TL;DR: The glibc DNS bug (CVE-2015-7547) is unusually bad. Even Shellshock and Heartbleed tended to affect things we knew were on the network and knew we had to defend. This affects a universally used library (glibc) at a universally used protocol (DNS). Generic tools that we didn’t even know had network surface (sudo) are thus […]
Next Generation IDaaS: Moving From Tactical to Strategic
Today, I posted a blog entry to the Oracle Identity Management blog titled Next Generation IDaaS: Moving From Tactical to Strategic.
In the post, I examine the evolution of IDaaS and look toward the next generation of Enterprise Identity and Access Ma…
Redirecting On the Edge
On the web, every second counts. Service engineers and operations teams are looking for ways to save milliseconds from web pages’ load times. One of the simpler ways to squeeze better performance from web pages already using a Content Delivery Network …
Will you pay 300$ and allow scamsters remote control to your computer ! child play for this BPO
Microsoft
customers in Arizona were scammed by a BPO setup by fraudsters who’s executives
represented themselves as Microsoft employees and managed to convince them that
for a 300$ charge they would enhance the performance of their desktop
computers.&…
Three Must Do’s to make a Security Awareness Champion
Setting an
example is the best way to institutionalize security awareness within a
workplace or at home. Colleagues and children naturally follow examples set by
champions as it makes it easy to mimic rather than spend time to self-learn. I
found thre…
Swatting airports helpdesks diverts the attention of anti-terror forces on the Indian Republic Day
26th January,
the Indian Republic Day, was targeted by ISIS operatives to stage multiple
terror strikes designed to cause terror and panic in major Indian cities. The
Indian intelligence and police agencies over the last few weeks successfully
nabbed …
Cybercitizens, stay away from commenting or liking posts with terror ideologies
Of current
global concern is the ease at which terror organizations are able to use social
media to spread their ideology and coerce young people living in developed countries
to leave all and fight wars in hostile lands. Their success stems from thei…
Kali Linux 2016.1 Release – Rolling Edition
Our First Release of Kali-Rolling (2016.1)
Today marks an important milestone for us with the first public release of our Kali Linux rolling distribution. Kali switched to a rolling release model back when we hit version 2.0 (codename), however the rol…
ProSec Welcomes your Input
Please send us your comments! You can email them directly to Rob @ info@prosecalarm.com.The post ProSec Welcomes your Input first appeared on ProSec Integration, LLC.
Kali Moto End of Life & Kali Dojo Slides
Kali Sana Release Aftermath
Kali Linux 2.0 has been out for a couple of months and the response has been great, with well over a million unique downloads of Kali 2.0 as a testament. Release day was somewhat hectic for us, as we did not anticipate the s…