π WhatWeb Scanner 0.5.0 π
π Go!
via "Security Tool Files β Packet Storm".
WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
WhatWeb Scanner 0.5.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Zeek 3.0.0 (Formerly Known As Bro) π
π Go!
via "Security Tool Files β Packet Storm".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Zeek 3.0.0 (Formerly Known As Bro) β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Monday review β the hot 22 stories of the week β
π Read
via "Naked Security".
From the hacker's folks who whisked away his stolen crypto to the O.MG! evil lightning cable - and all the top security stories in between.π Read
via "Naked Security".
Naked Security
Monday review β the hot 22 stories of the week
From the hackerβs folks who whisked away his stolen crypto to the O.MG! evil lightning cable β and all the top security stories in between.
β Wi-Fi signals let researchers ID people through walls from their gait β
π Read
via "Naked Security".
Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.π Read
via "Naked Security".
Naked Security
Wi-Fi signals let researchers ID people through walls from their gait
Police could set up transceivers outside a building and compare spectrograms of suspects walking vs. crime scene footage.
β Social media platforms can be forced to delete illegal content worldwide β
π Read
via "Naked Security".
The EU's top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.π Read
via "Naked Security".
Naked Security
Social media platforms can be forced to delete illegal content worldwide
The EUβs top court ruled that platforms like Facebook can be ordered to proactively seek out and delete all copies of illegal content.
β Facebook urged by governments to halt end-to-end encryption plans β
π Read
via "Naked Security".
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.π Read
via "Naked Security".
Naked Security
Facebook urged by governments to halt end-to-end encryption plans
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.
β Android devices hit by zero-day exploit Google thought it had patched β
π Read
via "Naked Security".
Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says β
π Read
via "Threatpost".
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.π Read
via "Threatpost".
Threat Post
Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.
π΄ 10 Steps to Assess SOC Maturity in SMBs π΄
π Read
via "Dark Reading: ".
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.π Read
via "Dark Reading: ".
Dark Reading
10 Steps to Assess SOC Maturity in SMBs
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.
π Shifting allegiances of hackers causing confusion for defense efforts π
π Read
via "Security on TechRepublic".
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.π Read
via "Security on TechRepublic".
TechRepublic
Shifting allegiances of hackers causing confusion for defense efforts
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.
π Nevada's New Consumer Privacy Law Goes Into Effect π
π Read
via "Subscriber Blog RSS Feed ".
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Nevada's New Consumer Privacy Law Goes Into Effect
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.
β Alabama Hospitals Pay Up in Ransomware Attack β
π Read
via "Threatpost".
A trio of Alabama hospitals have decided to pay for a decryption key.π Read
via "Threatpost".
Threat Post
Alabama Hospitals Pay Up in Ransomware Attack
A trio of Alabama hospitals have decided to pay for a decryption key.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.
π΄ Magecart Skimmers Spotted on 2M Websites π΄
π Read
via "Dark Reading: ".
Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.π Read
via "Dark Reading: ".
Darkreading
Magecart Skimmers Spotted on 2M Websites
Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.
β D-Link Home Routers Open to Remote Takeover Will Remain Unpatched β
π Read
via "Threatpost".
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.π Read
via "Threatpost".
Threat Post
D-Link Home Routers Open to Remote Takeover Will Remain Unpatched
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.
π΄ 6 Active Directory Security Tips for Your Poor, Neglected AD π΄
π Read
via "Dark Reading: ".
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.π Read
via "Dark Reading: ".
Dark Reading
6 Active Directory Security Tips for Your Poor, Neglected AD
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.
π Cybercriminals using gifs to corrupt Drupal sites π
π Read
via "Security on TechRepublic".
Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals using gifs to corrupt Drupal sites
Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.
β Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks β
π Read
via "Threatpost".
Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.π Read
via "Threatpost".
Threat Post
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks
Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.
β California Bans Deepfakes in Elections, Porn β
π Read
via "Threatpost".
A pair of laws provides recourse for victims of deepfake technology.π Read
via "Threatpost".
Threat Post
California Bans Deepfakes in Elections, Porn
A pair of laws provides recourse for victims of deepfake technology.