10 Steps to Develop an Incident Response Plan You’ll ACTUALLY Use
https://ift.tt/2pFZb2V
Submitted March 26, 2018 at 11:37PM by speckz
via reddit https://ift.tt/2unM1MQ
https://ift.tt/2pFZb2V
Submitted March 26, 2018 at 11:37PM by speckz
via reddit https://ift.tt/2unM1MQ
Salesforce Engineering
10 Steps to Develop an Incident Response Plan You’ll ACTUALLY Use
Let’s face it, most companies have an incident response plan (IRP) sitting somewhere that was based on some template that is on the…
Microsoft’s New TOS for Skype bans offensive language, and allows them to look into your messages to prove compliance. [X-Post /r/Privacy]
https://ift.tt/2I5CKen
Submitted March 26, 2018 at 11:25PM by Chumstick
via reddit https://ift.tt/2G85WoK
https://ift.tt/2I5CKen
Submitted March 26, 2018 at 11:25PM by Chumstick
via reddit https://ift.tt/2G85WoK
reddit
Microsoft Bans "Offensive Language" from Skype (...and... • r/privacy
1578 points and 259 comments so far on reddit
Academic honeypot datasets with 368 million users! Why is nobody talking about these?
https://ift.tt/2IQfnXn
Submitted March 27, 2018 at 01:43AM by VinayUPrabhu
via reddit https://ift.tt/2Gb2vJS
https://ift.tt/2IQfnXn
Submitted March 27, 2018 at 01:43AM by VinayUPrabhu
via reddit https://ift.tt/2Gb2vJS
Medium
Eff Cambridge Analytica’s numbers, look at this shit! Academic honeypots. Thou art risky!
As this Cambridge Analytica fracas unraveled, my first reaction was HOLY-EFFING-SH*T! People on social media were losing their mind over…
Portable Executable File Corruption Preventing Malware From Running [See Comment]
https://ift.tt/2vaBiRS
Submitted March 27, 2018 at 01:47AM by TechLord2
via reddit https://ift.tt/2pDFTeQ
https://ift.tt/2vaBiRS
Submitted March 27, 2018 at 01:47AM by TechLord2
via reddit https://ift.tt/2pDFTeQ
Todd Cullum Research
Portable Executable File Corruption Preventing Malware From Running - Todd Cullum Research
Important Disclaimer – YOU MUST READ FIRST! Portions of this article contain source code from the Windows Research Kernel. This code is the intellectual property of Microsoft Corporation. I am using this code under special license in this post under these…
The Aggregate IQ Files, Part One: How a Political Engineering Firm Exposed Their Code Base
https://ift.tt/2pFNdGv
Submitted March 27, 2018 at 03:22AM by nwsm
via reddit https://ift.tt/2pJ8oXH
https://ift.tt/2pFNdGv
Submitted March 27, 2018 at 03:22AM by nwsm
via reddit https://ift.tt/2pJ8oXH
Upguard
The Aggregate IQ Files, Part One: How a Political Engineering Firm Exposed Their Code Base
Learn more about the exposure of IT assets originating from political data firm AggregateIQ.
Managing Secrets in DevOps: A Maturity Model
https://ift.tt/2GThs4u
Submitted March 27, 2018 at 06:41AM by Walzh
via reddit https://ift.tt/2ums0X9
https://ift.tt/2GThs4u
Submitted March 27, 2018 at 06:41AM by Walzh
via reddit https://ift.tt/2ums0X9
Malicious cryptomining and the blacklist conundrum - Malwarebytes Labs
https://ift.tt/2IUeY6z
Submitted March 27, 2018 at 07:12AM by Alan976
via reddit https://ift.tt/2uj562K
https://ift.tt/2IUeY6z
Submitted March 27, 2018 at 07:12AM by Alan976
via reddit https://ift.tt/2uj562K
Malwarebytes Labs
Malicious cryptomining and the blacklist conundrum - Malwarebytes Labs
When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.
Untangling Jenkins Lessons learned radically overhauling Jenkins for developer and operator happiness
https://ift.tt/2BtPpsJ
Submitted March 27, 2018 at 07:51AM by Walzh
via reddit https://ift.tt/2urdEoy
https://ift.tt/2BtPpsJ
Submitted March 27, 2018 at 07:51AM by Walzh
via reddit https://ift.tt/2urdEoy
How a QR code can fool iOS 11's Camera app into opening evil.com rather than nice.co.uk
https://ift.tt/2pK21mT
Submitted March 27, 2018 at 12:50PM by internetsquirrel
via reddit https://ift.tt/2I7PYXU
https://ift.tt/2pK21mT
Submitted March 27, 2018 at 12:50PM by internetsquirrel
via reddit https://ift.tt/2I7PYXU
www.theregister.co.uk
How a QR code can fool iOS 11's Camera app into opening evil.com rather than nice.co.uk
Miscreants can spoof URL with potentially nasty results
Help me! Did someone hack my laptop?
I have a Toshiba laptop. I know literally nothing about coding mind you. Just a heads up. I was on Internet Explorer and doing work on my college website. I noticed that my computer speed was extremely slow and delayed.Suddely, a black rectangle popped up on the top left corner of the screen and I saw short bursts of green text being typed into a screen. There was a computer cursor right underneath, sometimes editing the text.Before I could take a photo, the box disappeared within a few seconds. As if it was a mistake that it was visible on my screen.I ran a full system check with Avast, but found nothing. Any tips? Am I safe?
Submitted March 27, 2018 at 09:35AM by ArtisticAnxiety
via reddit https://ift.tt/2E17pHy
I have a Toshiba laptop. I know literally nothing about coding mind you. Just a heads up. I was on Internet Explorer and doing work on my college website. I noticed that my computer speed was extremely slow and delayed.Suddely, a black rectangle popped up on the top left corner of the screen and I saw short bursts of green text being typed into a screen. There was a computer cursor right underneath, sometimes editing the text.Before I could take a photo, the box disappeared within a few seconds. As if it was a mistake that it was visible on my screen.I ran a full system check with Avast, but found nothing. Any tips? Am I safe?
Submitted March 27, 2018 at 09:35AM by ArtisticAnxiety
via reddit https://ift.tt/2E17pHy
reddit
Help me! Did someone hack my laptop? • r/security
I have a Toshiba laptop. I know literally nothing about coding mind you. Just a heads up. I was on Internet Explorer and doing work on my college...
Need for collaboration among security, privacy professionals extends beyond GDPR
https://ift.tt/2GruqbI
Submitted March 27, 2018 at 01:34PM by Iot_Security
via reddit https://ift.tt/2pI4kHT
https://ift.tt/2GruqbI
Submitted March 27, 2018 at 01:34PM by Iot_Security
via reddit https://ift.tt/2pI4kHT
CSO Online
Need for collaboration among security, privacy professionals extends beyond GDPR
We live in times of promising digital transformation, with AI, blockchain and an array of IoT devices among the technologies capable of positively impacting our personal and professional lives. Yet, enterprises need to mitigate the associated risks in order…
DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction
https://ift.tt/2Gd4bm6
Submitted March 27, 2018 at 01:11PM by TechLord2
via reddit https://ift.tt/2IRybWd
https://ift.tt/2Gd4bm6
Submitted March 27, 2018 at 01:11PM by TechLord2
via reddit https://ift.tt/2IRybWd
| bohops |
DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction
[Source: blog.microsoft.com] Introduction Not long ago, I blogged about Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction. This tool was…
The Complete Beginner Guide to Learn Ethical Hacking
https://ift.tt/2HMRtuq
Submitted March 27, 2018 at 12:54PM by houseisbuilt
via reddit https://ift.tt/2uo5RYy
https://ift.tt/2HMRtuq
Submitted March 27, 2018 at 12:54PM by houseisbuilt
via reddit https://ift.tt/2uo5RYy
Medium
The Complete Beginner Guide to Learn Ethical Hacking
If you want to learn ethical hacking so that you can hack computer systems like black hat hackers and secure them like security experts…
From hacked client to 0day discovery (actively exploited in the wild for years)
https://ift.tt/2DKQmJy
Submitted March 27, 2018 at 12:19PM by sokolovanton
via reddit https://ift.tt/2pIR7h3
https://ift.tt/2DKQmJy
Submitted March 27, 2018 at 12:19PM by sokolovanton
via reddit https://ift.tt/2pIR7h3
security.infoteam.ch
From hacked client to 0day discovery
Every day around the world, dozens of vulnerabilities are found by security researchers or by hackers. The cyber arms race takes place every day. Researchers act in conjunction with manufacturers to assess and correct any security flaws to protect their users…
BranchScope: A New Side-Channel Attack onDirectional Branch Predictor [PDF]
https://ift.tt/2pGxFBL
Submitted March 27, 2018 at 02:38PM by dim23
via reddit https://ift.tt/2G9kX9L
https://ift.tt/2pGxFBL
Submitted March 27, 2018 at 02:38PM by dim23
via reddit https://ift.tt/2G9kX9L
Civic (CVC) & PayPie (PPP) - security blockchain platforms to check identity & assess business credit (review)
https://www.youtube.com/watch?v=4dmR7EwU7jg
Submitted March 27, 2018 at 03:26PM by thumbsdrivesmecrazy
via reddit https://ift.tt/2GfEvVP
https://www.youtube.com/watch?v=4dmR7EwU7jg
Submitted March 27, 2018 at 03:26PM by thumbsdrivesmecrazy
via reddit https://ift.tt/2GfEvVP
YouTube
My Top 2 Altcoins for 2018- Paypie & Civic
Here is the two projects that I'm very bullish on fro 2018. Full Disclosure I'm invested in these companies, so my opinion will be biased. ** This is not fin...
Who and What Is Coinhive?
https://ift.tt/2pFDgZ2
Submitted March 27, 2018 at 02:59PM by alessiodelv
via reddit https://ift.tt/2pHMd4Z
https://ift.tt/2pFDgZ2
Submitted March 27, 2018 at 02:59PM by alessiodelv
via reddit https://ift.tt/2pHMd4Z
reddit
Who and What Is Coinhive? • r/security
1 points and 0 comments so far on reddit
Identifying in OWA logs any attempt to tamper with a webmail server
Good morning/afternoon/night all. First post here. Hope someone can help me. I'm currently undergoing a cyber-security internship. One of my tasks is to identify, through Error codes (ie 401 403 500...) in OWA logs, all attempts to tamper with the webmail server. Now there is a lot of explanations online for the definition of error codes and all.I have come to the conclusion that 4xx and 5xx codes are the most interesting ones. But i have failed to determine which ones are interesting and may indicate a hack, if repetitive in the logs.Any help would be much appreciated. Thanks in advance!
Submitted March 27, 2018 at 03:55PM by FrancisAsks
via reddit https://ift.tt/2GazKRr
Good morning/afternoon/night all. First post here. Hope someone can help me. I'm currently undergoing a cyber-security internship. One of my tasks is to identify, through Error codes (ie 401 403 500...) in OWA logs, all attempts to tamper with the webmail server. Now there is a lot of explanations online for the definition of error codes and all.I have come to the conclusion that 4xx and 5xx codes are the most interesting ones. But i have failed to determine which ones are interesting and may indicate a hack, if repetitive in the logs.Any help would be much appreciated. Thanks in advance!
Submitted March 27, 2018 at 03:55PM by FrancisAsks
via reddit https://ift.tt/2GazKRr
reddit
Identifying in OWA logs any attempt to tamper with a... • r/security
Good morning/afternoon/night all. First post here. Hope someone can help me. I'm currently undergoing a cyber-security internship. One of my tasks...
How critical is MFA for production?
Our team is now configuring a production site (kS8 at Google Cloud) and had a discussion - how critical is having MFA/VPN access to production vs using only strong passwords with single factor auth?p.s. I understand the implications of these configuration, just curious practically in real world what people are doing
Submitted March 27, 2018 at 04:54PM by yonatannn
via reddit https://ift.tt/2pKOIn1
Our team is now configuring a production site (kS8 at Google Cloud) and had a discussion - how critical is having MFA/VPN access to production vs using only strong passwords with single factor auth?p.s. I understand the implications of these configuration, just curious practically in real world what people are doing
Submitted March 27, 2018 at 04:54PM by yonatannn
via reddit https://ift.tt/2pKOIn1
reddit
How critical is MFA for production? • r/security
Our team is now configuring a production site (kS8 at Google Cloud) and had a discussion - how critical is having MFA/VPN access to production vs...
Justifying Security Spend, a Response Pt 4
https://www.youtube.com/watch?v=h4ltexlBuPA
Submitted March 27, 2018 at 05:31PM by Uminekoshi
via reddit https://ift.tt/2I9PwZx
https://www.youtube.com/watch?v=h4ltexlBuPA
Submitted March 27, 2018 at 05:31PM by Uminekoshi
via reddit https://ift.tt/2I9PwZx
YouTube
Justifying Security Spend, a Response from Nehemiah Security: Part 4
In this video, Jerry Caponera responds to an entry in our eBook about "7 Experts on Justifying Security Spend" written by Heath Taylor. If your friend was pu...
The phenomenon of smart contract honeypots
https://ift.tt/2pwrZe8
Submitted March 27, 2018 at 05:13PM by fagnerbrack
via reddit https://ift.tt/2pLfNpf
https://ift.tt/2pwrZe8
Submitted March 27, 2018 at 05:13PM by fagnerbrack
via reddit https://ift.tt/2pLfNpf
Medium
The phenomenon of smart contract honeypots
Hardly a week passes without large scale hacks in the crypto world. It’s not just centralised exchanges that are targets of attackers…