A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
https://ift.tt/2U5uLHO
Submitted March 24, 2019 at 12:42AM by clash1111
via reddit https://ift.tt/2HPl8qe
https://ift.tt/2U5uLHO
Submitted March 24, 2019 at 12:42AM by clash1111
via reddit https://ift.tt/2HPl8qe
NY Times
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
Sophisticated surveillance, once the domain of world powers, is increasingly available on the private market. Smaller countries are seizing on the tools — sometimes for darker purposes.
Beagle: Accelerating incident response with graphs
https://ift.tt/2UQWWra
Submitted March 24, 2019 at 08:09PM by splinks
via reddit https://ift.tt/2HC0QBt
https://ift.tt/2UQWWra
Submitted March 24, 2019 at 08:09PM by splinks
via reddit https://ift.tt/2HC0QBt
GitHub
yampelo/beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs. - yampelo/beagle
Peer to peer VPN Nodes Program
https://ift.tt/2VVJBOo
Submitted March 24, 2019 at 11:11PM by MystCommunityManager
via reddit https://ift.tt/2USx7XZ
https://ift.tt/2VVJBOo
Submitted March 24, 2019 at 11:11PM by MystCommunityManager
via reddit https://ift.tt/2USx7XZ
Typeform
Mysterium Node Runner Survey
Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.
Disclosure of Origin IP of The Exploits Trading Platform 0day.today
https://ift.tt/2TTzfCd
Submitted March 25, 2019 at 10:03AM by payloadartist
via reddit https://ift.tt/2FztIIm
https://ift.tt/2TTzfCd
Submitted March 25, 2019 at 10:03AM by payloadartist
via reddit https://ift.tt/2FztIIm
Infosec Writers Guild
Origin IP of The Exploits Trading Platform 0day.today
Ever wondered where the origin server for the popular zero day exploit platform 0day-today is? PayLoadArtist found out.
Paranoid Habits. Security Tips
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
pragmader.me
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
This is another write up of my recent talk where I share what tools and techniques I use to protect myself from being hacked.
Let SIEM and EDR Coexist.
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
Cybereason
Use SIEM and EDR Together to Improve Defenses and Save Money
In this white paper, we explore the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence…
Pirates Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers
https://ift.tt/2Tsk6CR
Submitted March 25, 2019 at 07:42PM by PaulSec
via reddit https://ift.tt/2WgwVBU
https://ift.tt/2Tsk6CR
Submitted March 25, 2019 at 07:42PM by PaulSec
via reddit https://ift.tt/2WgwVBU
Motherboard
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers
The Taiwan-based tech giant ASUS is believed to have pushed the malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines.
Top five application security pitfalls to avoid | SC Media
https://ift.tt/2HAUF0s
Submitted March 25, 2019 at 07:01PM by KeyDutch
via reddit https://ift.tt/2OrTpx5
https://ift.tt/2HAUF0s
Submitted March 25, 2019 at 07:01PM by KeyDutch
via reddit https://ift.tt/2OrTpx5
SC Media
Top five application security pitfalls to avoid | SC Media
What are the common perils and pitfalls CISOs should consider when investing in corporate application security and Application Security Testing (AST)?
Digital Forensics Tips&Tricks: How to Connect an Encase Image to the Virtual Machine
https://ift.tt/2HFkcWa
Submitted March 25, 2019 at 08:59PM by atomlib_com
via reddit https://ift.tt/2JBi2bW
https://ift.tt/2HFkcWa
Submitted March 25, 2019 at 08:59PM by atomlib_com
via reddit https://ift.tt/2JBi2bW
Habr
Digital Forensics Tips&Tricks: How to Connect an Encase Image to the Virtual Machine
I pretty often meet the question: how to attach an Encase image (.e01) to the virtual machine as a primary bootable disk? Sometimes a digital forensics experts...
Clang CFI/SafeStack Analysis - the end of memory corruption exploits?
https://ift.tt/2YmHtRR
Submitted March 25, 2019 at 08:03PM by NagateTanikaze
via reddit https://ift.tt/2TwfyLR
https://ift.tt/2YmHtRR
Submitted March 25, 2019 at 08:03PM by NagateTanikaze
via reddit https://ift.tt/2TwfyLR
GitHub
dobin/clang-cfi-safestack-analysis
Contribute to dobin/clang-cfi-safestack-analysis development by creating an account on GitHub.
Using Auditbeat and ELK to monitor GTFOBins binaries
https://ift.tt/2HGolZU
Submitted March 25, 2019 at 11:12PM by r3b00tu53r
via reddit https://ift.tt/2JGQu4X
https://ift.tt/2HGolZU
Submitted March 25, 2019 at 11:12PM by r3b00tu53r
via reddit https://ift.tt/2JGQu4X
In.security Cyber Security Technical Services & Training
Using Auditbeat and ELK to monitor GTFOBins binaries | In.security Cyber Security Technical Services & Training
RCE luckily missed on a campaign against Social Warfare
https://ift.tt/2uswloN
Submitted March 26, 2019 at 12:36AM by ded1cated
via reddit https://ift.tt/2HEEuPx
https://ift.tt/2uswloN
Submitted March 26, 2019 at 12:36AM by ded1cated
via reddit https://ift.tt/2HEEuPx
WebARX
Social Warfare XSS and RCE Vulnerabilities and Attack Data
There are multiple security vulnerabilities in WordPress plugin Social Warfare. Read more about the XSS and RCE vulnerabilities and attack data.
Interception: Digging into BokBot's Man-in-the-Browser
https://ift.tt/2HxhodL
Submitted March 26, 2019 at 01:07AM by corewar
via reddit https://ift.tt/2UbhXQq
https://ift.tt/2HxhodL
Submitted March 26, 2019 at 01:07AM by corewar
via reddit https://ift.tt/2UbhXQq
Crowdstrike
Dissecting BokBot’s “Man in the Browser” | CrowdStrike
Learn how BokBot, a banking Trojan that targets financial institutions, can manipulate web traffic for financial fraud in this detailed technical analysis.
Multiple Vulnerabilities in Grandstream Products
https://ift.tt/2TxyJEX
Submitted March 26, 2019 at 04:04AM by Gallus
via reddit https://ift.tt/2TX3CI6
https://ift.tt/2TxyJEX
Submitted March 26, 2019 at 04:04AM by Gallus
via reddit https://ift.tt/2TX3CI6
reddit
r/netsec - Multiple Vulnerabilities in Grandstream Products
0 votes and 1 comment so far on Reddit
GogsOwnz - PrivEsc/RCE Exploits for Gogs/Gitea
https://ift.tt/2Oq1p1E
Submitted March 26, 2019 at 04:29AM by th3zero
via reddit https://ift.tt/2Wp9qGK
https://ift.tt/2Oq1p1E
Submitted March 26, 2019 at 04:29AM by th3zero
via reddit https://ift.tt/2Wp9qGK
GitHub
TheZ3ro/gogsownz
Gogs CVEs. Contribute to TheZ3ro/gogsownz development by creating an account on GitHub.
One-liner Safari sandbox escape exploit
https://ift.tt/2UUJd2L
Submitted March 26, 2019 at 12:44PM by payloadartist
via reddit https://ift.tt/2CDHMyi
https://ift.tt/2UUJd2L
Submitted March 26, 2019 at 12:44PM by payloadartist
via reddit https://ift.tt/2CDHMyi
Medium
One-liner Safari sandbox escape exploit
This time I am writing about a dead simple and reliable sandbox exploit which only have one line of code. Yeah I am sure it’s an exploit…
All InfoSec News in one Place
https://ift.tt/2TVqFC6
Submitted March 26, 2019 at 12:34PM by infosec-jobs
via reddit https://ift.tt/2CDIage
https://ift.tt/2TVqFC6
Submitted March 26, 2019 at 12:34PM by infosec-jobs
via reddit https://ift.tt/2CDIage
all InfoSec news
home - all InfoSec news
allinfosecnews.com aggregates all of the top InfoSec news into one place.
Abusing SketchUp to make persistence on Windows
https://ift.tt/2FBJPoQ
Submitted March 26, 2019 at 09:27AM by mthbernardes
via reddit https://ift.tt/2U1fyZ9
https://ift.tt/2FBJPoQ
Submitted March 26, 2019 at 09:27AM by mthbernardes
via reddit https://ift.tt/2U1fyZ9
GitHub
mthbernardes/BadArchitect
Abusing SketchUp to make persistence on Windows. Contribute to mthbernardes/BadArchitect development by creating an account on GitHub.
36 vulnerabilities in LTE 4G standard could enable data interception
https://ift.tt/2YpmVZ1
Submitted March 26, 2019 at 02:28PM by Dormidera
via reddit https://ift.tt/2HTzx4O
https://ift.tt/2YpmVZ1
Submitted March 26, 2019 at 02:28PM by Dormidera
via reddit https://ift.tt/2HTzx4O
reddit
r/hacking - 36 vulnerabilities in LTE 4G standard could enable data interception
0 votes and 1 comment so far on Reddit
Google Groups Authorization Bypass
https://ift.tt/2FrPJYc
Submitted March 26, 2019 at 04:43PM by zoh4rs
via reddit https://ift.tt/2CBntBW
https://ift.tt/2FrPJYc
Submitted March 26, 2019 at 04:43PM by zoh4rs
via reddit https://ift.tt/2CBntBW
Komodo Security Consulting
Google Groups Authorization Bypass / $500 bounty
Tl;dr: I’ve recently been playing around with Google services, poking here and there for security vulnerabilities. It’s been a quite a roller-coaster experience
Fuzzlon: A Dumb 802.15.4 Fuzzer
https://ift.tt/2Wi82G6
Submitted March 26, 2019 at 04:16PM by dukeofmola
via reddit https://ift.tt/2WnQKas
https://ift.tt/2Wi82G6
Submitted March 26, 2019 at 04:16PM by dukeofmola
via reddit https://ift.tt/2WnQKas
Enigmatos
Fuzzlon - Enigmatos
Fuzzlon – Dumb 802.15.4 Fuzzer Enigmatos researches interesting attack-vectors that may hinder vehicles’ security and safety. Recently, as part of our ongoing research, we investigated a peculiar CAN-connected device which has an external radio interface…