Scratching the surface of host headers in Safari
https://ift.tt/2JjCA4C
Submitted April 05, 2018 at 01:55PM by albinowax
via reddit https://ift.tt/2GC2YJ9
https://ift.tt/2JjCA4C
Submitted April 05, 2018 at 01:55PM by albinowax
via reddit https://ift.tt/2GC2YJ9
Detectify Labs
Scratching the surface of host headers in Safari
Are Telegram download crypted?
Are Telegram (Windows client) downloads crypted? Or can someone inside or outside the network detect it?
Submitted April 05, 2018 at 03:42PM by giorizzotti
via reddit https://ift.tt/2GZUN94
Are Telegram (Windows client) downloads crypted? Or can someone inside or outside the network detect it?
Submitted April 05, 2018 at 03:42PM by giorizzotti
via reddit https://ift.tt/2GZUN94
reddit
Are Telegram download crypted? • r/security
Are Telegram (Windows client) downloads crypted? Or can someone inside or outside the network detect it?
Facebook admits public data of its 2.2 billion users has been compromised
https://ift.tt/2Jjqeta
Submitted April 05, 2018 at 04:14PM by Horus_Sirius
via reddit https://ift.tt/2uNBFpN
https://ift.tt/2Jjqeta
Submitted April 05, 2018 at 04:14PM by Horus_Sirius
via reddit https://ift.tt/2uNBFpN
TSecurity Portal
Facebook admits public data of its 2.2 billion users has been compromised
Justifying Security Spend, a Response Pt 5
https://www.youtube.com/watch?v=myUq03iTTrA
Submitted April 05, 2018 at 05:40PM by Uminekoshi
via reddit https://ift.tt/2EkJvH9
https://www.youtube.com/watch?v=myUq03iTTrA
Submitted April 05, 2018 at 05:40PM by Uminekoshi
via reddit https://ift.tt/2EkJvH9
YouTube
Justifying Security Spend, a Response from Nehemiah Security: Part 5
In this video, Jerry Caponera responds to an entry in our eBook about "7 Experts on Justifying Security Spend" written by Richard Rushing. If your friend was...
Google bug bounty for security exploit that influences search results
https://ift.tt/2pIeJmN
Submitted April 05, 2018 at 05:35PM by coasaroz
via reddit https://ift.tt/2EkIxuv
https://ift.tt/2pIeJmN
Submitted April 05, 2018 at 05:35PM by coasaroz
via reddit https://ift.tt/2EkIxuv
reddit
Google bug bounty for security exploit that influences... • r/netsec
1 points and 0 comments so far on reddit
Security Services Company in Dwarka
https://ift.tt/2qa9DPF
Submitted April 05, 2018 at 06:08PM by notional123
via reddit https://ift.tt/2JiLWNQ
https://ift.tt/2qa9DPF
Submitted April 05, 2018 at 06:08PM by notional123
via reddit https://ift.tt/2JiLWNQ
Border King Security
Security Services Company in Dwarka - Border King Security
Security Services Company in Dwarka. With the critical help of experts, we offer our clients best office security administration to meet their security related prerequisites. We prepare our security watches in suchRead More...
Security In 5: Episode 210 - Tax Season Is Approaching, That Means The Phishing Scams Are Increasing
https://ift.tt/2GXnyTG
Submitted April 05, 2018 at 06:34PM by BinaryBlog
via reddit https://ift.tt/2IvV3K6
https://ift.tt/2GXnyTG
Submitted April 05, 2018 at 06:34PM by BinaryBlog
via reddit https://ift.tt/2IvV3K6
Libsyn
Security In Five Podcast: Episode 210 - Tax Season Is Approaching, That Means The Phishing Scams Are Increasing
The tax man is coming. The date to file your United States taxes is looming closer and that means the phishing attacks are increasing. This episode goes into the different types of phishing scams, phone call scams and how to avoid them if you get them. …
A little perspective on the life of an infosec pro
https://ift.tt/2uNNMTN
Submitted April 05, 2018 at 06:33PM by slandail
via reddit https://ift.tt/2q9CIvm
https://ift.tt/2uNNMTN
Submitted April 05, 2018 at 06:33PM by slandail
via reddit https://ift.tt/2q9CIvm
Medium
The Curse of the Information Security Professional
A couple of years back, Time magazine published an article summarizing CareerCast’s research on the most/least stressful jobs.
Be Wary of Free Wi-Fi Connections. They Caused More Hacks in 2017 Than Anything Else
https://ift.tt/2q72JuE
Submitted April 05, 2018 at 08:19PM by DEAF-LAMONT
via reddit https://ift.tt/2GV1QzP
https://ift.tt/2q72JuE
Submitted April 05, 2018 at 08:19PM by DEAF-LAMONT
via reddit https://ift.tt/2GV1QzP
Inc.com
Be Wary of Free Wi-Fi Connections. They Caused More Hacks in 2017 Than Anything Else
The average cost of a breach in 2017 was $3.62 million. The most common vector of attack: Remote workers connecting to networks via public Wi-Fi hotspots.
Massachusetts can sue Equifax over data breach, judge rules
https://ift.tt/2HbUhCB
Submitted April 05, 2018 at 07:58PM by HaleRug
via reddit https://ift.tt/2GCwZol
https://ift.tt/2HbUhCB
Submitted April 05, 2018 at 07:58PM by HaleRug
via reddit https://ift.tt/2GCwZol
CNBC
Massachusetts can sue Equifax over data breach, judge rules
Massachusetts can move forward with a lawsuit accusing Equifax of failing to safeguard its databases or provide prompt notice of a breach that exposed the personal data of 147 million people, a state court judge has ruled.
Details of the Mozilla Firefox exploit used at the recent Pwn2Own contest and the patch that fixed it.
https://ift.tt/2He8Oha
Submitted April 05, 2018 at 08:25PM by RedmondSecGnome
via reddit https://ift.tt/2HaUqWG
https://ift.tt/2He8Oha
Submitted April 05, 2018 at 08:25PM by RedmondSecGnome
via reddit https://ift.tt/2HaUqWG
Zero Day Initiative
Quickly Pwned, Quickly Patched: Details of the Mozilla Pwn2Own Exploit
At our recent Pwn2Own 2018 competition, Richard Zhu (fluorescence) targeted and successfully exploited Mozilla Firefox with only one bug. After handing over the bug to Mozilla at the contest, they have promptly coordinated an update in less than 24 hours.…
Your website needs a Content Security Policy. Here's why
https://ift.tt/2IuC2HL
Submitted April 05, 2018 at 08:07PM by deblona
via reddit https://ift.tt/2Jnb5XS
https://ift.tt/2IuC2HL
Submitted April 05, 2018 at 08:07PM by deblona
via reddit https://ift.tt/2Jnb5XS
The new, easy to use tool to finding subdomains for open source intelligence and pentest
https://ift.tt/2q9WEOT
Submitted April 05, 2018 at 09:46PM by xrna
via reddit https://ift.tt/2uRz5iJ
https://ift.tt/2q9WEOT
Submitted April 05, 2018 at 09:46PM by xrna
via reddit https://ift.tt/2uRz5iJ
Cyber Sins Security Blog
Finding subdomains for open source intelligence and pentest
Many of us are in the security consulting business, or bug bounties, or even network intelligence and have now and then come across a need to find subdomains. The requirement can be from either side of the table - a consultant assessing a client's internet…
Scammers abused Facebook phone number search - Facebook has discovered that "malicious actors" have been harvesting profiles for years by abusing its phone number and email search facility.
https://ift.tt/2Elhb7t
Submitted April 05, 2018 at 09:40PM by GayQuiz
via reddit https://ift.tt/2GB9ShR
https://ift.tt/2Elhb7t
Submitted April 05, 2018 at 09:40PM by GayQuiz
via reddit https://ift.tt/2GB9ShR
BBC News
Scammers abused Facebook phone number search
The company was warned by security researchers that the search tool could be abused.
This new tool is easy to use in finding subdomains for open source intelligence and pentest
https://ift.tt/2q9WEOT
Submitted April 05, 2018 at 10:06PM by xrna
via reddit https://ift.tt/2ElU4K1
https://ift.tt/2q9WEOT
Submitted April 05, 2018 at 10:06PM by xrna
via reddit https://ift.tt/2ElU4K1
Cyber Sins Security Blog
Finding subdomains for open source intelligence and pentest
Many of us are in the security consulting business, or bug bounties, or even network intelligence and have now and then come across a need to find subdomains. The requirement can be from either side of the table - a consultant assessing a client's internet…
Reverse engineering Dofoil/SmokeLoader
https://ift.tt/2GAVTbW
Submitted April 05, 2018 at 10:11PM by ohjeongwook
via reddit https://ift.tt/2GzOR2X
https://ift.tt/2GAVTbW
Submitted April 05, 2018 at 10:11PM by ohjeongwook
via reddit https://ift.tt/2GzOR2X
Microsoft
Hunting down Dofoil with Windows Defender ATP
Dofoil is a sophisticated threat that attempted to install coin miner malware on hundreds of thousands of computers in March, 2018. In previous blog posts we detailed how behavior monitoring and machine learning in Windows Defender AV protected customers…
Fake Software Update Abuses NetSupport Remote Access Tool
https://ift.tt/2qbKYKu
Submitted April 05, 2018 at 09:57PM by TechLord2
via reddit https://ift.tt/2GUtiOd
https://ift.tt/2qbKYKu
Submitted April 05, 2018 at 09:57PM by TechLord2
via reddit https://ift.tt/2GUtiOd
FireEye
Fake Software Update Abuses NetSupport Remote Access Tool « Fake Software Update Abuses NetSupport Remote Access Tool
FireEye is tracking an in-the-wild campaign that leverages compromised sites to spread fake updates, and sometimes NetSupport Manager remote access tool is the payload.
Oracle E-Business Suite security testing solution
https://ift.tt/2IwHw50
Submitted April 05, 2018 at 11:46PM by q123asa1
via reddit https://ift.tt/2JiMwex
https://ift.tt/2IwHw50
Submitted April 05, 2018 at 11:46PM by q123asa1
via reddit https://ift.tt/2JiMwex
New macOS Backdoor Linked to Cyber-espionage Group
https://ift.tt/2Emy9lY
Submitted April 05, 2018 at 11:06PM by Horus_Sirius
via reddit https://ift.tt/2GAmcPs
https://ift.tt/2Emy9lY
Submitted April 05, 2018 at 11:06PM by Horus_Sirius
via reddit https://ift.tt/2GAmcPs
TSecurity Portal
New macOS Backdoor Linked to Cyber-espionage Group
Check to see if your browser (and, possibly, your VPN) is leaking IPs via WebRTC data
https://ip.voidsec.com/
Submitted April 06, 2018 at 12:03AM by volci
via reddit https://ift.tt/2HbWb67
https://ip.voidsec.com/
Submitted April 06, 2018 at 12:03AM by volci
via reddit https://ift.tt/2HbWb67
reddit
Check to see if your browser (and, possibly, your... • r/security
1 points and 0 comments so far on reddit
CORS Findings: Another Way to Comprehend
https://ift.tt/2IjQSRe
Submitted April 06, 2018 at 12:18AM by albinowax
via reddit https://ift.tt/2H0Yk74
https://ift.tt/2IjQSRe
Submitted April 06, 2018 at 12:18AM by albinowax
via reddit https://ift.tt/2H0Yk74
TrustedSec
CORS Findings: Another Way to Comprehend - TrustedSec
by Ryan Leese When I first started learning about Cross Origin Resource Sharing (CORS) as it applies to web application pentesting, I found it was difficult to gather information needed to fully grasp the security implications of common CORS misconfigurations.…