Netsec – Telegram
Netsec
7.39K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Can people connected to the same VPN Server than me see what I am doing or log into a session I am in or something ? Thanks :)
No text found

Submitted May 07, 2018 at 03:29PM by aymanbt
via reddit https://ift.tt/2roGdy0
Gilbert Verdian, MasterCard Cyber-security Executive, Leaves Role for Blockchain Start-up Quant Network - Press Release - Digital Journal
https://ift.tt/2I1ypJF

Submitted May 07, 2018 at 08:58PM by fluidchains
via reddit https://ift.tt/2rpy4Kj
3 Facts About the Changing State of Ransomware
https://ift.tt/2w8JpmS

Submitted May 07, 2018 at 10:38PM by volci
via reddit https://ift.tt/2jDgK0f
Asset Discovery: Doing Reconnaissance the Hard Way
https://ift.tt/2HXTQ26

Submitted May 07, 2018 at 11:12PM by patrikhudak
via reddit https://ift.tt/2jFmoim
sudo_pair 0.9.0 released (a dual control plugin for sudo)
https://ift.tt/2FKslTR

Submitted May 08, 2018 at 12:05AM by stouset
via reddit https://ift.tt/2KFHl98
Prestashop code exec writeup
https://ift.tt/2HVEo6R

Submitted May 07, 2018 at 11:43PM by websecdev
via reddit https://ift.tt/2rqu10r
XXEinjector – Automatic XXE Injection Tool For Exploitation (With Sources)
https://ift.tt/1TJAWrw

Submitted May 08, 2018 at 12:15AM by TechLord2
via reddit https://ift.tt/2wrMEpA
Asset Discovery: Doing Reconnaissance the Hard Way
https://ift.tt/2HXTQ26

Submitted May 08, 2018 at 01:59AM by patrikhudak
via reddit https://ift.tt/2wk6EdP
Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K
https://ift.tt/2rrffG2

Submitted May 08, 2018 at 02:06AM by volci
via reddit https://ift.tt/2IjqxXk
Getting weird access attempts in Nginx logs, should I ban them?
I don't check my logs ofter, which I should, but I saw that I have a lot of weird GET attempts to endpoints that I don't have anywhere on my server. Are these people trying to break into my server? I have auto ban setup that will ban after a certain number of attempts and my server is really locked down, I just wanted to know make sure these are attempts so I can ban their IP'S.And then I have a few access attempts to Php Myadmin as well.Is there any common access points that I can find somewhere that would let me know they're using some type of software or something to break into the server, so I would be able to ban them automatically?

Submitted May 08, 2018 at 02:00AM by Bilal_Tech
via reddit https://ift.tt/2K0OL5K
Azure AD Login correlation false positives when users are traveling
This seems to be a fundamental flaw in how our security is designed but I wanted to see what everyone else is doing.We track user logins to Azure Active Directory, when a log event occurs from within one Country and then from another Country within a certain amount of time, it generates a "Impossible travel time" error and alerts us. The idea is that if you sign into your computer in US and then within 1 hour you sign in from Japan, there is a strong likelihood the account was compromised since it would take another 9+ hours to hop on a plane from the US to Japan. This works really well but recently we’ve had a lot of users traveling and their cell phones seem to undermine the entire system.Users have a mail account on their phone, when they're traveling their phone seem to still communicate to a US datacenter even though their on an international plan/carrier with their US phone (I guess it routes from Europe back to US?). That then constantly triggers the "Impossible travel time" alert as a false positive since they are physically in the other country with their laptop, signing in, but their cell phone still beacons back to a US address.That’s one guess, another guess is there is some sort of token/cache on their phone which is still talking about to the US server. Either way it completely undermines the purpose of this product (except for the users who don’t travel but when they go on vacation the same thing happens)Please let me know your thoughts. This is functionality that is built into Azure Active Directory, so this isn’t anything custom.https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-risk-events

Submitted May 08, 2018 at 02:44AM by mactalker
via reddit https://ift.tt/2jCV7Ns