securityXspace: a blog about cyber-philosophy.
-
Exploits: how great is the threat?
How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents…
-
Introduction to the NIST CyberSecurity Framework for a Landscape of Cyber Menaces
The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of zero-day threats The NIST CyberSecurity Framework is a guide for businesses and enterprises of good practices for information security. Source: Introduction to the NIST CyberSecurity Framewor for a Landscape of Cyber Menaces
-
netsec/ CLDAP Protocol Allows DDoS Attacks with 70x Amplification Factor
http://ift.tt/2pikfL7 Ref: http://ift.tt/2pgMCMI Date: April 15, 2017 at 01:40AM Author: prinnyerwin
-
netsec/ Dropping reverse shells via SSH
http://ift.tt/2psPJOT Ref: http://ift.tt/2oFeGIg Date: April 17, 2017 at 10:10AM Author: mrschyte
-
netsec/ The Ring-Road Bug
http://ift.tt/2offZu7 Ref: http://ift.tt/2oDFbfB Date: April 17, 2017 at 02:39PM Author: sanderD
-
Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds
http://ift.tt/MtkUnG Threat intelligence feeds have become a staple in the diet of analysts and security professionals at organizations large and small. Some feeds are free, others are offered for sale from security vendors. They can also come in a dizzying array of formats, varying sizes, and include threat information that may or may not add…
-
netsec/ CVE-2017-0199 Practical exploitation ! (PoC) From http://ift.tt/Vn2J4u
http://ift.tt/2oIe5Wz Ref: http://ift.tt/2oIo6kX Date: April 18, 2017 at 11:56AM Author: iamforgettable
-
netsec/ Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx
http://ift.tt/2oGkAaI Ref: http://ift.tt/2pe4nfM Date: April 18, 2017 at 05:09PM Author: jms_dot_py
-
netsec/ Unitrends Bug Hunting: Remote Code Execution (CVE-2017-7820) – Chapter 2
http://ift.tt/2pegt93 Ref: http://ift.tt/2pP0p9G Date: April 18, 2017 at 06:18PM Author: cslakin
-
netsec/ New Open Source RAT Uses Telegram Protocol to Steal Data from Victims
http://ift.tt/2okEAyq Ref: http://ift.tt/2oLCkRQ Date: April 19, 2017 at 02:09AM Author: prinnyerwin