Netsec – Telegram
Netsec
7.41K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Project Insecurity - New Infosec/Hacking/Bugbounty Forum Board and Security Research team.
https://ift.tt/2qgm2Sm

Submitted April 08, 2018 at 10:27AM by _MLT_
via reddit https://ift.tt/2HgZklc
OPCDE 2018 Cyber Security Conference Material [PDF] - (See Comment for Content list)
https://ift.tt/2qg2nC6

Submitted April 08, 2018 at 11:45AM by TechLord2
via reddit https://ift.tt/2uT8jGL
Windows Microsoft Office 2007 Security Question
I've been using Office 2007 for 10 years and am just fine with it. However, now that Microsoft is no longer supporting it, I am wondering if I am secure by merely using Malwarebytes and Bitdefender as there obviously will be no more security patches for Office 2007. Most important is protection for any crypto asset tasks that I need to do. I usually use Trezor or Ledger Nano S, but I'll have to register EOS soon and later probably Bytom, thus potentially exposing my private keys. I hate to stop using Office 2007 and fork out the money for the newest version, but protecting my precious crypto is the most important issue concerning my PC.

Submitted April 08, 2018 at 04:28PM by PunkIsBunk
via reddit https://ift.tt/2uSrtMY
INTERIOR INCIDENT RESPONSE PROGRAM CALLS FOR IMPROVEMENT
https://ift.tt/2EuE5ZT

Submitted April 08, 2018 at 06:09PM by Mufassa810
via reddit https://ift.tt/2IADKY7
Snort Rule to Detect Slow Loris Attack
Hi All,Looking for a bit of help here...As part of my uni course I need to select an attack then develop a Snort rule to detect it and show it in action. I found a Python implementation of the Slowloris attack, which I ran and analyzed. I found a common theme of the attack is the partial GET headers always contained the text 'X-a:' followed by four random digits. I wrote the following rule utilizing regular expressions (I believed this would cut down on false positives):alert tcp any any -> any 80 (msg:"Possible Slowloris Attack Detected"; \ flow:to_server,established; pcre:"/X-a|3a| \d{4}../"; sid:10000005;)which detects the attack successfully with minimal false positives.My question is how I could improve upon the rule, or even if there is a better rule altogether. I understand it's not the best method of detecting the attack, as the 'X-a' in the Python noscript could easily be changed to something altogether (I think).Thanks in advance for any advice.

Submitted April 08, 2018 at 08:42PM by dinosaurdave88
via reddit https://ift.tt/2GLpYS4
Help: Weird Spamming/Phishing Pattern
This morning I saw a flood of email in my gmail inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?

Submitted April 08, 2018 at 09:42PM by Omgwtf1001
via reddit https://ift.tt/2HifVoH
Weird Spamming Pattern
This morning I saw a flood of email in my inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?

Submitted April 08, 2018 at 09:32PM by Omgwtf1001
via reddit https://ift.tt/2uRmID2
best private messenger
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police

Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
best private messenger
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police

Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
Berkeley Offers Its Data Science Course Online For Free
https://ift.tt/2qhUWdB

Submitted April 09, 2018 at 01:05AM by Horus_Sirius
via reddit https://ift.tt/2GLG6ak
NetSupport Manager RAT Spread via Fake Updates
https://ift.tt/2qlrxPR

Submitted April 09, 2018 at 01:02AM by Horus_Sirius
via reddit https://ift.tt/2GLG6XS
Accounts to Follow on Twitter
So following the whole T-Mobile plaintext controversy over on Twitter, I've been using it for the whole day and realised that my Timeline is lacking in security content. Therefore, who do you guys follow on twitter to get Security Content?

Submitted April 09, 2018 at 02:15AM by IAmKoalatyOVH
via reddit https://ift.tt/2IEBBKX
Crack hashes using online rainbow table attack services, right from your terminal.
https://ift.tt/2uTIcQ0

Submitted April 09, 2018 at 06:46AM by _k4m4_
via reddit https://ift.tt/2GHetyY