Article: Remote Authentication GeoFeasibility Tool - GeoLogonalyzer - published over 6 years ago. Content: Users have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time. While the ability to access resources from anywhere is imperative for employees, threat actors often leverage stolen credentials to access systems and data. Due to large volumes of ... https://www.fireeye.com/blog/threat-research/2018/05/remote-authentication-geofeasibility-tool-geologonalyzer.html Published: 2018 05 29 17:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 25th May 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-25th-may-2018 Published: 2018 05 24 04:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Industry 100: FS-ISAC in NCSC and it's XLNT - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-fs-isac-ncsc-and-its-xlnt Published: 2018 05 23 23:00:00 Received: 2023 05 05 07:22:13 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Of mice and cyber - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/mice-and-cyber Published: 2018 05 23 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Countdown to GDPR - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/countdown-gdpr Published: 2018 05 21 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: GDPR security outcomes - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/gdpr-security-outcomes Published: 2018 05 16 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 18th May 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-18th-may-2018 Published: 2018 05 16 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: GDPR security outcomes - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/gdpr-security-outcomes Published: 2018 05 16 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: Avoid scoring a cyber security own goal this summer - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/avoid-scoring-cyber-security-own-goal-summer Published: 2018 05 15 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Phishing, spear phishing and whaling; does it change the price of phish? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/phishing-spear-phishing-and-whaling-does-it-change-price-phish Published: 2018 05 15 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Avoid scoring a cyber security own goal this summer - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/avoid-scoring-cyber-security-own-goal-summer Published: 2018 05 15 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Phishing, spear phishing and whaling; does it change the price of phish? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/phishing-spear-phishing-and-whaling-does-it-change-price-phish Published: 2018 05 15 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Increased Cyber Threats: Security steps to take - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/increased-cyber-threats-security-steps-take Published: 2018 05 14 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Spray you, spray me: defending against password spraying attacks - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/spray-you-spray-me-defending-against-password-spraying-attacks Published: 2018 05 14 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Increased Cyber Threats: Security steps to take - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/increased-cyber-threats-security-steps-take Published: 2018 05 14 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Arbitrary Code Execution at Ring 0 using CVE-2018-8897 - published over 6 years ago. Content: https://blog.can.ac/2018/05/11/arbitrary-code-execution-at-ring-0-using-cve-2018-8897/ Published: 2018 05 14 05:21:39 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
Article: Gpredict is satellite tracking and prediction application. - published over 6 years ago. Content: Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation algorithms together with NORAD two-line element sets (TLE). Some core features of Gpredict include: – Tracking of a large number of satellites only limited by the physical memory and processing power of the computer – Display the t... https://seclist.us/gpredict-is-satellite-tracking-and-prediction-application.html Published: 2018 05 14 00:52:36 Received: 2022 07 28 18:50:48 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: omnibus – The Osint Omnibus. - published over 6 years ago. Content: Omnibus An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source Intelligence collection, research, and artifact management. By providing an easy to use interactive command line application, users are able to create sessions to... https://seclist.us/omnibus-the-osint-omnibus.html Published: 2018 05 10 21:52:45 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: Weekly Threat Report 11th May 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-11th-may-2018 Published: 2018 05 09 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The NCSC's guide to developing, procuring and deploying applications - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncscs-guide-developing-procuring-and-deploying-applications Published: 2018 05 07 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 4th May 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-4th-may-2018 Published: 2018 05 07 04:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: EUD Security Guidance: macOS 10.12 Provisioning Script - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/macos-1012-provisioning-script Published: 2018 05 07 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: ids_bypass – Intrussion Detection System Bypass tricks. - published over 6 years ago. Content: Disclaimer: These programs is for Educational purpose ONLY. Do not use it without permission. * inject_server: Proof-Of-Concept for CVE-2018-6794. If as a server side you break a normal TCP 3 way handshake packets order and inject some response data before 3whs is complete then data still will be received by the client but some IDS engines may skip content c... https://seclist.us/ids_bypass-intrussion-detection-system-bypass-tricks.html Published: 2018 05 05 21:47:26 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: rastrea2r – Collecting & Hunting for IOC with gusto and style. - published over 6 years ago. Content: Description Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced “rastreador” – hunter- in Spanish) is a multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes. ... https://seclist.us/rastrea2r-collecting-hunting-for-ioc-with-gusto-and-style.html Published: 2018 05 05 10:39:02 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: sniff-probe-req : Wifi Probe Requests Sniffer. - published over 6 years ago. Content: sniff-probe-req is a software allows you to sniff the Wi-Fi probe requests passing near your wireless interface. Probe requests are sent by a station to elicit information about access points, in particular to determine if an access point is present or not in the nearby environment. Some devices (mostly smartphones and tablets) use these requests to determin... https://seclist.us/sniff-probe-req-wifi-probe-requests-sniffer.html Published: 2018 05 04 20:31:16 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
Article: LeakScraper – a set of tools to process and visualize huge text files containing credentials. - published over 6 years ago. Content: LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. These tools are designed to help pentesters/redteamers doing OSINT, credentials gathering and credentials stuffing attacks. The different tools LeakScraper is split into three parts : + leakStandardizer : A tool to standardize leaks you got from some leg... https://seclist.us/leakscraper-a-set-of-tools-to-process-and-visualize-huge-text-files-containing-credentials.html Published: 2018 05 04 02:40:21 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: MalwLess Simulator Tool (MST). - published over 6 years ago. Content: MalwLess is a open source tool developed in C# for blue teams that allows you to test your SIEM and security systems. Basically you can simulate the behaviour of a malicious attack or system compromise without the need to run processes or exploits in the network. It provides a framework based on rules that anyone can write, so when a new technique or attack ... https://seclist.us/malwless-simulator-tool-mst.html Published: 2018 05 03 21:11:30 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: CyberFirst Girls' talent showcased as the 2018 competition comes to a close - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-girls-talent-showcased-2018-competition-comes-close Published: 2018 05 02 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Hadoop File System Forensics Toolkit (HDFS FTK). - published over 6 years ago. Content: Hadoop File System Forensics Toolkit (HDFS FTK). View and extract files from an offline image of Hadoop file system. Supports: + Support for multiple datanodes + Support of fsimage XML format + Search filenames and filter by filetype + File recovery while preserving metadata hdfs ftk Motivation Hadoop File Systems is one of the most widely used distributed f... https://seclist.us/hadoop-file-system-forensics-toolkit-hdfs-ftk.html Published: 2018 05 02 11:57:01 Received: 2022 10 30 05:26:02 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Click to Open Code Editor