Cyber Security & Digital Forensics
55.3K views | +70 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

RockLoader Delivers New Bart Encryption Ransomware - PhishMe

RockLoader Delivers New Bart Encryption Ransomware - PhishMe | Cyber Security &  Digital Forensics | Scoop.it
Another ransomware tool has been added to the ever-growing encryption ransomware market with the introduction of the Bart encryption ransomware. Named by its creators in its ransom payment interface as well as in the extension given to its encrypted files, the Bart encryption ransomware has leveraged some distinctive mechanisms for delivery during its early deployments. …
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Computer: How to Fix Computer Problem
Scoop.it!

Locky JS and URL Revealer | Kahu Security

Locky JS and URL Revealer | Kahu Security | Cyber Security &  Digital Forensics | Scoop.it
From various reports, it appears that the malicious Javascript files sent via email that pull Locky down is back.

Via Danen Raas, Anna
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Micheal Ethan
Scoop.it!

Tactical Cyber Security Checklist

Tactical Cyber Security Checklist | Cyber Security &  Digital Forensics | Scoop.it
7 best practices to keep your organization cyber resilient and ready for battle
Via Rami Kantari, Micheal Ethan
more...
Micheal Ethan's curator insight, June 22, 1:37 AM

Symantec created a tactical cyber security checklist based on best practices from the 2016 ISTR. They are: Ensure all devices on network have security protections. Implement a removable media policy. Be aggressive in your updating and patching. Enforce an effective password policy. Ensure regular backups are available. Restrict email attachments. Ensure that you have response procedures in place.​​

Rescooped by Constantin Ionel Milos / Milos Constantin from Cybersecurity
Scoop.it!

The Genesis of an XSS Worm - Part I - Fooling the Interpreter

The Genesis of an XSS Worm - Part I - Fooling the Interpreter | Cyber Security &  Digital Forensics | Scoop.it

The greatest danger of a cross-site scripting (XSS) vulnerability is the possibility of spreading from user to user of an application until the whole user system get infected.


Via Danen Raas, Vincent Wang
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from "Computação Forense"
Scoop.it!

Data Recovery Software Products - Runtime Software Products

Data Recovery Software Products - Runtime Software Products | Cyber Security &  Digital Forensics | Scoop.it
Free technical support for Runtime Data Recovery programs including GetDataBack, DiskExplorer, RAID Reconstructor and Captain Nemo.

Via João Carvalho
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Smart detection for passive sniffing in the Tor Network via : @binitamshah

Smart detection for passive sniffing in the Tor Network via : @binitamshah | Cyber Security &  Digital Forensics | Scoop.it
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from ArtH@ck
Scoop.it!

Professional Qualifications | CREST - Ethical Security Testers

Professional Qualifications | CREST - Ethical Security Testers | Cyber Security &  Digital Forensics | Scoop.it

Via Laurent LEGASTELOIS
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from cyber
Scoop.it!

DARPA Is Creating a New Internet, Based Around Search

DARPA Is Creating a New Internet, Based Around Search | Cyber Security &  Digital Forensics | Scoop.it
The current Internet sees only 4 percent of the real Internet. The new Internet will see the other 96 percent.

Via Jean-Philippe BOCQUENET, Ami Rojkes Dombe
more...
Ken Feltman's curator insight, June 15, 10:44 AM
A huge new world out there...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

INSTALLING THE ELK STACK ON UBUNTU – ELASTICSEARCH, LOGSTASH, KIBANA AND NGINX.

INSTALLING THE ELK STACK ON UBUNTU – ELASTICSEARCH, LOGSTASH, KIBANA AND NGINX. | Cyber Security &  Digital Forensics | Scoop.it
This article forms part of our series on setting up a simple, open source network security monitoring system on Linux suitable for a small office network.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How to Deny TOR user Access your Website

How to Deny TOR user Access your Website | Cyber Security &  Digital Forensics | Scoop.it
Automatically block the TOR user access to your website. TOR users. Attacker uses TOR to access your website for their malicious purpose, block their access now.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

Using Burp Intruder to Test CSRF Protected Applications

Using Burp Intruder to Test CSRF Protected Applications | Cyber Security &  Digital Forensics | Scoop.it

Define grep rule. Open Options tab -> click Add button under Grep – Extract section. A new window opens -> click fetch response button and select your csrf token value and press ok.


Via Danen Raas
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Top 20 Open  #SSH #Server Best #Security  Practices

Top 20 Open  #SSH #Server Best #Security  Practices | Cyber Security &  Digital Forensics | Scoop.it
OpenSSH server best security practices - protect your server from brute force attack under UNIX / Linux / BSD / Mac OS X operating systems.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Informática Forense
Scoop.it!

HPE Cyber Risk Report 2016

HPE Cyber Risk Report 2016 | Cyber Security &  Digital Forensics | Scoop.it

The 96-page Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016 offers a broad view of the current threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal: Provide security information that leads to a better understanding of the threat landscape, and deliver resources you can use to minimize security risk.


Here are three important reasons you should read the 2016 report: 


- The game is changing. Think you’ve heard it all? Well, the cyber-risk landscape is continually changing. For example, in 2015, attacks shifted to the new perimeter – likely in your pocket. Today’s mobile devices and broad interconnectivity are attracting attackers and expanding the threat landscape.


- You are more vulnerable than you think. Applications and platforms that you might use every day are the biggest targets of exploits. In fact, there are now more than 10,000 new Android threats discovered every day – a 153 percent year-over-year increase. Meanwhile, malware attacks on the Apple iOS platform grew 235 percent in 2015.


- There’s more at stake than ever. 2015 was the Year of Collateral Damage. Numerous attacks affected people who never dreamed that they might be involved in a security breach. For example, background investigation records of current, former and prospective Federal employees and contractors were stolen from a database at the U.S. Office of Personnel Management (OPM), including names, addresses and Social Security numbers. Many of those victimized didn’t even know they were in the OPM database.


What can you do? Download the HPE Cyber Risk Report 2016 today, read it and share with peers, friends, customers, partners and others in your sphere of influence. Then, take steps to reduce your cyber risk today.


Via Javier Pagès López
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The Threat is Real: Ransomware goes viral

The Threat is Real: Ransomware goes viral | Cyber Security &  Digital Forensics | Scoop.it
The ransomware epidemic is a very real problem. This threat is one that your users and enterprise need to be aware of in order to combat effectively. Let's prevent your organizatio
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Tracking the Future
Scoop.it!

How do you build a large-scale quantum computer?

How do you build a large-scale quantum computer? | Cyber Security &  Digital Forensics | Scoop.it

Physicists led by ion-trapper Christopher Monroe at the JQI have proposed a modular quantum computer architecture that promises scalability to much larger numbers of qubits. The components of this architecture have individually been tested and are available, making it a promising approach. In the paper, the authors present expected performance and scaling calculations, demonstrating that their architecture is not only viable, but in some ways, preferable when compared to related schemes.


Via Szabolcs Kósa
more...
Andreas Pappas's curator insight, March 28, 2014 4:40 AM

This article shows how scientists can increase the scale of quantum machine while still making them behave quantum mechanically by reading the qu-bits with lasers instead of conventional wiring.

Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

Project Zero: Exploiting Recursion in the Linux Kernel

Project Zero: Exploiting Recursion in the Linux Kernel | Cyber Security &  Digital Forensics | Scoop.it
On June 1st, I reported an arbitrary recursion bug in the Linux kernel that can be triggered by a local user on Ubuntu if the system was installed with home directory encryption support.

Via Danen Raas
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Tools
Scoop.it!

Conoce las mejores 5 aplicaciones para auditorías Wi-Fi en móviles Android

Conoce las mejores 5 aplicaciones para auditorías Wi-Fi en móviles Android | Cyber Security &  Digital Forensics | Scoop.it
Listado con las mejores cinco aplicaciones para realizar auditorías inalámbricas Wi-Fi en los smartphones y tablets con sistema operativo Android.

Via Emilio
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

List of Books for Pentest Rookies.

List of Books for Pentest Rookies. | Cyber Security &  Digital Forensics | Scoop.it
For the people that they want to make a start into the penetration testing industry it is really important to build their knowledge in a structure way. Books can provide guidance and build the foundation knowledge that is required for a start. In nowadays there are plenty of books written by penetration testers for penetration testers that provide…
more...
Micheal Ethan's curator insight, June 22, 1:43 AM
Learn to Hack from Best Hacking Books:

Hacking is an Art of Exploitation which can be used ethically as well as unethically, for e.g. A hammer can be used to build or break something, and anybody can learn this art easily with just little efforts, YES! nowadays its easy to learn how to hack, In fact you can teach yourself or get an online training, However in any case you will definitely need books because that's the only best way to learn hacking for beginners.

The secret of learning hacking more quickly and easily is to concentrate more on Penetration Testing, its the key and also the most essential skill of a hacker which requires lot of practical knowledge and so, it is mastered only through practice. Well, If you don't know anything about pentesting do not worry, because these books will teach you from basic without any need of prior knowledge.

1.Practical Guide to Penetration Testing2.Python Programming for Hackers and Pentesters3.The Basics of Hacking and Penetration Testing4.Hacking: The Art of Exploitation 5.Red Team Field Manual

 

Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

 #SteamStealer #IP #visualisations : Blaze's Security Blog..

 #SteamStealer #IP #visualisations : Blaze's Security Blog.. | Cyber Security &  Digital Forensics | Scoop.it
.."Just for fun I decided to visualise all SteamStealer IPs I've encountered (till now). They are hosting multiple fake screenshot websites, fake voice communication software, fake streaming websites, fake Steam websites and others. They may also be a C&C for the malware, or fake gambling/lottery website"..
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How to Run a  #Russian  #Hacking Ring..

How to Run a  #Russian  #Hacking Ring.. | Cyber Security &  Digital Forensics | Scoop.it
It’s not that different from running any other business.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

DDoS Protection With IPtables: The Ultimate Guide

DDoS Protection With IPtables: The Ultimate Guide | Cyber Security &  Digital Forensics | Scoop.it
The ultimate guide on DDoS protection with IPtables including the most effective anti-DDoS rules. Learn how to protect your Linux server.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Reverse Engineering Dubnium .

Reverse Engineering Dubnium . | Cyber Security &  Digital Forensics | Scoop.it

Part I: https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2/ …                                                        Part II: https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2/2/ …        >>> DUBNIUM (which shares indicators with what Kaspersky researchers have called DarkHotel) is one of the activity groups that has been very active in recent years, and has many distinctive features. We located multiple variants of multiple-stage droppers and payloads in the last few months, and although they are not really packed or obfuscated i

more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

HOWTO: Port Forwards through a SOCKS proxy

HOWTO: Port Forwards through a SOCKS proxy | Cyber Security &  Digital Forensics | Scoop.it

Recently, I’ve had multiple people ask about port forwards with Cobalt Strike’s Beacon payload. Beacon has had SOCKS proxy pivoting support since June 2013. This feature opens a SOCKS proxy server on the team server.


Via Danen Raas
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from opexxx
Scoop.it!

BSI - Industrial Control System Security Empfehlungen

BSI - Industrial Control System Security Empfehlungen | Cyber Security &  Digital Forensics | Scoop.it

Via alexander knorr
more...
No comment yet.