Simple CryptoCurrency Honeypot
https://ift.tt/2GgAfcL
Submitted March 28, 2018 at 11:11PM by gunmr
via reddit https://ift.tt/2E0kiBy
https://ift.tt/2GgAfcL
Submitted March 28, 2018 at 11:11PM by gunmr
via reddit https://ift.tt/2E0kiBy
GitHub
omergunal/CryptoPot
CryptoPot - Simple cryptocurrency honeypot
Vulnerability Spotlight: Multiple Nvidia D3D10 Driver Pixel Shader Vulnerabilities
https://ift.tt/2GhguO5
Submitted March 29, 2018 at 12:11AM by kuralvanan
via reddit https://ift.tt/2pNk4Zf
https://ift.tt/2GhguO5
Submitted March 29, 2018 at 12:11AM by kuralvanan
via reddit https://ift.tt/2pNk4Zf
Talosintelligence
Vulnerability Spotlight: Multiple Nvidia D3D10 Driver Pixel Shader Vulnerabilities
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Where to go to keep up with what's happening in Computer Security research?
I'm nearing the end of my MS in Computer Security and need to work on a thesis or capstone, but I don't know where to find what the field is doing outside of what makes the news. Where is current research posted online?
Submitted March 29, 2018 at 01:14AM by dxk3355
via reddit https://ift.tt/2uwakbH
I'm nearing the end of my MS in Computer Security and need to work on a thesis or capstone, but I don't know where to find what the field is doing outside of what makes the news. Where is current research posted online?
Submitted March 29, 2018 at 01:14AM by dxk3355
via reddit https://ift.tt/2uwakbH
reddit
Where to go to keep up with what's happening in... • r/security
I'm nearing the end of my MS in Computer Security and need to work on a thesis or capstone, but I don't know where to find what the field is doing...
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002
https://ift.tt/2Ic6uqd
Submitted March 29, 2018 at 01:25AM by Adr1enb
via reddit https://ift.tt/2GRs0Ro
https://ift.tt/2Ic6uqd
Submitted March 29, 2018 at 01:25AM by Adr1enb
via reddit https://ift.tt/2GRs0Ro
reddit
Drupal core - Highly critical - Remote Code Execution -... • r/netsec
4 points and 2 comments so far on reddit
How many external websites, apps and domains do you have? Compare Shodan.io vs ImmuniWeb Discovery
https://ift.tt/2GhGFEh
Submitted March 29, 2018 at 01:24AM by htbridgedigital
via reddit https://ift.tt/2E0oKjz
https://ift.tt/2GhGFEh
Submitted March 29, 2018 at 01:24AM by htbridgedigital
via reddit https://ift.tt/2E0oKjz
Htbridge
External Web Applications Discovery with Shodan and ImmuniWeb®
How many external websites, applications and (sub)domains does your company have? Compare free application discovery service by Shodan and ImmuniWeb® Discovery.
New research from Spencer Gietzen: Amazon’s AWS Misconfiguration: Arbitrary File Upload in Amazon Go. Amazon Go utilizes AWS S3 and that is where this vulnerability comes in to play.
https://ift.tt/2pNRN4Z
Submitted March 29, 2018 at 01:43AM by hackers_and_builders
via reddit https://ift.tt/2I8z1gf
https://ift.tt/2pNRN4Z
Submitted March 29, 2018 at 01:43AM by hackers_and_builders
via reddit https://ift.tt/2I8z1gf
Rhino Security Labs
Amazon's AWS Misconfiguration:Arbitrary Files Upload in Amazon Go - Rhino Security Labs
Researchers discover a misconfiguration error which makes it possible to upload arbitrary file to Amazon Go's Logging Bucket.
New Cloud Security Report Reveals Rising Cybersecurity Concerns and Lack of Expertise | Business Wire
https://ift.tt/2GBGXcw
Submitted March 29, 2018 at 02:06AM by samson_78
via reddit https://ift.tt/2GgKHNn
https://ift.tt/2GBGXcw
Submitted March 29, 2018 at 02:06AM by samson_78
via reddit https://ift.tt/2GgKHNn
Businesswire
New Cloud Security Report Reveals Rising Cybersecurity Concerns and Lack of Expertise
Crowd Research Partners today released the 2018 Cloud Security Report revealing that security concerns are on the rise, exacerbated by a lack of quali
Breaking the unbreakable voting machine! Bluefrost Ekoparty Stack Overflow Challenge
https://ift.tt/2GS7PTB
Submitted March 29, 2018 at 02:38AM by alex91ar
via reddit https://ift.tt/2GS7P63
https://ift.tt/2GS7PTB
Submitted March 29, 2018 at 02:38AM by alex91ar
via reddit https://ift.tt/2GS7P63
Medium
Breaking the unbreakable voting machine! Bluefrost Ekoparty Stack Overflow Challenge
This is long overdue, but I wanted to do a write up of this challenge, hopefully someone will find it helpful if they find themselves on a…
Cloudflare is adding Drupal WAF Rule to Mitigate Critical Drupal Exploit
https://ift.tt/2usVEKj
Submitted March 29, 2018 at 03:26AM by Moop6535
via reddit https://ift.tt/2GS5AQa
https://ift.tt/2usVEKj
Submitted March 29, 2018 at 03:26AM by Moop6535
via reddit https://ift.tt/2GS5AQa
Cloudflare Blog
Cloudflare is adding Drupal WAF Rule to Mitigate Critical Drupal Exploit
Drupal has recently announced an update to fix a critical remote code execution exploit (SA-CORE-2018-002/CVE-2018-7600). This patch is to disallow forms and form fields from starting with the “#” character.
AWS S3 File Upload Vulnerability in Amazon Go
https://ift.tt/2pNRN4Z
Submitted March 29, 2018 at 03:14AM by hackers_and_builders
via reddit https://ift.tt/2GdDuBE
https://ift.tt/2pNRN4Z
Submitted March 29, 2018 at 03:14AM by hackers_and_builders
via reddit https://ift.tt/2GdDuBE
Rhino Security Labs
Amazon's AWS Misconfiguration:Arbitrary Files Upload in Amazon Go - Rhino Security Labs
Researchers discover a misconfiguration error which makes it possible to upload arbitrary file to Amazon Go's Logging Bucket.
A Solution to Compression Oracles on the Web (via Cloudflare)
https://ift.tt/2pNMDa5
Submitted March 29, 2018 at 03:57AM by volci
via reddit https://ift.tt/2IdfNGr
https://ift.tt/2pNMDa5
Submitted March 29, 2018 at 03:57AM by volci
via reddit https://ift.tt/2IdfNGr
Medium
A Solution to Compression Oracles on the Web
This is a guest post by Blake Loring, a PhD student at Royal Holloway, University of London. Blake worked at Cloudflare as an intern in the
Monitoring and controlling kernel API calls with stealth hook using EPT [Full Sources, Video and PDF Papers - See Comment]
https://ift.tt/22waHaR
Submitted March 29, 2018 at 05:27AM by TechLord2
via reddit https://ift.tt/2GTxuuX
https://ift.tt/22waHaR
Submitted March 29, 2018 at 05:27AM by TechLord2
via reddit https://ift.tt/2GTxuuX
GitHub
tandasat/DdiMon
DdiMon - Monitoring and controlling kernel API calls with stealth hook using EPT
Great red teaming post with amass inside!
https://ift.tt/2pBRVoT
Submitted March 29, 2018 at 05:15AM by jeff_foley
via reddit https://ift.tt/2GRKlOn
https://ift.tt/2pBRVoT
Submitted March 29, 2018 at 05:15AM by jeff_foley
via reddit https://ift.tt/2GRKlOn
Medium
Top Five Ways the Red Team breached the External Perimeter
I have been performing “red team” breach assessments for many years. Often the goal is penetrating an external network, and gaining access…
Report: Criminals loved to target PowerPoint in 2017
https://ift.tt/2I5dapK
Submitted March 29, 2018 at 07:25AM by yourbasicgeek
via reddit https://ift.tt/2E28mPN
https://ift.tt/2I5dapK
Submitted March 29, 2018 at 07:25AM by yourbasicgeek
via reddit https://ift.tt/2E28mPN
Cyberscoop
Report: Criminals loved to target PowerPoint in 2017
The most widely exploited vulnerability in 2017 was a well-known Microsoft Office bug (CVE-2017-0199), according to new research. Recorded Future released a report Tuesday detailing the top 10 vulnerabilities used by cybercriminals in 2017. Microsoft products…
Make Your SIEM Awesome!
https://ift.tt/2IdwJfA
Submitted March 29, 2018 at 07:49AM by Mufassa810
via reddit https://ift.tt/2pNImmR
https://ift.tt/2IdwJfA
Submitted March 29, 2018 at 07:49AM by Mufassa810
via reddit https://ift.tt/2pNImmR
securing IoT devices with data analytics
https://ift.tt/2pPJdCX
Submitted March 29, 2018 at 01:25PM by Iot_Security
via reddit https://ift.tt/2GDO2cM
https://ift.tt/2pPJdCX
Submitted March 29, 2018 at 01:25PM by Iot_Security
via reddit https://ift.tt/2GDO2cM
IoT Hub
Startup can secure IoT devices with data analytics
Even basic devices can be secured, according to Securithings.
Boeing production plant infected with WannaCry ransomware
https://ift.tt/2pQdZvk
Submitted March 29, 2018 at 04:12PM by Horus_Sirius
via reddit https://ift.tt/2J4ftLg
https://ift.tt/2pQdZvk
Submitted March 29, 2018 at 04:12PM by Horus_Sirius
via reddit https://ift.tt/2J4ftLg
TSecurity Portal
Boeing production plant infected with WannaCry ransomware
Microsoft Products Are Hackers’ Favorite — Report.
https://ift.tt/2GojdVW
Submitted March 29, 2018 at 04:41PM by CasperVPN
via reddit https://ift.tt/2uAd4os
https://ift.tt/2GojdVW
Submitted March 29, 2018 at 04:41PM by CasperVPN
via reddit https://ift.tt/2uAd4os
Infosecurity Magazine
Microsoft Products Are Hackers’ Favorite — Report.
Microsoft Products Are Hackers’ Favorite — Report. Recorded Future claims Flash was less popular in 2017
Bypassing of SSL certificate pinning in iOS applications with a jailbroken device
https://ift.tt/2uva90i
Submitted March 29, 2018 at 03:19PM by yawnful
via reddit https://ift.tt/2GlhhOe
https://ift.tt/2uva90i
Submitted March 29, 2018 at 03:19PM by yawnful
via reddit https://ift.tt/2GlhhOe
GuardSquare
Prevent bypassing of SSL certificate pinning in iOS applications
One of the first things an attacker will do when reverse engineering a mobile application is to bypass the SSL/TLS (Secure Sockets Layer/Transport Layer Security) protection to gain a better insight in the application’s functioning and the way it communicates…
VPN leaks users’ IPs via WebRTC. I’ve tested seventy VPN providers and 16 of them leaks users’ IPs via WebRTC (23%)
https://ift.tt/2Ghkv58
Submitted March 29, 2018 at 05:51PM by speckz
via reddit https://ift.tt/2GivOy7
https://ift.tt/2Ghkv58
Submitted March 29, 2018 at 05:51PM by speckz
via reddit https://ift.tt/2GivOy7
VoidSec
VPN Leak - VoidSec
VPN leaks users’ IPs via WebRTC. I’ve tested seventy VPN providers and 16 of them leaks users’ IPs via WebRTC (23%)
Startup Security Guide: Minimum Viable Security Checklist for a Cloud-Based Web Application
https://ift.tt/2GE23Y2
Submitted March 29, 2018 at 05:17PM by speckz
via reddit https://ift.tt/2J4OiQj
https://ift.tt/2GE23Y2
Submitted March 29, 2018 at 05:17PM by speckz
via reddit https://ift.tt/2J4OiQj
Hartleybrody
Startup Security Guide: Minimum Viable Security Checklist for a Cloud-Based Web Application
Before you launch your new product to the world, make sure you're following the basic security guidelines in this checklist.