Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earl…
WSL2 and Kali
Kali Linux has had support for WSL for some time, but its usefulness has been somewhat limited. This was mostly due to restrictions placed on some system calls , most importantly those revolving around networking. Furthermore, additional issues with sp…
KnowBe4 Gets Whopping $300m in Funding
Dubbed a cybersecurity unicorn, KnowBe4’s valuation soars to $1bn.
When to Call a Professional Locksmith
You may not think about just how much a locksmith does, until your safety is compromised or you’re in a panic because you’ve locked yourself out of your home or business. Locks are both the most commonly used and the most underappreciated safety device of all time. Locks keep people in and unwanted things out, and are the first defense … Read More
The post When to Call a Professional Locksmith appeared first on Security Source.
Philly Courts Still Down After Cyber-Attack
Some Philadelphia Court systems are still down three weeks post-attack
Flaw in SymCrypt Can Trigger DDoS
A Google researcher reported a Windows vulnerability as part of Project Zero.
XSS is Most Rewarding Bug Bounty as CSRF is Revived
XSS is the most rewarding security vulnerability, according to data on the number of bug bounties paid
TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR
TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.
Tor Router allow you to use TOR as a transparent p…
FBI: Don’t Trust HTTPS or Padlock on Websites
Feds warn that hackers are increasingly using certs to ‘secure’ their phishing sites