Omvärld

Original release date: April 27, 2017 The Federal Trade Commission (FTC) recommends that consumers who are affected by identity theft file a report at IdentityTheft.gov—a one-stop resource to help you report and recover from identity theft. Information provided there includes checklists, sample letters, and links to other resources. US-CERT encourages…

Read More

Original release date: April 27, 2017 The Federal Trade Commission (FTC) recommends that consumers who are affected by identity theft file a report at IdentityTheft.gov—a one-stop resource to help you report and recover from identity theft. Information provided there includes checklists, sample letters, and links to other resources. US-CERT encourages…

Read More

Monitor AWS & GCP Configurations       Security Monkey is an OpenSource application from Netflix ( NetflixOSS) which monitors/alerts/reports one or multiple AWS/GCP accounts for anomalies. Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. It provides a single UI to browse…

Read More

Posted by Emily Schechter, Chrome Security Team In January, we began our quest to improve how Chrome communicates the connection security of HTTP pages. Chrome now marks HTTP pages as “Not secure” if they have password or credit card fields. Beginning in October 2017, Chrome will show the “Not secure”…

Read More

Trend Micro OfficeScan är sårbar och kan användas för att uföra en "Cross Site Scripting attack" Sårbarheten möjliggör XSS där en extern angripare kan få godtycklig skriptkod att exekveras i en målanvändares webbläsare. Det innebär också att användarens eventuella autentiseringskaka kan kopieras. Trend Micro Office Scan kan även läcka krypterade…

Read More

These vulnerabilities were discovered by Lilith Wyatt of Cisco ASIG Summary Zabbix is an enterprise monitoring solution that is designed to give organizations the ability to monitor the health and status of various systems within their networks, including: network services, servers, and networking equipment. Cisco recently discovered multiple vulnerabilities in…

Read More

Dynamic Binary Analysis Tool      Manticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation.   Features Input Generation: Manticore automatically generates inputs that trigger unique code paths Crash Discovery: Manticore discovers inputs that crash programs via memory safety violations…

Read More

Wide Range Mass Audit Toolkit      Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination. The…

Read More

Wide Range Mass Audit Toolkit      Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination. The…

Read More

Node.js Security Scanner: Web Exploit Detector      The Web Exploit Detector is a Node.js application (and NPM module) used to detect possible infections, malicious code and suspicious files in web hosting environments. This application is intended to be run on web servers hosting one or more websites. Running the…

Read More