π Faraday 3.9.3 π
π Go!
via "Security Tool Files β Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Faraday 3.9.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From a fake news generator to critical flaws in Medtronic equipment - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From a fake news generator to critical flaws in Medtronic equipment β itβs weekly roundup time.
β Wikipedia co-founder offers a Facebook/Twitter wannabe β
π Read
via "Naked Security".
Tired of being a tracked, ad-bedeviled product sold by social media companies? The cost to immediately join a network with no tracking/ads: $12.99/month.π Read
via "Naked Security".
Naked Security
Wikipedia co-founder offers a Facebook/Twitter wannabe
Tired of being a tracked, ad-bedeviled product sold by social media companies? The cost to immediately join a network with no tracking/ads: $12.99/month.
β Two men busted for hijacking victimsβ phones and email accounts β
π Read
via "Naked Security".
Prosecutors allege that Meiggs and Harrington took over their targets' mobile phone and email accounts via SIM-swapping.π Read
via "Naked Security".
Naked Security
Two men busted for hijacking victimsβ phones and email accounts
Prosecutors allege that Meiggs and Harrington took over their targetsβ mobile phone and email accounts via SIM-swapping.
β GitHub launches Security Lab to boost open source security β
π Read
via "Naked Security".
The idea is simple β create a global platform for reporting and fixing vulnerabilities in open source projects before they do damage.π Read
via "Naked Security".
Naked Security
GitHub launches Security Lab to boost open source security
The idea is simple β create a global platform for reporting and fixing vulnerabilities in open source projects before they do damage.
β NSA wonβt collect phone location data, promises US government β
π Read
via "Naked Security".
US intelligence agencies wonβt harvest US residentsβ geolocation data in future investigations, revealed the US government this month.π Read
via "Naked Security".
Naked Security
NSA wonβt collect phone location data, promises US government
US intelligence agencies wonβt harvest US residentsβ geolocation data in future investigations, revealed the US government this month.
π΄ New: Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask π΄
π Read
via "Dark Reading: ".
The secure perimeter as we know it is dissolving. So how do you protect your crown jewels when the castle has no walls?π Read
via "Dark Reading: ".
Dark Reading
The Edge
The secure perimeter as we know it is dissolving. So how do you protect your crown jewels when the castle has no walls?
β Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked β
π Read
via "Threatpost".
White-hat hackers using never-before-seen zero days against popular applications and devices against competed at two-day gathering in Chengdu.π Read
via "Threatpost".
Threat Post
Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Successfully Hacked
White-hat hackers using never-before-seen zero days against popular applications and devices against competed at two-day gathering in Chengdu.
π΄ 13 Security Pros Share Their Most Valuable Experiences π΄
π Read
via "Dark Reading: ".
From serving as an artillery Marine to working a help desk, a baker's dozen of security pros share experiences that had the greatest influence on their careers.π Read
via "Dark Reading: ".
Darkreading
13 Security Pros Share Their Most Valuable Experiences
From serving as an artillery Marine to working a help desk, a baker's dozen of security pros share experiences that had the greatest influence on their careers.
β Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites β
π Read
via "Threatpost".
The web skimmer has been spotted on at least 17 popular eCommerce websites, a new Visa alert warns.π Read
via "Threatpost".
Threat Post
Pipka Card Skimmer Removes Itself After Infecting eCommerce Sites
The web skimmer has been spotted on at least 17 popular eCommerce websites, a new Visa alert warns.
π΄ Quantum Computing Breakthrough Accelerates the Need for Future-Proofed PKI π΄
π Read
via "Dark Reading: ".
Public key infrastructure is a foundational security tool that has evolved to become a critical base for future advancements. Today's generation of PKI can be coupled with quantum-resistant algorithms to extend the lifespan of digital certificates for decades.π Read
via "Dark Reading: ".
Dark Reading
Quantum Computing Breakthrough Accelerates the Need for Future-Proofed PKI
Public key infrastructure is a foundational security tool that has evolved to become a critical base for future advancements. Today's generation of PKI can be coupled with quantum-resistant algorithms to extend the lifespan of digital certificates for decades.
β βWildly Differentβ Privacy Regulations Causing Compliancy Chaos β
π Read
via "Threatpost".
Threatpost talks to Anthony di Bello with OpenText, at ENFUSE 2019, about the successes and failures of security regulations, and how companies are changing as they struggle to keep up with compliancy issues.π Read
via "Threatpost".
Threat Post
βWildly Differentβ Privacy Regulations Causing Compliance Chaos
Threatpost talks to Anthony di Bello with OpenText, at ENFUSE 2019, about the successes and failures of security regulations, and how companies are changing as they struggle to keep up with compliance issues.
π XSSer Penetration Testing Tool 1.8-2 π
π Go!
via "Security Tool Files β Packet Storm".
XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
XSSer Penetration Testing Tool 1.8-2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π cryptmount Filesystem Manager 5.3.2 π
π Go!
via "Security Tool Files β Packet Storm".
cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
cryptmount Filesystem Manager 5.3.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Office 365 Admins Targeted in Ongoing Phishing Scam β
π Read
via "Threatpost".
Using a real Office 365 account at a legitimate company to send out lures helps phishers evade email defenses.π Read
via "Threatpost".
Threat Post
Office 365 Admins Targeted in Ongoing Phishing Scam
Using a real Office 365 account at a legitimate company to send out lures helps phishers evade email defenses.
π΄ Facebook Discloses WhatsApp MP4 Video Vulnerability π΄
π Read
via "Dark Reading: ".
A stack-based buffer overflow bug can be exploited by sending a specially crafted video file to a WhatsApp user.π Read
via "Dark Reading: ".
Dark Reading
Facebook Discloses WhatsApp MP4 Video Vulnerability
A stack-based buffer overflow bug can be exploited by sending a specially crafted video file to a WhatsApp user.
π΄ How Medical Device Vendors Hold Healthcare Security for Ransom π΄
π Read
via "Dark Reading: ".
While being pummeled by ransomware attacks, healthcare centers also face growing IoT-related threats. Here's how they manage security amid a complex set of risks.π Read
via "Dark Reading: ".
Dark Reading
How Medical Device Vendors Hold Healthcare Security for Ransom
While being pummeled by ransomware attacks, healthcare centers also face growing IoT-related threats. Here's how they manage security amid a complex set of risks.
π PrivSec conference highlights CISO concerns and future data privacy laws π
π Read
via "Security on TechRepublic".
The conference, hosted by Columbia University, brought together CISOs, lawmakers, academics, and businesses to discuss GDPR, CCPA, and data privacy in all its forms.π Read
via "Security on TechRepublic".
TechRepublic
PrivSec conference highlights CISO concerns and future data privacy laws
The conference, hosted by Columbia University, brought together CISOs, lawmakers, academics, and businesses to discuss GDPR, CCPA, and data privacy in all its forms.
π Mastering DFIR: Digital Guardian for DFIR and Data Protection π
π Read
via "Subscriber Blog RSS Feed ".
In this post, the second of two blogs, Bill Bradley breaks down DG Wingman and Digital Guardian's data protection capabilities.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Mastering DFIR: Digital Guardian for DFIR and Data Protection
In this post, the second of two blogs, Bill Bradley breaks down DG Wingman and Digital Guardian's data protection capabilities.
β The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked β
π Read
via "Threatpost".
Thousands of accounts showed up on the Dark Web -- and customers say Disney has been no help.π Read
via "Threatpost".
Threat Post
The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked & Hijacked
Thousands of accounts showed up on the Dark Web β and customers say Disney has been no help.