Breaches

924ce315203c17e05d9e04b59648a942

What Will A Russia-Ukraine Cyberwar Look Like?

March 06, 2014 Added by:Richard Stiennon

Five and a half years since Georgia we can expect a little more sophistication in the arsenal that Russia can bring to bear.

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Iterative DNS Brute Forcing

February 20, 2014 Added by:Rob Fuller

Over the years of doing DNS record collection I have noticed one thing, most domains have a large number of short hostnames that are easy to remember, usually 4 characters or less. I’m sure you already know where I’m going with this, I wanted to brute force all possible hostnames up to 4 characters.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Profiling hacking for hire services offered in the underground

February 18, 2014 Added by:Pierluigi Paganini

Surfing in various cyber criminal forums or visiting some hidden services in the DeepWeb, it is quite easy to discover forums dedicated to facilitating the matching of supply and demand.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Stopping Remote Access Breaches with “Honey”

February 07, 2014 Added by:Patrick Oliver Graf

A new approach, called “Honey Encryption”, could potentially offer more effective digital security by making fake data appear to be legitimate and valuable information to hackers.

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

GCHQ ran a DoS attack on chatrooms used by Anonymous and LulzSec

February 06, 2014 Added by:Pierluigi Paganini

New slides leaked by Snowden and published by NBC News reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.

Comments  (4)

201d6e4b7cd0350a1a9ef6e856e28341

How serious is the Aurora vulnerability for nuclear plants?

February 04, 2014 Added by:Joe Weiss

This risk is certainly more probable than once in a million years which is the minimum criteria for the safety analysis to address specific threats.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Search Engines for OSINT and Recon

February 03, 2014 Added by:Dave Shackleford

There’s an amazing number of awesome search facilities that can be useful when doing OSINT and recon work for pen testing. I’ll list a lot of different sites that I have discovered and use regularly for both.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Belgacom Hack, State-sponsored Attack Hypothesis

September 18, 2013 Added by:Pierluigi Paganini

Belgacom hack, the telecommunications company found evidence of digital intrusion in the company systems, many experts believe in a state-sponsored attack.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Insider Steals Data of 2 Million Vodafone Germany Customers

September 12, 2013 Added by:Mike Lennon

Vodafone Germany said an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Gaining a Data Security Edge with Social Threat Detection

August 16, 2013 Added by:Vince Schiavone

From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

“SIGINT” on 802.11b/g/n Distributed SDR Station - Deployment Example

August 15, 2013 Added by:Mikko Jakonen

“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

Page « < 2 - 3 - 4 - 5 - 6 > »