Tag: IFTTT
-
Oculus CEO hacked using four year-old MySpace password – KitGuru
Oculus CEO hacked using four year-old MySpace password – KitGuru http://ift.tt/29ieKqS KitGuru Oculus CEO hacked using four year-old MySpace passwordKitGuruPurportedly, they were able to crack his accounts by discovering his four-year old MySpace password. “We here at @Oculus are very excited to announce our new CEO,” read the tweet following the account breach. When interviewed…
-
APT and why I don’t like the term, (Fri, Jul 1st)
APT and why I don’t like the term, (Fri, Jul 1st) http://ift.tt/29aDmQ1 Introduction In May 2015, I wrote a dairy describing a "SOC analyst pyramid." It describes the various types of activity SOC analysts encounter in their daily work [1]. In the comments, someone stated I should’ve included the term "advanced persistent threat" (APT) in…
-
2016-06-30 – Neutrino EK data dump
2016-06-30 – Neutrino EK data dump http://ift.tt/29mEsJo Threat Intel via Malware-Traffic-Analysis.net – Blog Entries http://ift.tt/MiNM2G July 1, 2016 at 02:18PM
-
Hacker persona Guccifer 2.0 insists he breached DNC, not Russian threat actors
Hacker persona Guccifer 2.0 insists he breached DNC, not Russian threat actors http://ift.tt/298CR7G Guccifer 2.0, a purported hacker claiming responsibility for breaching the DNC’s networks and leaking their election strategies, published a blog post yesterday to further refute claims that the true culprits are Russian cyberespionage agents. Threat Intel via CERT-EU : EMM AlertFilter System:…
-
5 Things To Consider With A Threat Hunting Program – Dark Reading
5 Things To Consider With A Threat Hunting Program – Dark Reading http://ift.tt/296E3rM 5 Things To Consider With A Threat Hunting Program A change in mindset and the ability to think like a malicious hacker are two key requirements. The constantly evolving ability of cyberattackers to get past even the most fortified of enterprise defenses…
-
The Real Deal: Investigating the Dark Web marketplace selling drugs, databases and exploit kits
The Real Deal: Investigating the Dark Web marketplace selling drugs, databases and exploit kits http://ift.tt/29bjrEK Where do cybercriminals go to buy illegal drugs, exploit kits or stolen databases on the internet? One place is called The Real Deal. The website, accessible via Tor and hidden from view for casual internet users, is an underground marketplace…
-
Over 100 Snooping Tor Nodes Have Been Spying on Dark Web Sites
Over 100 Snooping Tor Nodes Have Been Spying on Dark Web Sites http://ift.tt/29aYKpt Over 100 Snooping Tor Nodes Have Been Spying on Dark Web Sites: Vulnerabilities via Ecstatic Security http://ift.tt/1TuVnt9 July 1, 2016 at 02:54PM
-
How to Keep Calm and Mitigate a 470 Gbps DDoS Attack via /r/netsec
How to Keep Calm and Mitigate a 470 Gbps DDoS Attack http://ift.tt/292tTgt Submitted July 01, 2016 at 04:44PM by bot_busters via reddit http://ift.tt/29bbZrq
-
(Hyper)Golix: end-to-end encryption for the internet of things via /r/netsec
(Hyper)Golix: end-to-end encryption for the internet of things I’ve been incredibly frustrated with how much of an absolute catastrophe IoT and home automation is when it comes to security and privacy. It’s also a huge pain in the ass to do at all — imagine trying to get your laptop, in a coffee shop, to…
-
Project Zero: A year of Windows kernel font fuzzing #2: the techniques via /r/netsec
Project Zero: A year of Windows kernel font fuzzing #2: the techniques http://ift.tt/29jPgLa Submitted July 01, 2016 at 06:25PM by vzwar via reddit http://ift.tt/29hlWEG