exploiting your computer in digital coin mining
http://ift.tt/2HWWX69
Submitted March 22, 2018 at 02:15PM by Freetecharena
via reddit http://ift.tt/2ufsRZG
http://ift.tt/2HWWX69
Submitted March 22, 2018 at 02:15PM by Freetecharena
via reddit http://ift.tt/2ufsRZG
FreeTechArena
Important: 4 ways to prevent websites from exploiting your computer in digital coin mining
Whether you're learning first, some famous sites such as movies and other similar services are taking advantage of their computer-based visitors to the Bitcoin mining through noscripts that you see