Automatically Stealing Password Hashes with Microsoft Outlook and OLE
https://ift.tt/2v5tw06
Submitted April 11, 2018 at 01:09AM by certcc
via reddit https://ift.tt/2IKorfL
https://ift.tt/2v5tw06
Submitted April 11, 2018 at 01:09AM by certcc
via reddit https://ift.tt/2IKorfL
insights.sei.cmu.edu
Automatically Stealing Password Hashes with Microsoft Outlook and OLE
Back in 2016, a coworker of mine was using CERT BFF, and he asked how he could turn a seemingly exploitable crash in Microsoft Office into a proof-of-concept exploit that runs calc.exe. Given Address Space Layout Randomization (ASLR) on modern...
Module 6 - Hacking Webservers - Free Ethical Hacking Course
https://ift.tt/2GLJT7l
Submitted April 11, 2018 at 12:14AM by gburu
via reddit https://ift.tt/2EAZ918
https://ift.tt/2GLJT7l
Submitted April 11, 2018 at 12:14AM by gburu
via reddit https://ift.tt/2EAZ918
en.gburu.net: Blog about technology, free courses, ethical hacking and more!
Module 6 - Hacking Webservers - Free Ethical Hacking Course - en.gburu.net
In this new module of the free hacking course, we will know more about hacking web servers!
Reading about The Business Club got me thinking; what's your favorite hacker group/malware distributor story
No text found
Submitted April 11, 2018 at 12:07AM by ZeusKnobby
via reddit https://ift.tt/2JzlIH7
No text found
Submitted April 11, 2018 at 12:07AM by ZeusKnobby
via reddit https://ift.tt/2JzlIH7
reddit
Reading about The Business Club got me thinking;... • r/security
1 points and 0 comments so far on reddit
AlgoSec Launches AlgoSaaS, First & Only Network Security Policy Management Software as a Service Solution
https://ift.tt/2qkaehK
Submitted April 10, 2018 at 11:47PM by samson_78
via reddit https://ift.tt/2GMPNW6
https://ift.tt/2qkaehK
Submitted April 10, 2018 at 11:47PM by samson_78
via reddit https://ift.tt/2GMPNW6
GlobeNewswire News Room
AlgoSec Launches AlgoSaaS, First & Only Network Security Policy Management Software as a Service Solution
New SaaS Offering Delivers Flexible Deployment and Usage Options that Support the Needs of Organizations as They Adopt a Business-Driven Approach to Security Management
technology
https://ift.tt/2qbWvu7
Submitted April 11, 2018 at 03:43AM by samson_78
via reddit https://ift.tt/2Hc9GoU
https://ift.tt/2qbWvu7
Submitted April 11, 2018 at 03:43AM by samson_78
via reddit https://ift.tt/2Hc9GoU
GeekWire
Can technology drag us out of the car-centric era of regional transportation design?
Technology has changed so many sectors of our economy, but most regional transportation systems in the U.S. remain locked in the middle of the 20th century.
Warning: Your Windows PC Can Get Hacked by Just Visiting a Site
https://ift.tt/2v4ULrx
Submitted April 11, 2018 at 03:28AM by Another_One_123
via reddit https://ift.tt/2GRhGIo
https://ift.tt/2v4ULrx
Submitted April 11, 2018 at 03:28AM by Another_One_123
via reddit https://ift.tt/2GRhGIo
The Hacker News
Warning: Your Windows PC Can Get Hacked by Just Visiting a Site
Microsoft has released its April 2018 patch tuesday updates, fixing total 65 security vulnerabilities
Facebook Security:
How to check if our data was stolen... Anyone give me some perfect example..
Submitted April 11, 2018 at 12:54PM by grogerysolberg
via reddit https://ift.tt/2EC4Iw0
How to check if our data was stolen... Anyone give me some perfect example..
Submitted April 11, 2018 at 12:54PM by grogerysolberg
via reddit https://ift.tt/2EC4Iw0
reddit
Facebook Security: • r/security
How to check if our data was stolen... Anyone give me some perfect example..
IoT security events and conferences for 2018- the complete list
https://ift.tt/2qqfQae
Submitted April 11, 2018 at 12:38PM by Iot_Security
via reddit https://ift.tt/2GQ7QdY
https://ift.tt/2qqfQae
Submitted April 11, 2018 at 12:38PM by Iot_Security
via reddit https://ift.tt/2GQ7QdY
SecuriThings
IoT security events and conferences for 2018
Since we started curating the IoT Security events list, several new events have been announced. So, we present to you the updated events list, from now until the end of the year. You can [...]
Google, Microsoft, and Mozilla Put Their Backing Behind New WebAuthn API
https://ift.tt/2HqdU9V
Submitted April 11, 2018 at 01:50PM by htbridgedigital
via reddit https://ift.tt/2GQuEud
https://ift.tt/2HqdU9V
Submitted April 11, 2018 at 01:50PM by htbridgedigital
via reddit https://ift.tt/2GQuEud
BleepingComputer
Google, Microsoft, and Mozilla Put Their Backing Behind New WebAuthn API
Three major browser makers —Google, Microsoft, and Mozilla—have put their official backing behind a new W3C API called Web Authentication (WebAuthn) that is advertised as a reliable alternative to passwordless online authentication.
RSA Conference 2018
https://ift.tt/2qmsIPC
Submitted April 11, 2018 at 02:56PM by JessicaLaura22
via reddit https://ift.tt/2IGRXmE
https://ift.tt/2qmsIPC
Submitted April 11, 2018 at 02:56PM by JessicaLaura22
via reddit https://ift.tt/2IGRXmE
Comodo
Happy Hour Registration | Get Your FREE Threat Intelligence Report
Happy Hour Registration is on!! Pre-Register with us to meet Comodo experts at the RSA Booth and get your free Valkyrie Threat Intelligence Report.
Physical security needs protection from the onset
https://ift.tt/2HeCRYk
Submitted April 11, 2018 at 04:01PM by Iot_Security
via reddit https://ift.tt/2v0fAnW
https://ift.tt/2HeCRYk
Submitted April 11, 2018 at 04:01PM by Iot_Security
via reddit https://ift.tt/2v0fAnW
SecuriThings
Physical security needs protection from the onset
When the masses start to use industry terminology, things have clearly gone mainstream. IoT is now mainstream, and there is no turning back. But, is security ready to move ahead at the speed of [...]
Analysis of a hacked WordPress site
https://ift.tt/2qoSguv
Submitted April 11, 2018 at 04:14PM by glen_scott
via reddit https://ift.tt/2v6TeRO
https://ift.tt/2qoSguv
Submitted April 11, 2018 at 04:14PM by glen_scott
via reddit https://ift.tt/2v6TeRO
Glen Scott - Handcrafting software to help businesses
WordPress hacked site – forensics report
I was recently approached by a company whose website had unfortunately been hacked. This post details the forensics I performed during the clean-up operation. I’ll also note specific WordPres…
RSA Conference 2018 – Unofficial list of RSA Conference and Vendor Parties
https://ift.tt/2v469El
Submitted April 11, 2018 at 04:45PM by Iot_Security
via reddit https://ift.tt/2HiR1Yi
https://ift.tt/2v469El
Submitted April 11, 2018 at 04:45PM by Iot_Security
via reddit https://ift.tt/2HiR1Yi
Here's how to avoid being tracked online
https://ift.tt/2GRi0Xu
Submitted April 11, 2018 at 05:14PM by GustavOliv
via reddit https://ift.tt/2Hu6iTK
https://ift.tt/2GRi0Xu
Submitted April 11, 2018 at 05:14PM by GustavOliv
via reddit https://ift.tt/2Hu6iTK
Gizmodo Australia
How To Avoid Being Tracked Online
If you were concerned about Facebook tracking your every move, do I have news for you that will just make your day - or not. Surprise! You're constantly...
Breaking CFI: Exploiting CVE-2015-5122 using COOP
https://ift.tt/2IHmC3e
Submitted April 11, 2018 at 05:00PM by shleimeleh
via reddit https://ift.tt/2v1GGeB
https://ift.tt/2IHmC3e
Submitted April 11, 2018 at 05:00PM by shleimeleh
via reddit https://ift.tt/2v1GGeB
Perception Point
Breaking CFI: Exploiting CVE-2015-5122 using COOP | Perception Point
In this series of posts we're going to demonstrate how modern CFI implementations can be circumvented. Specifically in this post we'll be demonstrating an advanced code reuse technique, Counterfeit Object-Oriented Programming6 (COOP) utilizing an old vulnerability…
Remote Hash Extraction On Demand Via Host Security Denoscriptor Modification
https://ift.tt/2JBJ92n
Submitted April 11, 2018 at 05:55PM by ProvadysOffsec
via reddit https://ift.tt/2Hb1l4R
https://ift.tt/2JBJ92n
Submitted April 11, 2018 at 05:55PM by ProvadysOffsec
via reddit https://ift.tt/2Hb1l4R
Posts By SpecterOps Team Members
Remote Hash Extraction On Demand Via Host Security Denoscriptor Modification
This is the long overdue follow-up to the “An ACE in the Hole: Stealthy Host Persistence via Security Denoscriptors” presentation (slides and video) that @tifkin_, @enigma0x3, and I gave at DerbyCon…
Security In 5: Episode 214 - Protecting Your Business From A Ransomware Attack
https://ift.tt/2GQeDUT
Submitted April 11, 2018 at 06:31PM by BinaryBlog
via reddit https://ift.tt/2qpj1iK
https://ift.tt/2GQeDUT
Submitted April 11, 2018 at 06:31PM by BinaryBlog
via reddit https://ift.tt/2qpj1iK
Libsyn
Security In Five Podcast: Episode 214 - Protecting Your Business From A Ransomware Attack
Ransomware attacks are an unfortunate reality in today's world. They can be far more disruptive and destructive than your typical malware. Ransomware can destroy your business and data. There are things you can do to protect your business. This episode goes…
Filtering out top 1 million domains from corporate network traffic
https://ift.tt/2GPSa6e
Submitted April 11, 2018 at 07:02PM by daanraman
via reddit https://ift.tt/2v7QtzM
https://ift.tt/2GPSa6e
Submitted April 11, 2018 at 07:02PM by daanraman
via reddit https://ift.tt/2v7QtzM
NVISO LABS - blog
Filtering out top 1 million domains from corporate network traffic
During network traffic analysis and malware investigations, we often use IP and domain reputation lists to quickly filter out traffic we can expect to be benign. This typically includes filtering o…
A few weeks ago my computer got hacked and 7500$ worth of Bitcoin were stolen. Here are few things I learned:
I'm writing this post with a hope that it might help other people to start thinking about their security & also to understand that it can happen to anyone.Here are few things I wish I knew before:Don't download a torrent from risky websites (I tried to download a software from a website I never saw before, a few weeks ago and I think that's where I got the malware)If you hold any Bitcoin, Ethereum or any other cryptocurrency, Buy Nano ledger, Don't be cheap with your self, It doesn't worth the risk.https://www.ledgerwallet.com/products/ledger-nano-sUse MetaMask, It's a must for every crypto trader.In few minutes you can educate your self and prevent things like that from happening. I learned few useful stuff at this article, I believe it might be useful for youhttps://medium.com/swarmdotmarket/5-ways-to-prevent-your-crypto-wallet-from-being-hacked-981acd86bc43
Submitted April 11, 2018 at 07:48PM by chanfle
via reddit https://ift.tt/2GOAmfL
I'm writing this post with a hope that it might help other people to start thinking about their security & also to understand that it can happen to anyone.Here are few things I wish I knew before:Don't download a torrent from risky websites (I tried to download a software from a website I never saw before, a few weeks ago and I think that's where I got the malware)If you hold any Bitcoin, Ethereum or any other cryptocurrency, Buy Nano ledger, Don't be cheap with your self, It doesn't worth the risk.https://www.ledgerwallet.com/products/ledger-nano-sUse MetaMask, It's a must for every crypto trader.In few minutes you can educate your self and prevent things like that from happening. I learned few useful stuff at this article, I believe it might be useful for youhttps://medium.com/swarmdotmarket/5-ways-to-prevent-your-crypto-wallet-from-being-hacked-981acd86bc43
Submitted April 11, 2018 at 07:48PM by chanfle
via reddit https://ift.tt/2GOAmfL
Ledger
Buy Ledger Nano S Plus Hardware Wallet | Ledger
Our No-Brainer Entry-Level Ledger with all Essentials to Secure your Digital Assets. #1 Hardware Wallet Provider. Over 8 million Customers Trust Ledger.
Introducing Snallygaster - a Tool to Scan for Secrets on Web Servers
https://ift.tt/2JCkrzd
Submitted April 11, 2018 at 08:01PM by speckz
via reddit https://ift.tt/2GQ7JLb
https://ift.tt/2JCkrzd
Submitted April 11, 2018 at 08:01PM by speckz
via reddit https://ift.tt/2GQ7JLb
reddit
Introducing Snallygaster - a Tool to Scan for Secrets... • r/security
1 points and 1 comments so far on reddit
Experienced first ransomware episode - need advice on go forward business strategy
Hello all,Long time lurker to this subreddit, first time poster :)I manage IT and marketing for a company that acquires smaller companies that align with our overall strategy. The companies that we acquire are much smaller than us (usually 15-40 employees) and are kind of "mom and pop" owned and operated.From an IT perspective, we have tried to create somewhat of an "in the cloud" technology approach that we can plug these smaller companies into so that we can get everyone on the same basic systems and speed up the process of overall integration.We use Google for business for our email and "file server" solution. Each "division" (company we acquire) has their own folder in the drive that contains all of their related files and folders.WELL - 2 weeks ago one of our divisions that we recently purchased (2 months ago) was victim of a brute force attack which resulted in all files on the file server, the ERP server, and the CRM server to be encrypted with ransomware. Being that we just bought the company 2 months ago, we had not moved their files from their file server to our Google Drive just yet (we don't like to just go in guns a' blazin and make the employees feel like we are changing EVERYTHING at once lol). A backup solution was in place both locally (which was deleted via the hack) and in the cloud - so everything was ok.Being that it was my first experience with ransomware it got me thinking about how we are currently do things and what we should be doing on a go forward. IF that division had been on our Google Drive...that ransomware could have spread to the rest of the company...So I am really just trying to understand what "best practice" is for utilizing/structuring/securing Google Drive for business as a "file server" solution on a go forward, AND best practice for backing the Google Drive up for the entire company so that we can be as full proof as we can be for a potential ransomware situation.Our users currently use Google File Stream on their local PC's. We are running a daily backup to a local PC at our corporate location, and a weekly backup to an external hard drive that is then disconnected and moved off-site.I definitely see the need for a completely restructured approach - I just need some direction :) I appreciate any advice in advance!Thanks guys,-R
Submitted April 11, 2018 at 07:59PM by Machinegamer
via reddit https://ift.tt/2Hfbq0w
Hello all,Long time lurker to this subreddit, first time poster :)I manage IT and marketing for a company that acquires smaller companies that align with our overall strategy. The companies that we acquire are much smaller than us (usually 15-40 employees) and are kind of "mom and pop" owned and operated.From an IT perspective, we have tried to create somewhat of an "in the cloud" technology approach that we can plug these smaller companies into so that we can get everyone on the same basic systems and speed up the process of overall integration.We use Google for business for our email and "file server" solution. Each "division" (company we acquire) has their own folder in the drive that contains all of their related files and folders.WELL - 2 weeks ago one of our divisions that we recently purchased (2 months ago) was victim of a brute force attack which resulted in all files on the file server, the ERP server, and the CRM server to be encrypted with ransomware. Being that we just bought the company 2 months ago, we had not moved their files from their file server to our Google Drive just yet (we don't like to just go in guns a' blazin and make the employees feel like we are changing EVERYTHING at once lol). A backup solution was in place both locally (which was deleted via the hack) and in the cloud - so everything was ok.Being that it was my first experience with ransomware it got me thinking about how we are currently do things and what we should be doing on a go forward. IF that division had been on our Google Drive...that ransomware could have spread to the rest of the company...So I am really just trying to understand what "best practice" is for utilizing/structuring/securing Google Drive for business as a "file server" solution on a go forward, AND best practice for backing the Google Drive up for the entire company so that we can be as full proof as we can be for a potential ransomware situation.Our users currently use Google File Stream on their local PC's. We are running a daily backup to a local PC at our corporate location, and a weekly backup to an external hard drive that is then disconnected and moved off-site.I definitely see the need for a completely restructured approach - I just need some direction :) I appreciate any advice in advance!Thanks guys,-R
Submitted April 11, 2018 at 07:59PM by Machinegamer
via reddit https://ift.tt/2Hfbq0w
reddit
Experienced first ransomware episode - need advice on... • r/security
Hello all, Long time lurker to this subreddit, first time poster :) I manage IT and marketing for a company that acquires smaller companies that...