redpillsecurity.net
Resources - Red Pill Security
http://www.redpillsecurity.net/resources
The gentleman’s guide to forum spies (spooks, feds, etc.). The gentleman’s guide to forum spies (spooks, feds, etc.). Open Source is a great idea and it has changed the world! 8211; Carnal0wnage &; Attack Research Blog. 8211; McGrew Security Blog. 8211; Information Security Think Tank. 8211; Don`t Learn to HACK – Hack to LEARN. 8211; A personal blog of Tom Eston. 8211; Richard Bejtlich’s blog on digital security. 8211; Blatherings of a Security Addict. 8211; By EnableSecurity. 8211; Rapid7 Community.
tisiphone.net
hacking | Hacks4Pancakes' tisiphone.net
https://tisiphone.net/tag/hacking
Hacks4Pancakes' tisiphone.net. Lesley Carhart, Full Spectrum Cyber-Warrior Princess]. February 10, 2016. Starting an InfoSec Career The Megamix Chapter 6. You can find the previous chapters in this continuing blog series here:. Starting an InfoSec Career The Megamix Chapters 1-3. Starting an InfoSec Career The Megamix Chapters 4-5. Chapter 6: Self-Study Options. For the Visual Learner:. Years of talks at information security conferences have been recorded and are freely available on YouTube. I’d avoid wa...
tisiphone.net
infosec | Hacks4Pancakes' tisiphone.net
https://tisiphone.net/tag/infosec
Hacks4Pancakes' tisiphone.net. Lesley Carhart, Full Spectrum Cyber-Warrior Princess]. March 17, 2016. The Worst InfoSec Resume, Ever. I do quite a bit of InfoSec résumé reviewing and critiquing, both personally and professionally, so I’m repeatedly asked for tips on common problems. In order to ensure that these problems were not exclusive to me, I recently had a lengthy discussion with a number of InfoSec professionals involved in hiring (thank you! February 10, 2016. Chapter 6: Self-Study Options.
spylogic.net
Top 5 Attack Vectors Report: Defend It Before You Hack It — spylogic.net
http://www.spylogic.net/2014/07/2014-top-5-attack-vectors-report-defend-hack
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. Top 5 Attack Vectors Report: Defend It Before You Hack It. July 30, 2014 – 5:24 pm. Missing Patches and System Misconfigurations. The full report is available for download on the SecureState website. I also presented a webinar ( watch the replay here. What’s the bottom line? Build and test your defensive controls first, then test to see how these controls hold up. Most of these controls are a mix of tactical...
spylogic.net
Currently browsing SANS posts — spylogic.net
http://www.spylogic.net/tag/sans
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. June 7, 2013 – 12:07 pm. Filed under Application Security. Just a quick update to let everyone know that I’ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th. Check out the SANS class information page for more information about the class, agenda and location. Save 10% on your registration using code: TomStLouis. See you in St. Louis! March 8, 2013 – 3:18 pm.
spylogic.net
Currently browsing SEC542 posts — spylogic.net
http://www.spylogic.net/tag/sec542
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. June 7, 2013 – 12:07 pm. Filed under Application Security. Just a quick update to let everyone know that I’ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th. Check out the SANS class information page for more information about the class, agenda and location. Save 10% on your registration using code: TomStLouis. See you in St. Louis! June 21, 2012 – 2:26 pm.
defcon.org
DEF CON® 22 Hacking Conference - Speakers
https://www.defcon.org/html/defcon-22/dc-22-speakers.html
Skip to main content. DEF CON 22 Hacking Conference. From Dusk Til Con. Jayson E. Street. Phil Soldier of Fortran Young. Keep your eyes on this space, we'll be adding new talks frequently! DEF CON 101 Presentations. DEF CON 101 - The Talk. HighWiz, The Dark Lord, Tom Riddle, "The Swamp Fox", The Earl of Grantham, And your excellency sir, (to you). May be traveling with:. Alan Turing, Karl Möbius, Charles Babbage, the Chilean national soccer team, and a devious pink elephant. Lock has over 25 years of exp...
industrionage.blogspot.com
Industrionage Enterprise Security: October 2009
http://industrionage.blogspot.com/2009_10_01_archive.html
Friday, October 30, 2009. An older article but never the less timely: China’s cyber army is preparing to march on America, says Pentagon. September 8, 2007. China ‘tops list’ of cyber-hackers. Chinese military hackers have prepared a detailed plan to disable America’s aircraft battle carrier fleet with a devastating cyber attack, according to a Pentagon report obtained by The Times. The plan to cripple the US aircraft carrier battle groups was authored by two PLA air force officials, Sun Yiming and Yang ...
SOCIAL ENGAGEMENT