Mind the hackers: Tips to maximise the security of your user data.
https://ift.tt/2Nnid7H
Submitted July 18, 2018 at 04:25PM by iHatePasswordz
via reddit https://ift.tt/2O0ZMqz
https://ift.tt/2Nnid7H
Submitted July 18, 2018 at 04:25PM by iHatePasswordz
via reddit https://ift.tt/2O0ZMqz
Medium
Mind the hackers: Tips to maximise the security of your user data.
By Angelina Liparteliani, Marketing Assistant for PixelPin Ltd
The SIM Hijackers
https://ift.tt/2uEqc8D
Submitted July 18, 2018 at 06:38PM by username3
via reddit https://ift.tt/2L3KC6j
https://ift.tt/2uEqc8D
Submitted July 18, 2018 at 06:38PM by username3
via reddit https://ift.tt/2L3KC6j
Motherboard
The SIM Hijackers
Meet the hackers who flip seized Instagram handles and cryptocurrency in a shady, buzzing underground market for stolen accounts and usernames. Their victims' weakness? Phone numbers.
Evading CSP with DOM-based dangling markup
https://ift.tt/2ux6gWe
Submitted July 18, 2018 at 07:43PM by albinowax
via reddit https://ift.tt/2zPo6Zl
https://ift.tt/2ux6gWe
Submitted July 18, 2018 at 07:43PM by albinowax
via reddit https://ift.tt/2zPo6Zl
Web Security Blog | PortSwigger
Evading CSP with DOM-based dangling markup
Dangling markup is a technique to steal the contents of the page without noscript by using resources such as images to send the data to a remote location that an attacker controls. It is useful when ref
Noise protocol matrix
https://ift.tt/2LtxpQ8
Submitted July 19, 2018 at 05:25AM by disclosure5
via reddit https://ift.tt/2LqZ7gt
https://ift.tt/2LtxpQ8
Submitted July 19, 2018 at 05:25AM by disclosure5
via reddit https://ift.tt/2LqZ7gt
reddit
r/netsec - Noise protocol matrix
2 votes and 0 comments so far on Reddit
Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) [xpost /r/WindowsSecurity]
https://ift.tt/2Ns4VXw
Submitted July 19, 2018 at 07:13AM by m8urn
via reddit https://ift.tt/2LuDpbw
https://ift.tt/2Ns4VXw
Submitted July 19, 2018 at 07:13AM by m8urn
via reddit https://ift.tt/2LuDpbw
j00ru//vx tech blog
Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) | j00ru//vx tech blog
During the weekend of 6-8th of July, our CTF team – Dragon Sector – played in an invite-only competition called WCTF, held in Beijing. The other participants were top-tier groups from around the world (e.g. Shellphish, ESPR, LC↯BC or Tokyo Westerns), and…
IBM reports 424% increase in breaches related to security misconfiguration in 2017. Here is the solution how to treat it.
https://ift.tt/2Nvck8P
Submitted July 19, 2018 at 05:50PM by hightechbridge
via reddit https://ift.tt/2LyV6GH
https://ift.tt/2Nvck8P
Submitted July 19, 2018 at 05:50PM by hightechbridge
via reddit https://ift.tt/2LyV6GH
Htbridge
Security Misconfiguration, a conscious element of OWASP Top 10, the risks and solutions
Security Misconfiguration is #6 in the current OWASP Top Ten Most Critical Web Application Security Risks. Misconfiguration can include both errors in the installation of security, and the complete failure to install available security controls.
How I was able to delete 13k+ Microsoft Translator Projects
https://ift.tt/2L97hhp
Submitted July 19, 2018 at 06:40PM by InformationSecurity
via reddit https://ift.tt/2O3hzgL
https://ift.tt/2L97hhp
Submitted July 19, 2018 at 06:40PM by InformationSecurity
via reddit https://ift.tt/2O3hzgL
Haider Mahmood Infosec Blog
How I was able to delete 13k+ Microsoft Translator Projects
Critical vulnerability found in Microsoft Translator Hub where all of its 13000 projects could be deleted using indirect object reference vulnerability
Many infosec professionals reuse passwords across multiple accounts - Help Net Security
https://ift.tt/2L1oY2d
Submitted July 19, 2018 at 06:33PM by iHatePasswordz
via reddit https://ift.tt/2Npt80L
https://ift.tt/2L1oY2d
Submitted July 19, 2018 at 06:33PM by iHatePasswordz
via reddit https://ift.tt/2Npt80L
Help Net Security
Many infosec professionals reuse passwords across multiple accounts - Help Net Security
A Lastline survey from June 2018 revealed that 45 percent of infosec professionals reuse passwords across multiple accounts.
Mind the hackers: – PixelPin – Medium
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
Medium
Mind the hackers:
Financial losses are reaching billions of dollars, and about 30-40% of attacks are conducted by schoolkids of 14–16 years.
Reverse engineering some Javanoscript malware
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
blog.jse.li
Reversing JS Malware From marveloptics.com | Jesse Li
The injected noscript steals checkout form data and sends it to a Chinese-owned domain. But the attackers are really bad at programming.
Rule Splitting in Hashtopolis to allow better distribution on Clusters (using Hashcat)
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
Wordpress
Rule Splitting in Hashtopolis
When dealing with tasks that have rules and wordlists, Hashcat internally distributes the wordlist to the shaders on the GPUs but, gives all the rules to each shader. This means every shader has a …
How to instrument Electron-based applications for in-depth security testing
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
reddit
r/netsec - How to instrument Electron-based applications for in-depth security testing
2 votes and 0 comments so far on Reddit
Bypassing Memory Scanners with Cobalt Strike and Gargoyle
https://ift.tt/2O22xYD
Submitted July 20, 2018 at 01:50AM by jalospinoso
via reddit https://ift.tt/2uMpxSU
https://ift.tt/2O22xYD
Submitted July 20, 2018 at 01:50AM by jalospinoso
via reddit https://ift.tt/2uMpxSU
How to instrument Electron-based applications for in-depth security testing.
https://ift.tt/2LbFoVO
Submitted July 20, 2018 at 01:27PM by nibblesec
via reddit https://ift.tt/2NuqB5m
https://ift.tt/2LbFoVO
Submitted July 20, 2018 at 01:27PM by nibblesec
via reddit https://ift.tt/2NuqB5m
Doyensec
Instrumenting Electron Apps for Security Testing · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.
Top 10 Web Hacking Techniques of 2017 - Nominations Open
https://ift.tt/2Lqd9yU
Submitted July 20, 2018 at 02:28PM by 0xdea
via reddit https://ift.tt/2L6FjTo
https://ift.tt/2Lqd9yU
Submitted July 20, 2018 at 02:28PM by 0xdea
via reddit https://ift.tt/2L6FjTo
Web Security Blog | PortSwigger
Top 10 Web Hacking Techniques of 2017 - Nominations Open
Nominations are now open for the Top 10 Web Hacking Techniques of 2017. Every year, numerous security researchers choose to share their findings with the community through conference presentations, bl
Unbound DNS Server Tutorial @ Calomel.org
https://ift.tt/1wWoivv
Submitted July 20, 2018 at 03:09PM by unquietwiki
via reddit https://ift.tt/2Nsva02
https://ift.tt/1wWoivv
Submitted July 20, 2018 at 03:09PM by unquietwiki
via reddit https://ift.tt/2Nsva02
SSL/TLS for dummies part 4 - Understanding the TLS Handshake Protocol | First second of HTTPS
https://ift.tt/2LpecT6
Submitted July 20, 2018 at 05:38PM by silentsniffer
via reddit https://ift.tt/2zRD4hH
https://ift.tt/2LpecT6
Submitted July 20, 2018 at 05:38PM by silentsniffer
via reddit https://ift.tt/2zRD4hH
WST
SSL/TLS for dummies part 4 - Understanding the TLS Handshake Protocol | WST
First few milliseconds of ssl tls connection.TLS handshake protocol explained in depth with wireshark. RSA,Diffie Hellman.TLS records.CA cert
Into the Borg - SSRF inside Google production network
https://ift.tt/2uN8DU5
Submitted July 20, 2018 at 09:25PM by geekadi
via reddit https://ift.tt/2JF4c2U
https://ift.tt/2uN8DU5
Submitted July 20, 2018 at 09:25PM by geekadi
via reddit https://ift.tt/2JF4c2U
OpnSec
Into the Borg – SSRF inside Google production network | OpnSec
Intro - Testing Google Sites and Google Caja In March 2018, I reported an XSS in Google Caja, a tool to securely embed arbitrary html/javanoscript in a webpage. In May 2018, after the XSS was fixed, I realised that Google Sites was using an unpatched version…
Backdoors Keep Appearing In Cisco's Routers
https://ift.tt/2LcMFES
Submitted July 20, 2018 at 09:09PM by GoHomeGrandmaUrHigh
via reddit https://ift.tt/2zW7S0z
https://ift.tt/2LcMFES
Submitted July 20, 2018 at 09:09PM by GoHomeGrandmaUrHigh
via reddit https://ift.tt/2zW7S0z
Tom's Hardware
Backdoors Keep Appearing In Cisco's Routers
Five different backdoors were found in Cisco's software this year, and Cisco's history with backdoors goes back many years.
New Mirai and Gafgyt IoT/Linux Botnet Campaigns - Palo Alto Networks Blog
https://ift.tt/2uBjkdf
Submitted July 20, 2018 at 09:03PM by todhsals
via reddit https://ift.tt/2uCsw0U
https://ift.tt/2uBjkdf
Submitted July 20, 2018 at 09:03PM by todhsals
via reddit https://ift.tt/2uCsw0U
Palo Alto Networks Blog
Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns - Palo Alto Networks Blog
Unit 42 documents the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt malware families that incorporate multiple known exploits affecting Internet of Things (IoT) device.
Into the Borg – SSRF inside Google production network
https://ift.tt/2uN8DU5
Submitted July 21, 2018 at 01:46AM by PrimeMover17
via reddit https://ift.tt/2LwyZAL
https://ift.tt/2uN8DU5
Submitted July 21, 2018 at 01:46AM by PrimeMover17
via reddit https://ift.tt/2LwyZAL
OpnSec
Into the Borg – SSRF inside Google production network | OpnSec
Intro - Testing Google Sites and Google Caja In March 2018, I reported an XSS in Google Caja, a tool to securely embed arbitrary html/javanoscript in a webpage. In May 2018, after the XSS was fixed, I realised that Google Sites was using an unpatched version…