Paranoid Habits. Security Tips
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
pragmader.me
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
This is another write up of my recent talk where I share what tools and techniques I use to protect myself from being hacked.
Let SIEM and EDR Coexist.
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
Cybereason
Use SIEM and EDR Together to Improve Defenses and Save Money
In this white paper, we explore the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence…
Pirates Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers
https://ift.tt/2Tsk6CR
Submitted March 25, 2019 at 07:42PM by PaulSec
via reddit https://ift.tt/2WgwVBU
https://ift.tt/2Tsk6CR
Submitted March 25, 2019 at 07:42PM by PaulSec
via reddit https://ift.tt/2WgwVBU
Motherboard
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers
The Taiwan-based tech giant ASUS is believed to have pushed the malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines.
Top five application security pitfalls to avoid | SC Media
https://ift.tt/2HAUF0s
Submitted March 25, 2019 at 07:01PM by KeyDutch
via reddit https://ift.tt/2OrTpx5
https://ift.tt/2HAUF0s
Submitted March 25, 2019 at 07:01PM by KeyDutch
via reddit https://ift.tt/2OrTpx5
SC Media
Top five application security pitfalls to avoid | SC Media
What are the common perils and pitfalls CISOs should consider when investing in corporate application security and Application Security Testing (AST)?
Digital Forensics Tips&Tricks: How to Connect an Encase Image to the Virtual Machine
https://ift.tt/2HFkcWa
Submitted March 25, 2019 at 08:59PM by atomlib_com
via reddit https://ift.tt/2JBi2bW
https://ift.tt/2HFkcWa
Submitted March 25, 2019 at 08:59PM by atomlib_com
via reddit https://ift.tt/2JBi2bW
Habr
Digital Forensics Tips&Tricks: How to Connect an Encase Image to the Virtual Machine
I pretty often meet the question: how to attach an Encase image (.e01) to the virtual machine as a primary bootable disk? Sometimes a digital forensics experts...
Clang CFI/SafeStack Analysis - the end of memory corruption exploits?
https://ift.tt/2YmHtRR
Submitted March 25, 2019 at 08:03PM by NagateTanikaze
via reddit https://ift.tt/2TwfyLR
https://ift.tt/2YmHtRR
Submitted March 25, 2019 at 08:03PM by NagateTanikaze
via reddit https://ift.tt/2TwfyLR
GitHub
dobin/clang-cfi-safestack-analysis
Contribute to dobin/clang-cfi-safestack-analysis development by creating an account on GitHub.
Using Auditbeat and ELK to monitor GTFOBins binaries
https://ift.tt/2HGolZU
Submitted March 25, 2019 at 11:12PM by r3b00tu53r
via reddit https://ift.tt/2JGQu4X
https://ift.tt/2HGolZU
Submitted March 25, 2019 at 11:12PM by r3b00tu53r
via reddit https://ift.tt/2JGQu4X
In.security Cyber Security Technical Services & Training
Using Auditbeat and ELK to monitor GTFOBins binaries | In.security Cyber Security Technical Services & Training
RCE luckily missed on a campaign against Social Warfare
https://ift.tt/2uswloN
Submitted March 26, 2019 at 12:36AM by ded1cated
via reddit https://ift.tt/2HEEuPx
https://ift.tt/2uswloN
Submitted March 26, 2019 at 12:36AM by ded1cated
via reddit https://ift.tt/2HEEuPx
WebARX
Social Warfare XSS and RCE Vulnerabilities and Attack Data
There are multiple security vulnerabilities in WordPress plugin Social Warfare. Read more about the XSS and RCE vulnerabilities and attack data.
Interception: Digging into BokBot's Man-in-the-Browser
https://ift.tt/2HxhodL
Submitted March 26, 2019 at 01:07AM by corewar
via reddit https://ift.tt/2UbhXQq
https://ift.tt/2HxhodL
Submitted March 26, 2019 at 01:07AM by corewar
via reddit https://ift.tt/2UbhXQq
Crowdstrike
Dissecting BokBot’s “Man in the Browser” | CrowdStrike
Learn how BokBot, a banking Trojan that targets financial institutions, can manipulate web traffic for financial fraud in this detailed technical analysis.
Multiple Vulnerabilities in Grandstream Products
https://ift.tt/2TxyJEX
Submitted March 26, 2019 at 04:04AM by Gallus
via reddit https://ift.tt/2TX3CI6
https://ift.tt/2TxyJEX
Submitted March 26, 2019 at 04:04AM by Gallus
via reddit https://ift.tt/2TX3CI6
reddit
r/netsec - Multiple Vulnerabilities in Grandstream Products
0 votes and 1 comment so far on Reddit
GogsOwnz - PrivEsc/RCE Exploits for Gogs/Gitea
https://ift.tt/2Oq1p1E
Submitted March 26, 2019 at 04:29AM by th3zero
via reddit https://ift.tt/2Wp9qGK
https://ift.tt/2Oq1p1E
Submitted March 26, 2019 at 04:29AM by th3zero
via reddit https://ift.tt/2Wp9qGK
GitHub
TheZ3ro/gogsownz
Gogs CVEs. Contribute to TheZ3ro/gogsownz development by creating an account on GitHub.
One-liner Safari sandbox escape exploit
https://ift.tt/2UUJd2L
Submitted March 26, 2019 at 12:44PM by payloadartist
via reddit https://ift.tt/2CDHMyi
https://ift.tt/2UUJd2L
Submitted March 26, 2019 at 12:44PM by payloadartist
via reddit https://ift.tt/2CDHMyi
Medium
One-liner Safari sandbox escape exploit
This time I am writing about a dead simple and reliable sandbox exploit which only have one line of code. Yeah I am sure it’s an exploit…
All InfoSec News in one Place
https://ift.tt/2TVqFC6
Submitted March 26, 2019 at 12:34PM by infosec-jobs
via reddit https://ift.tt/2CDIage
https://ift.tt/2TVqFC6
Submitted March 26, 2019 at 12:34PM by infosec-jobs
via reddit https://ift.tt/2CDIage
all InfoSec news
home - all InfoSec news
allinfosecnews.com aggregates all of the top InfoSec news into one place.
Abusing SketchUp to make persistence on Windows
https://ift.tt/2FBJPoQ
Submitted March 26, 2019 at 09:27AM by mthbernardes
via reddit https://ift.tt/2U1fyZ9
https://ift.tt/2FBJPoQ
Submitted March 26, 2019 at 09:27AM by mthbernardes
via reddit https://ift.tt/2U1fyZ9
GitHub
mthbernardes/BadArchitect
Abusing SketchUp to make persistence on Windows. Contribute to mthbernardes/BadArchitect development by creating an account on GitHub.
36 vulnerabilities in LTE 4G standard could enable data interception
https://ift.tt/2YpmVZ1
Submitted March 26, 2019 at 02:28PM by Dormidera
via reddit https://ift.tt/2HTzx4O
https://ift.tt/2YpmVZ1
Submitted March 26, 2019 at 02:28PM by Dormidera
via reddit https://ift.tt/2HTzx4O
reddit
r/hacking - 36 vulnerabilities in LTE 4G standard could enable data interception
0 votes and 1 comment so far on Reddit
Google Groups Authorization Bypass
https://ift.tt/2FrPJYc
Submitted March 26, 2019 at 04:43PM by zoh4rs
via reddit https://ift.tt/2CBntBW
https://ift.tt/2FrPJYc
Submitted March 26, 2019 at 04:43PM by zoh4rs
via reddit https://ift.tt/2CBntBW
Komodo Security Consulting
Google Groups Authorization Bypass / $500 bounty
Tl;dr: I’ve recently been playing around with Google services, poking here and there for security vulnerabilities. It’s been a quite a roller-coaster experience
Fuzzlon: A Dumb 802.15.4 Fuzzer
https://ift.tt/2Wi82G6
Submitted March 26, 2019 at 04:16PM by dukeofmola
via reddit https://ift.tt/2WnQKas
https://ift.tt/2Wi82G6
Submitted March 26, 2019 at 04:16PM by dukeofmola
via reddit https://ift.tt/2WnQKas
Enigmatos
Fuzzlon - Enigmatos
Fuzzlon – Dumb 802.15.4 Fuzzer Enigmatos researches interesting attack-vectors that may hinder vehicles’ security and safety. Recently, as part of our ongoing research, we investigated a peculiar CAN-connected device which has an external radio interface…
Owning the Network with BadUSB
https://ift.tt/2JDyMzn
Submitted March 26, 2019 at 06:30PM by chicksdigthelongrun
via reddit https://ift.tt/2WjUPMM
https://ift.tt/2JDyMzn
Submitted March 26, 2019 at 06:30PM by chicksdigthelongrun
via reddit https://ift.tt/2WjUPMM
Medium
Owning the Network with BadUSB
Man-in-the-Middle with a Raspberry Pi
Unauthenticated RCE in OpenSynergy's BlueSDK Bluetooth Stack
https://ift.tt/2urSOSZ
Submitted March 26, 2019 at 07:28PM by xooxies
via reddit https://ift.tt/2JH2y6t
https://ift.tt/2urSOSZ
Submitted March 26, 2019 at 07:28PM by xooxies
via reddit https://ift.tt/2JH2y6t
Bypass firewalls with ICMP error messages
https://ift.tt/2utgFl4
Submitted March 26, 2019 at 08:32PM by guedou
via reddit https://ift.tt/2TwoKzK
https://ift.tt/2utgFl4
Submitted March 26, 2019 at 08:32PM by guedou
via reddit https://ift.tt/2TwoKzK
Identifying secrets in your Docker images
https://ift.tt/2TW2cNX
Submitted March 26, 2019 at 10:24PM by weighanchore
via reddit https://ift.tt/2WqQg3y
https://ift.tt/2TW2cNX
Submitted March 26, 2019 at 10:24PM by weighanchore
via reddit https://ift.tt/2WqQg3y
Anchore
Identifying Secrets in Your Container Images
Working with containerized applications inherently brings on the question of how to best give these applications access to any sensitive information they may need. This sensitive information can often be in the form of secrets, passwords, or other credentials.…