BAE report on the most common cybersecurity misconceptions / closing the gap
https://ift.tt/2yMGo9Q
Submitted October 17, 2018 at 10:29PM by Christthatsoupishot
via reddit https://ift.tt/2pYS2dK
https://ift.tt/2yMGo9Q
Submitted October 17, 2018 at 10:29PM by Christthatsoupishot
via reddit https://ift.tt/2pYS2dK
The Secure Developer - Managing Security with The RealReal’s Julie Tsai
https://ift.tt/2PyMfHb
Submitted October 17, 2018 at 10:57PM by fortyfivan
via reddit https://ift.tt/2COrjsV
https://ift.tt/2PyMfHb
Submitted October 17, 2018 at 10:57PM by fortyfivan
via reddit https://ift.tt/2COrjsV
Heavybit
The Secure Developer | Ep. #21, Managing Security with The RealReal's Julie Tsai | Heavybit
In episode 21 of The Secure Developer, Guy meets with Julie Tsai, Head of Security for the RealReal, to discuss ways to manage secure systems and bridge the gap between security and DevOps.
Guide to User Data Security (updated)
https://ift.tt/2yLFISf
Submitted October 17, 2018 at 10:52PM by brokenwren
via reddit https://ift.tt/2QV8g37
https://ift.tt/2yLFISf
Submitted October 17, 2018 at 10:52PM by brokenwren
via reddit https://ift.tt/2QV8g37
FusionAuth
Guide to User Data Security
Protect your user data with this step-by-step guide to secure your servers and applications.
5 Security Vulnerabilities You Don’t Want to Overlook
https://ift.tt/2RW6xMl
Submitted October 18, 2018 at 01:59PM by dunryc
via reddit https://ift.tt/2Eua7uD
https://ift.tt/2RW6xMl
Submitted October 18, 2018 at 01:59PM by dunryc
via reddit https://ift.tt/2Eua7uD
Zerohedge
5 Security Vulnerabilities You Don’t Want to Overlook
A large budget doesn’t guarantee an airtight system and even the largest corporations have been known to overlook many common security liabilities.
Fuzz in sixty seconds
https://ift.tt/2CUPwxG
Submitted October 18, 2018 at 08:08PM by albinowax
via reddit https://ift.tt/2CRiX3P
https://ift.tt/2CUPwxG
Submitted October 18, 2018 at 08:08PM by albinowax
via reddit https://ift.tt/2CRiX3P
bugid.skylined.nl
Fuzz in sixty seconds
Use publicly available tools to quickly start fuzzing browsers.
VetSec Takes First in the Hacktober CTF: Summary & Steganography Write-up!
https://ift.tt/2EuLkqb
Submitted October 18, 2018 at 11:32PM by m4v3r1ck-
via reddit https://ift.tt/2J6Fzhd
https://ift.tt/2EuLkqb
Submitted October 18, 2018 at 11:32PM by m4v3r1ck-
via reddit https://ift.tt/2J6Fzhd
VeteranSec
VetSec Takes First in the Hacktober CTF: Summary & Steganography Write-up!
For the last week, VetSec competed in the Hacktober.org CTF event, which consisted of challenges in forensics, steganography, programming, offensive tactics, web application, reverse engineering, c…
A cookie stealer disguised as a GIF image
https://ift.tt/2RZ0C9b
Submitted October 19, 2018 at 12:37AM by atum47
via reddit https://ift.tt/2EHU50n
https://ift.tt/2RZ0C9b
Submitted October 19, 2018 at 12:37AM by atum47
via reddit https://ift.tt/2EHU50n
GitHub
victorqribeiro/cookieStealer
A cookie stealer disguised as a gif image. Contribute to victorqribeiro/cookieStealer development by creating an account on GitHub.
Detecting Encrypted Malware Traffic (Without Decryption)
https://ift.tt/2s37fJG
Submitted October 19, 2018 at 01:19AM by EvanConover
via reddit https://ift.tt/2EuUbIh
https://ift.tt/2s37fJG
Submitted October 19, 2018 at 01:19AM by EvanConover
via reddit https://ift.tt/2EuUbIh
blogs@Cisco - Cisco Blogs
Detecting Encrypted Malware Traffic (Without Decryption)
Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.
Having The Security Rug Pulled Out From Under You - Akamai Security Intelligence and Threat Research Blog
https://ift.tt/2yoWZl4
Submitted October 19, 2018 at 07:14PM by Acewrap
via reddit https://ift.tt/2q0S3Op
https://ift.tt/2yoWZl4
Submitted October 19, 2018 at 07:14PM by Acewrap
via reddit https://ift.tt/2q0S3Op
Akamai
Having The Security Rug Pulled Out From Under You
I attended the Messaging, Malware and Mobile Anti-Abuse Working Group (m3aawg.org) meeting in Brooklyn, NY. I expected better weather to wander around the city while enjoying the conference and the neighborhood's wide selection of food. I had been so confident...
Hacktober CTF 2018 - Binary Analysis - Larry
https://ift.tt/2PcJLkM
Submitted October 19, 2018 at 07:48PM by m4v3r1ck-
via reddit https://ift.tt/2R1lwDr
https://ift.tt/2PcJLkM
Submitted October 19, 2018 at 07:48PM by m4v3r1ck-
via reddit https://ift.tt/2R1lwDr
VeteranSec
Hacktober CTF 2018 – Binary Analysis – Larry
A basic reverse engineering challenge for a CTF and a mini intro to RE.
Offensive IAT Hooking
https://ift.tt/2CTcy8e
Submitted October 19, 2018 at 09:10PM by wtfse
via reddit https://ift.tt/2QZPZSa
https://ift.tt/2CTcy8e
Submitted October 19, 2018 at 09:10PM by wtfse
via reddit https://ift.tt/2QZPZSa
Pentest Blog
Offensive IAT Hooking
This article will be about using IAT hooking methods for offensive purposes. These methods can be used in multiple situations where attacker needs to evade certain defense and analysis mechanism or hide from the victim in low privileged environments. Before…
Live Networks LIVE555 streaming media RTSPServer lookForHeader code execution vulnerability
https://ift.tt/2RZrW7z
Submitted October 19, 2018 at 08:46PM by EvanConover
via reddit https://ift.tt/2EK50qn
https://ift.tt/2RZrW7z
Submitted October 19, 2018 at 08:46PM by EvanConover
via reddit https://ift.tt/2EK50qn
reddit
r/netsec - Live Networks LIVE555 streaming media RTSPServer lookForHeader code execution vulnerability
1 vote and 0 comments so far on Reddit
D-Link routers - full takeover [xpost /r/programming]
https://ift.tt/2QZcMh3
Submitted October 19, 2018 at 09:19PM by souleh
via reddit https://ift.tt/2PF28ff
https://ift.tt/2QZcMh3
Submitted October 19, 2018 at 09:19PM by souleh
via reddit https://ift.tt/2PF28ff
sploit.tech
D-Link routers - full takeover
I have found multiple vulnerabilities in D-Link router httpd server. These vulnerabilities are present in multiple D-Link types of routers. All three taken t...
Large selection of cisco products affected by libssh
https://ift.tt/2EthKRQ
Submitted October 20, 2018 at 12:23AM by tommij
via reddit https://ift.tt/2OwnUW5
https://ift.tt/2EthKRQ
Submitted October 20, 2018 at 12:23AM by tommij
via reddit https://ift.tt/2OwnUW5
Cisco
Cisco Security Threat and Vulnerability Intelligence
The Cisco Security portal provides actionable intelligence for security threats and vulnerabilities in Cisco products and services and third-party products.
Defeating Cisco's Machine Learning Based Malware Traffic Detection Algorithm
https://ift.tt/2NQF2k2
Submitted October 20, 2018 at 03:13AM by operat1ve
via reddit https://ift.tt/2PDKxEh
https://ift.tt/2NQF2k2
Submitted October 20, 2018 at 03:13AM by operat1ve
via reddit https://ift.tt/2PDKxEh
reddit
r/netsec - Defeating Cisco's Machine Learning Based Malware Traffic Detection Algorithm
2 votes and 1 comment so far on Reddit
Finding 0day with the World's Worst Android Kernel Fuzzer
https://ift.tt/2AjcCvA
Submitted October 20, 2018 at 06:36AM by gamozolabs
via reddit https://ift.tt/2POYOyo
https://ift.tt/2AjcCvA
Submitted October 20, 2018 at 06:36AM by gamozolabs
via reddit https://ift.tt/2POYOyo
Gamozo Labs Blog
Writing the worlds worst Android fuzzer, and then improving it
So slimy it belongs in the slime tree
Health Data Security Approach Inspired by Blockchain Transactions
https://ift.tt/2PFGGXC
Submitted October 20, 2018 at 07:36AM by ribozome
via reddit https://ift.tt/2Jbqaw4
https://ift.tt/2PFGGXC
Submitted October 20, 2018 at 07:36AM by ribozome
via reddit https://ift.tt/2Jbqaw4
Nukleosome
Nukleosome - Connect with people. Contribute data. Make money
Anonymous health data for research. Nukleosome is the most secure place to keep track of all your health data, sell it anonymously to medical research and connect with people who have health conditions similar to yours.
I wrote a tool/framework to automate to automate basic network recon. Tell me what you think!
https://ift.tt/2yt5efG
Submitted October 20, 2018 at 11:38AM by jbob133
via reddit https://ift.tt/2P7zp5T
https://ift.tt/2yt5efG
Submitted October 20, 2018 at 11:38AM by jbob133
via reddit https://ift.tt/2P7zp5T
GitHub
Th3J0kr/jtb_investigator
A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again. - Th3J0kr/jtb_investigator
Libssh Authentication Bypass Vulnerability Exploit (CVE-2018-10933)
https://ift.tt/2AjSGIS
Submitted October 20, 2018 at 03:54PM by Ambulong
via reddit https://ift.tt/2OASnlW
https://ift.tt/2AjSGIS
Submitted October 20, 2018 at 03:54PM by Ambulong
via reddit https://ift.tt/2OASnlW
Zero-day Simulation on a Distributed Cloud Storage Model for Encrypted Health Data
https://ift.tt/2PFGGXC
Submitted October 20, 2018 at 07:30PM by ribozome
via reddit https://ift.tt/2EzUOjQ
https://ift.tt/2PFGGXC
Submitted October 20, 2018 at 07:30PM by ribozome
via reddit https://ift.tt/2EzUOjQ
Nukleosome
Nukleosome - Connect with people. Contribute data. Make money
Anonymous health data for research. Nukleosome is the most secure place to keep track of all your health data, sell it anonymously to medical research and connect with people who have health conditions similar to yours.
Hack The Box - TartarSauce Walkthrough
https://ift.tt/2NRSWT9
Submitted October 20, 2018 at 08:35PM by m4v3r1ck-
via reddit https://ift.tt/2qai669
https://ift.tt/2NRSWT9
Submitted October 20, 2018 at 08:35PM by m4v3r1ck-
via reddit https://ift.tt/2qai669
VeteranSec
Hack The Box – TartarSauce Walkthrough
Video Walkthrough: Introduction: This week’s retiring machine is TartarSauce, which is full of rabbit holes deep enough to get stuck in. With a rating of 6.2/10, it’s not the most diff…