IN BREAF: Morocco will be hosting this year CyFy Africa where experts and practitioners from
around the globe expected to discuss the future the technology holds for the
Continent. CyFy Africa comes at a time when the world’s attention is centere…
Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup
A couple years ago we did a tutorial on Hacking Tutorials on how to install the popular vulnerability assessment tool OpenVAS on Kali Linux. We’ve covered the installation process on Kali Linux and running a basic scan on the Metasploitable 2 vir…
TASKRABBIT YAKIRI KUDUKULIWA
KWA UFUPI: TaskRabbit imekua muhanga wa uhalifu mtandao – IKEA, Imethibitisha.
Hii ni katika muendelezo wa Programu tumishi
(Applications) na huduma zingine za kimtandao kuingiliwa na wahalifu mtandao
ambapo taarifa za watu zimejikuta katika miko…
Finding Packages for Kali Linux
In an earlier post, we covered Package Management in Kali Linux. With the ease of installation that APT provides, we have the choice amongst tens of thousands of packages but the downside is, we have tens of thousands of packages. Finding out what pack…
Introducing Web Security Analytics
Every security team knows that the success of any security product relies heavily on the ability to maintain an optimal security configuration. Any misconfiguration can result in malicious or undesired traffic reaching the application, or worse – legit…
Defensive Security Podcast Episode 215
https://www.bankinfosecurity.com/nj-ag-smacks-practice-hefty-fine-for-vendor-breach-a-10774
https://www.bankinfosecurity.com/panera-bread-data-leak-persisted-for-eight-months-a-10760
http://www.eweek.com/security/best-buy-delta-sears-hit-by-third-party…
The Dark Side of APIs: Part 1, API Overview
Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for s…
toolsmith #132 – The HELK vs APTSimulator – Part 2
Continuing where we left off in The HELK vs APTSimulator – Part 1, I will focus our attention on additional, useful HELK features to aid you in your threat hunting practice. HELK offers Apache Spark, GraphFrames, and Jupyter Notebooks a…
4 Ways to Catch Criminals Red-Handed
There’s no better way to secure a conviction for the guilty and reclaim stolen possessions for the innocent than by catching a criminal red-handed. With figures from the Office for National Statistics showing that crime is up by 10% – which is the largest annual rise for a decade – it’s never been more important […]
The post 4 Ways to Catch Criminals Red-Handed appeared first on Assured Security Solutions.
Defensive Security Podcast Episode 214
https://www.csoonline.com/article/3265024/privacy/are-you-letting-gdpr-s-privacy-rules-trump-security.html
http://www.zdnet.com/article/doj-indicts-iranian-hackers-for-stealing-data-from-144-us-universities/
https://www.databreachtoday.com/report-gucci…