Netsec – Telegram
Netsec
7.41K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
**Uncloak: unique solution against the cyber hackers**
Next Generation Cyber Security Threat Management We all know of one of the world’s major problems, with new breaches of data and releases of ransomware occurring at an alarming rate, it is Computer hacking. Cyber-crime is predicted to cost $6 trillion annually by 2021. There is a shortage of cyber security solutions that are proactive in identifying new threats and allowing end users to shut them out or close them down. Often times companies want to secure their network but it’s far too complex or too expensive for them to do so effectively.
**cybersecurity Top facts, figures and statistics for 2018** 
Cyber crime damage costs to hit $6 trillion annually by 2021. Cybersecurity spending to exceed $1 trillion from 2017 to 2021 Cyber crime will more than triple the number of unfilled cybersecurity jobs Human attack surface to reach 6 billion people by 2022 Global ransomware damage costs are predicted to exceed $5 billion in 2017.Billionaire businessman Warren Buffet takes it a step further and says that cyber attacks are the number one problem with mankind, even worse than nuclear weapons. No business is safe, big corporations or a small family run business, we are all at risk. Uncloak has a set of features catered for 1-500 members of staff as well as large enterprises, so we’re a full market solution for what we offer with our application.UNCLOAK! is in a unique position to becoming a market leader in Cyber security threat detection because, it not only engages an active community of cyber security experts to find undiscovered security threats, but it also constantly updates itself using AI (Artificial Intelligence) technology to scan the internet looking for upcoming security vulnerabilities to add to its threat vulnerability database.Uncloak to become a “Zero hour Exploit” company not just a "Zero day Exploit”UNCLOAK will eliminate cyber threats and stay one step ahead of the hacker. It is a next generation cyber security vulnerability scanning system, to ensure businesses remain compliant and aware of security issues. Uncloak provides a commercial tool that will close this gap and drive significant revenues across the many sectors that are susceptible to cyber-crime. Advanced AI (artificial intelligence) to check public & hidden internet data for cyber threats.UNCLOAK seeks to make this level of cyber security available on a mass scale, at a lower cost and with simple end user interaction. One: It’s an absolute unique solution. We have 3 elements in the system itself: one is a vulnerability scanner which is able to scan your company’s computer system looking for vulnerabilities in terms of how someone might be able to break into your computer; secondly: we also have an AI integrated into our system that is able to go out into the public internet and the dark web and look for vulnerabilities that have not been reported anywhere in order to catch them before they arrive at the public arena; and thirdly: we have what’s known as a “Bug Bounty” which basically allows us to pass any threats or vulnerabilities through to a team of qualified and registered ethical hackers that are able to check whether this vulnerability really does exist, then get rewarded for finding a vulnerability. All within a system powered by eos.io software.UNCLOAK is a cybersecurity company through and through, a team of professionals that haven’t just been put together for this project but have worked together for a number of years now, in conjunction to us working with EOS, that it’s definitely going to be the best blockchain that we’re going to see for a long period of time and set the scale on how computing is going to be done in the future.

Submitted April 10, 2018 at 03:46AM by Uncloakio
via reddit https://ift.tt/2IFvuGk
CVE-2018-9840 - Signal Bypass Screen locker
https://ift.tt/2qimhNE

Submitted April 10, 2018 at 04:07AM by aokno
via reddit https://ift.tt/2GOTO8a
What are best YouTube videos to watch for Infosec?
Been watching Security Weekly Buy was curious if anyone had any other suggestions

Submitted April 10, 2018 at 06:45AM by uShouldTryXTC
via reddit https://ift.tt/2Ez2qhd
Facebook and Cambridge Analytica
https://ift.tt/2E85VuT

Submitted April 10, 2018 at 07:11AM by fesasso
via reddit https://ift.tt/2uZ3RpI
P4wnP1 - a highly customizable USB attack platform based on Raspberry Pi Zero/W [Full Sources incl Video Demos]
https://ift.tt/2v3UdR3

Submitted April 10, 2018 at 07:38AM by TechLord2
via reddit https://ift.tt/2GONzFK
JSON Web Token (JWT) Security Cheat Sheet [PDF]
https://ift.tt/2v0Vpqe

Submitted April 10, 2018 at 12:20PM by Gallus
via reddit https://ift.tt/2Hs86wV
Yet another Drupal scanner - Drupwn
https://ift.tt/2qguOAI

Submitted April 10, 2018 at 02:53PM by Nitr4x
via reddit https://ift.tt/2GLxxrX
HoleyBeep: Explanations and exploit
https://ift.tt/2v1zT4n

Submitted April 10, 2018 at 02:17PM by rain5
via reddit https://ift.tt/2GPs07J
How I broke into Google Issue Tracker
https://ift.tt/2ExxwWx

Submitted April 10, 2018 at 05:59PM by infocentric
via reddit https://ift.tt/2JxmBjq
Similiar domain hijacked email thread and got paid
A customer of mine recently was involved in a scam and is asking what they can do to prevent it from happening again.My Customer is "apples.com"Thier Customer is "oranges.com"Scammer is "applles.com"There was an email thread going back and forth between apples.com and oranges.com with apples seeking payment for services already received. This was all legitimate traffic, however somewhere along the way the thread was hijacked? and the talks became between oranges.com and applles.com. Same exact names and looked very legitimate and oranges.com never noticed that the domain changed.The applles.com then said that thier banking institution was changed and to please send the payment to "applles bank". Unfortunetly oranges never noticed the domain change and made the payment.What, if anything, can be done on apples side to prevent this from happening again? How did applles get a hold of the email thread? or is this all on oranges to recognize this and apples can't do anything?

Submitted April 10, 2018 at 07:19PM by Adamal47
via reddit https://ift.tt/2v24O0H