Tag: IFTTT
-
Chinese hacker jailed for shipping aerospace secrets home
Chinese hacker jailed for shipping aerospace secrets home http://ift.tt/29HsKIC Chinese national Su Bin has been sentenced to 46 months jail after admitting his role in stealing information on the Lockheed F-22 and F-35 aircraft, along with Boeing’s C-17 cargo plane. The aviation expert worked with two members of China’s military to attack networks of Boeing…
-
Just 39 USD for a lifetime license for Stampado Ransomware
Just 39 USD for a lifetime license for Stampado Ransomware http://ift.tt/29NlOLY The Stampado ransomware is a new threat available for sale on the Dark Web that was discovered by the experts at Heimdal security. Security experts from the Heimdal security firm have discovered a new strain of ransomware dubbed Stampado that is available for sale on…
-
Crypto flaw made it easy for attackers to snoop on Juniper customers
Crypto flaw made it easy for attackers to snoop on Juniper customers http://ift.tt/2aeHiiJ (credit: John Palmer) As if people didn’t already have cause to distrust the security of Juniper products, the networking gear maker just disclosed a vulnerability that allowed attackers to eavesdrop on sensitive communications traveling through customers’ virtual private networks. In an advisory…
-
Bank boffins drop slick incident response tool for Mandiant mobs
Bank boffins drop slick incident response tool for Mandiant mobs http://ift.tt/29CA079 Security boffins at ANZ, one of Australia’s largest banks, have offered their nightHawk incident response tools for organisations running free Mandiant tools. Mandiant’s open source platform is fit for enterprises requiring incident response at scale, and can run off a laptop for many investigations.…
-
Reverse engineering DUBNIUM –Stage 2 payload analysis
Reverse engineering DUBNIUM –Stage 2 payload analysis http://ift.tt/29IkklB Recently, we blogged about the basic functionality and features of the DUBNIUM advanced persistent threat (APT) activity group Stage 1 binary and Adobe Flash exploit used during the December 2015 incident (Part 1, Part 2). In this blog, we will go through the overall infection chain structure and…
-
Trello bug bounty: The websocket receives data when a public company creates a team visible board via /r/netsec
Trello bug bounty: The websocket receives data when a public company creates a team visible board http://ift.tt/29FDHZg Submitted July 14, 2016 at 09:19PM by theflofly via reddit http://ift.tt/29zYZbW
-
The Zero Trust Model (Not Pokémon Go!!) via /r/netsec
The Zero Trust Model (Not Pokémon Go!!) http://ift.tt/29Mtazp Submitted July 14, 2016 at 09:43PM by LavaRain via reddit http://ift.tt/29S4zcB
-
Sharkey, a service for managing OpenSSH certificates via /r/netsec
Sharkey, a service for managing OpenSSH certificates http://ift.tt/29BVKQj Submitted July 15, 2016 at 12:50AM by csssss_ via reddit http://ift.tt/29IcGaQ
-
SMS Password Recovery: nopls via /r/netsec
SMS Password Recovery: nopls http://ift.tt/29IvBT8 Submitted July 15, 2016 at 04:04AM by TwoTimesX via reddit http://ift.tt/29SKMtR
-
Hashjacking – Secretly sending your cleartext hashes across the Internet via /r/netsec
Hashjacking – Secretly sending your cleartext hashes across the Internet http://ift.tt/29H6pMz Submitted July 14, 2016 at 03:39PM by Hoboman_ via reddit http://ift.tt/29R9Y3C