US-CERT

B64e021126c832bb29ec9fa988155eaf

OpenSSL “Heartbleed” – Whose Vulnerable and How to Check

April 10, 2014 Added by:Dan Dieterle

The Internet is plastered with news about the OpenSSL heartbeat “Heartbleed” (CVE-2014-0160) vulnerability that some say affects up to 2/3 of the Internet.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

OpenSSL Problem is HUGE – PAY ATTENTION

April 10, 2014 Added by:Brent Huston

The attack allows an attacker to remotely tamper with OpenSSL implementations to dump PLAIN TEXT secrets, passwords, encryption keys, certificates, etc. They can then use this information against you.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Heartbleed Should Give You Cardiac Arrest

April 09, 2014 Added by:Tripwire Inc

Estimates are over 66% of active websites on the internet may be vulnerable to this bug, found in OpenSSL, an open source cryptographic library used in the Apache web server and ignx when creating communications with users.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Here's Full Disclosure - Now No Disclosure

March 20, 2014 Added by:Javvad Malik

Full disclosure has announced it’s shutting down.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Adapting Vulnerability Management to Address Advanced Persistent Threats

March 19, 2014 Added by:Tripwire Inc

In addition to being one of the top SANS Critical Security Controls and part of numerous other compliance frameworks, vulnerability management is generally accepted as basic security hygiene today for corporate networks.

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Recent Development of ICS Exploits Continues Upward Trend of Security Research

March 19, 2014 Added by:Joel Langill

One very important part of a well-rounded ICS Security Management System is situational awareness of the actual risks facing industrial systems in terms of both vulnerabilities disclosed and the ease in converting these proof-of-concept (PoC) disclosures into workable exploit modules.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Hackers help China build J-20 Stealth Fighter with US Tech

March 17, 2014 Added by:Dan Dieterle

According to defense officials, starting in 2007 Chinese hackers were involved in a massive, multi-year cyber espionage program dubbed, 'Operation Byzantine Hades', that targeted foreign governments and industry.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Is the Agent.btz malware the link between Snake and Red October?

March 13, 2014 Added by:Pierluigi Paganini

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red October campaign.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Russian “Cyber” Snake attacking Ukrainian Systems

March 11, 2014 Added by:Dan Dieterle

Everyone is expecting Russia to attack Ukrainian computer systems, but the truth may be that they have been doing so right along.

Comments  (0)

924ce315203c17e05d9e04b59648a942

What Will A Russia-Ukraine Cyberwar Look Like?

March 06, 2014 Added by:Richard Stiennon

Five and a half years since Georgia we can expect a little more sophistication in the arsenal that Russia can bring to bear.

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Iterative DNS Brute Forcing

February 20, 2014 Added by:Rob Fuller

Over the years of doing DNS record collection I have noticed one thing, most domains have a large number of short hostnames that are easy to remember, usually 4 characters or less. I’m sure you already know where I’m going with this, I wanted to brute force all possible hostnames up to 4 characters.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Profiling hacking for hire services offered in the underground

February 18, 2014 Added by:Pierluigi Paganini

Surfing in various cyber criminal forums or visiting some hidden services in the DeepWeb, it is quite easy to discover forums dedicated to facilitating the matching of supply and demand.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

GCHQ ran a DoS attack on chatrooms used by Anonymous and LulzSec

February 06, 2014 Added by:Pierluigi Paganini

New slides leaked by Snowden and published by NBC News reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

How serious is the Aurora vulnerability for nuclear plants?

February 04, 2014 Added by:Joe Weiss

This risk is certainly more probable than once in a million years which is the minimum criteria for the safety analysis to address specific threats.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Search Engines for OSINT and Recon

February 03, 2014 Added by:Dave Shackleford

There’s an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I’ll list a lot of different sites that I have discovered and use regularly for both.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »