Compare: WebARX, MalCare, Sucuri, WordFence, iThemesSecurity, SiteLock, SecuPress and CloudFlare
https://ift.tt/2Q1IuxA
Submitted November 18, 2018 at 03:40AM by modelop
via reddit https://ift.tt/2qSkY7L
https://ift.tt/2Q1IuxA
Submitted November 18, 2018 at 03:40AM by modelop
via reddit https://ift.tt/2qSkY7L
Ghost Emails: Hacking Gmail’s UX to Hide the Sender
https://ift.tt/2OOFv6L
Submitted November 17, 2018 at 09:34AM by timcotten
via reddit https://ift.tt/2qRJ1nn
https://ift.tt/2OOFv6L
Submitted November 17, 2018 at 09:34AM by timcotten
via reddit https://ift.tt/2qRJ1nn
Cotten.IO
Ghost Emails: Hacking Gmail’s UX to Hide the Sender
Faking the Appearance of a System Message in Gmail
Huge Repository For Active Directory Kill Chain Attack & Defense
https://ift.tt/2PDkzov
Submitted November 19, 2018 at 07:24AM by Hemlck
via reddit https://ift.tt/2Q8ui5L
https://ift.tt/2PDkzov
Submitted November 19, 2018 at 07:24AM by Hemlck
via reddit https://ift.tt/2Q8ui5L
GitHub
infosecn1nja/AD-Attack-Defense
Active Directory Security For Red & Blue Team. Contribute to infosecn1nja/AD-Attack-Defense development by creating an account on GitHub.
Protecting 802.1X key in Secure Enclave
https://ift.tt/2qSzJYh
Submitted November 19, 2018 at 09:31AM by ivladdalvi
via reddit https://ift.tt/2FvLkGP
https://ift.tt/2qSzJYh
Submitted November 19, 2018 at 09:31AM by ivladdalvi
via reddit https://ift.tt/2FvLkGP
reddit
r/mac - Protecting 802.1X key in Secure Enclave
1 vote and 0 comments so far on Reddit
A comparison of Kubernetes container runtimes
https://ift.tt/2Toc9zS
Submitted November 19, 2018 at 04:04PM by stevenacreman
via reddit https://ift.tt/2QUI755
https://ift.tt/2Toc9zS
Submitted November 19, 2018 at 04:04PM by stevenacreman
via reddit https://ift.tt/2QUI755
kubedex.com
Kubernetes Container Runtimes - kubedex.com
Come and read Kubernetes Container Runtimes on Kubedex.com. The number one site to Discover, Compare and Share Kubernetes Applications.
First part of a new series about Ethereum smart contract analysis, exploit generation and auto-looting
https://ift.tt/2qVldPC
Submitted November 19, 2018 at 04:15PM by berndtzl
via reddit https://ift.tt/2zk8uuj
https://ift.tt/2qVldPC
Submitted November 19, 2018 at 04:15PM by berndtzl
via reddit https://ift.tt/2zk8uuj
Medium
Practical Smart Contract Security Analysis and Exploitation— Part 1
In this series I explain how to use Mythril Classic to find and exploit security bugs in Ethereum smart contracts. The articles will cover…
Yet another memory leak in ImageMagick or how to exploit CVE-2018–16323.
https://ift.tt/2S4iwqz
Submitted November 19, 2018 at 06:08PM by ninjazeroone
via reddit https://ift.tt/2QWn8yI
https://ift.tt/2S4iwqz
Submitted November 19, 2018 at 06:08PM by ninjazeroone
via reddit https://ift.tt/2QWn8yI
Medium
Yet another memory leak in ImageMagick or how to exploit CVE-2018–16323.
Hi, in this article we’ll talk about ImageMagick vulnerabilities.
Carolina Con CFP
We are pleased to announce that Carolina Con 15 will be hosted in Charlotte at the Renaissance Charlotte Suites April 26th through the 28th in 2019. All interested in speaking to any topic in the realm of hacking, technology, science, robotics or any related field are invited to submit a proposal to speak at the con.A proposal should include the following:Name or handle/aliasPresentation nameA brief abstract about 1-2 paragraphsAn estimated time-length of your presentationOptional: A brief bioProposal should be submitted to the following email, carolinacon[at]protonmail[dot]com.The subject line is should state “CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - the Call For Papers is now open”Submissions are due by February 15th, 2019, midnight ESTWe may be making some early selections this year among the submissions, so please be timely if you're committed to being apart of the chosen presenters. We value diversity so please don't hesitate to propose your ideas no matter how outlandish.If you present at the Con, you will receive;Free Carolina Con admission for you and 1 guest1 free Carolina Con 15 T-shirtMad props and love from our staff and attendeesThe hosting organization, 49th Security Division, is a UNC Charlotte Computer Science club that focuses on ethical hacking and education. As we mentioned, Carolina Con 15 will be held in Charlotte. We hope to continue in the vain of the established culture and to inspire the next generation of hackers.If you have any questions or concerns, you can reach us at the email provided for the paper submission.
Submitted November 19, 2018 at 07:08AM by blkmanta
via reddit https://ift.tt/2S4o18H
We are pleased to announce that Carolina Con 15 will be hosted in Charlotte at the Renaissance Charlotte Suites April 26th through the 28th in 2019. All interested in speaking to any topic in the realm of hacking, technology, science, robotics or any related field are invited to submit a proposal to speak at the con.A proposal should include the following:Name or handle/aliasPresentation nameA brief abstract about 1-2 paragraphsAn estimated time-length of your presentationOptional: A brief bioProposal should be submitted to the following email, carolinacon[at]protonmail[dot]com.The subject line is should state “CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - the Call For Papers is now open”Submissions are due by February 15th, 2019, midnight ESTWe may be making some early selections this year among the submissions, so please be timely if you're committed to being apart of the chosen presenters. We value diversity so please don't hesitate to propose your ideas no matter how outlandish.If you present at the Con, you will receive;Free Carolina Con admission for you and 1 guest1 free Carolina Con 15 T-shirtMad props and love from our staff and attendeesThe hosting organization, 49th Security Division, is a UNC Charlotte Computer Science club that focuses on ethical hacking and education. As we mentioned, Carolina Con 15 will be held in Charlotte. We hope to continue in the vain of the established culture and to inspire the next generation of hackers.If you have any questions or concerns, you can reach us at the email provided for the paper submission.
Submitted November 19, 2018 at 07:08AM by blkmanta
via reddit https://ift.tt/2S4o18H
reddit
r/netsec - Carolina Con CFP
2 votes and 0 comments so far on Reddit
An OSINT Analysis of the Elon Musk Bitcoin Scam
https://ift.tt/2OPaZda
Submitted November 18, 2018 at 05:55PM by smicallef
via reddit https://ift.tt/2DQ5rOq
https://ift.tt/2OPaZda
Submitted November 18, 2018 at 05:55PM by smicallef
via reddit https://ift.tt/2DQ5rOq
Medium
An OSINT Analysis of the Elon Musk Bitcoin Scam
Using some OSINT techniques, let’s look into the recent Elon Musk Bitcoin scam and see what interesting information we might find.
Vision Direct reveals breach that skimmed customer credit cards
https://ift.tt/2Kd709j
Submitted November 19, 2018 at 08:21PM by joshkale_
via reddit https://ift.tt/2QUUdLv
https://ift.tt/2Kd709j
Submitted November 19, 2018 at 08:21PM by joshkale_
via reddit https://ift.tt/2QUUdLv
TechCrunch
Vision Direct reveals breach that skimmed customer credit cards
European online contact lens supplier Vision Direct has revealed a data breach which compromised full credit card details for a number of its customers, as well as personal information. Compromised data includes full name, billing address, email address,…
XS-Searching Google’s bug tracker to find out vulnerable source code
https://ift.tt/2ORtGwL
Submitted November 19, 2018 at 10:23PM by Involder
via reddit https://ift.tt/2zhLYCh
https://ift.tt/2ORtGwL
Submitted November 19, 2018 at 10:23PM by Involder
via reddit https://ift.tt/2zhLYCh
Medium
XS-Searching Google’s bug tracker to find out vulnerable source code
Or how side-channel timing attacks aren’t that impractical
Join fellow hackers for one month of security research in Malaysia and Indonesia (all expenses paid)
https://ift.tt/2B91Gyc
Submitted November 19, 2018 at 09:50PM by breakingsystems
via reddit https://ift.tt/2qV2Iuv
https://ift.tt/2B91Gyc
Submitted November 19, 2018 at 09:50PM by breakingsystems
via reddit https://ift.tt/2qV2Iuv
reddit
r/netsec - Join fellow hackers for one month of security research in Malaysia and Indonesia (all expenses paid)
6 votes and 0 comments so far on Reddit
Vectorized Emulation: MMU Design
https://ift.tt/2A531au
Submitted November 20, 2018 at 01:57AM by gamozolabs
via reddit https://ift.tt/2BhrRFV
https://ift.tt/2A531au
Submitted November 20, 2018 at 01:57AM by gamozolabs
via reddit https://ift.tt/2BhrRFV
Gamozo Labs Blog
Vectorized Emulation: MMU Design
I blog about random things security, everything is broken, nothing scales, shared memory models are flawed.
Kickstart Application Security on Heroku with the Templarbit Buildpack
https://ift.tt/2FtXdNy
Submitted November 20, 2018 at 02:29AM by iamcoolc
via reddit https://ift.tt/2qU9Yqx
https://ift.tt/2FtXdNy
Submitted November 20, 2018 at 02:29AM by iamcoolc
via reddit https://ift.tt/2qU9Yqx
Templarbit Inc.
Kickstart Application Security on Heroku with the Templarbit Buildpack
Heroku remains a popular choice for teams to run their software...
SignedMalware.org | A Resource That Demonstrates Failures In Code Signing PKI
https://ift.tt/2h3AjBl
Submitted November 20, 2018 at 03:45AM by Hemlck
via reddit https://ift.tt/2S130M0
https://ift.tt/2h3AjBl
Submitted November 20, 2018 at 03:45AM by Hemlck
via reddit https://ift.tt/2S130M0
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI
https://ift.tt/2A924h5
Submitted November 20, 2018 at 04:43AM by Hemlck
via reddit https://ift.tt/2Fv3dFR
https://ift.tt/2A924h5
Submitted November 20, 2018 at 04:43AM by Hemlck
via reddit https://ift.tt/2Fv3dFR
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI
https://ift.tt/2A924h5
Submitted November 20, 2018 at 04:43AM by Hemlck
via reddit https://ift.tt/2Fv3dFR
https://ift.tt/2A924h5
Submitted November 20, 2018 at 04:43AM by Hemlck
via reddit https://ift.tt/2Fv3dFR
Authentication bypass in a NodeJS application — a bug bounty story
https://ift.tt/2qXEjEK
Submitted November 20, 2018 at 02:58PM by albinowax
via reddit https://ift.tt/2Q8GSlD
https://ift.tt/2qXEjEK
Submitted November 20, 2018 at 02:58PM by albinowax
via reddit https://ift.tt/2Q8GSlD
Medium
Authentication bypass in NodeJS application — a bug bounty story
Hello everyone,
[PDF] An Analysis of the ProtonMail Cryptographic Architecture
https://ift.tt/2OTJEXk
Submitted November 20, 2018 at 05:15PM by sarciszewski
via reddit https://ift.tt/2A4Y8hy
https://ift.tt/2OTJEXk
Submitted November 20, 2018 at 05:15PM by sarciszewski
via reddit https://ift.tt/2A4Y8hy
Top 10 Application Security Breaches of 2018
https://ift.tt/2KpNA1r
Submitted November 20, 2018 at 05:50PM by KeyDutch
via reddit https://ift.tt/2PDeQiw
https://ift.tt/2KpNA1r
Submitted November 20, 2018 at 05:50PM by KeyDutch
via reddit https://ift.tt/2PDeQiw
Htbridge
Top 10 Application Security Breaches of 2018
The most disastrous web and mobile application security breaches and security incidents of 2018 (so far).
Linux | Changing memory protection in an arbitrary process
https://ift.tt/2DxZZPg
Submitted November 20, 2018 at 09:21PM by shleimeleh
via reddit https://ift.tt/2ze4ICP
https://ift.tt/2DxZZPg
Submitted November 20, 2018 at 09:21PM by shleimeleh
via reddit https://ift.tt/2ze4ICP
Perception Point
Linux internals | Perception Point
Recently, we faced this very specific task: changing the protection flags of memory regions in an arbitrary process. As this task may seem trivial, we encountered some obstacles and learned new things in the process, mostly about Linux mechanisms and kernel…