Kali Linux 2018.3 Release

Another edition of Hacker Summer Camp has come and gone. We had a great time meeting our users, new and old, particularly at our Black Hat and DEF CON Dojos, which were led by our great friend @ihackstuff and the rest of the OffSec crew. Now that every…

Read More >>

Some VPN providers leak your IPv6 IP address

Just a short note. Today a friend called me if I could help him to get TV streaming from TV stations in the US running. When I looked at it, he even selected a VPN provider which offers servers in the US to circumvent the Geo restrictions, but still it didn’t work. He showed me […]

The post Some VPN providers leak your IPv6 IP address first appeared on Robert Penz Blog.

Read More >>

Moving blog to HolisticInfoSec.io

toolsmith and HolisticInfoSec have moved.
I’ve decided to consolidate all content on one platform, namely an R markdown blogdown site running with Hugo for static HTML creation. My frustration with Blogger/Blogspot met its limit when a completed draft…

Read More >>

Defensive Security Podcast Episode 223

https://www.straitstimes.com/singapore/personal-info-of-15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most
https://www.bankinfosecurity.com/labcorp-still-recovering-from-ransomware-attack-a-11235
https://www.securityweek.com/cyber-axis-…

Read More >>

Insurance Occurrence Assurance?

The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a reactive measure whereas an effective security program is a proactive measure.

Read More >>