deepinfosec.com
Open source Intel: Disturbing? Awesome? Or disturbingly awesome? – Deep InfoSec
http://deepinfosec.com/open-source-intel-disturbing-awesome-or-disturbingly-awesome
NIST Information Security Publications. Infosec analysis, served hot and fresh. Open source Intel: Disturbing? Open source Intel: Disturbing? August 1, 2014. There is apparently a name for the art of leveraging social media and free tools to uncover juicy bits of information on someone: open source intel or OSINT for short. Why would you want to do that? Well, the reality is that it doesn’t matter. Just as with everything humanity has ever done: somebody will do it, simply because somebody can. Looked up...
deepinfosec.com
What we learned from heartbleed and shellshock – Deep InfoSec
http://deepinfosec.com/what-we-learned-from-heartbleed-and-shellshock
NIST Information Security Publications. Infosec analysis, served hot and fresh. What we learned from heartbleed and shellshock. What we learned from heartbleed and shellshock. October 13, 2014. After having had to go through, and deal with, both heartbleed and shellshock from an operations security point of view, I’ve come to a few conclusions which I think others can benefit from. 1 This is going to get a lot worse before it gets better. What’s the next vulnerability? Who will discover it? The good guys...
deepinfosec.com
Truecrypt is…dead? Long live Truecrypt – Deep InfoSec
http://deepinfosec.com/truecrypt-is-dead-long-live-truecrypt
NIST Information Security Publications. Infosec analysis, served hot and fresh. May 29, 2014. The web is buzzing with news about the Truecrypt page on sourceforge. The page tells us:. WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues. The page then says that the project is closed following EOL for Windows XP. What gives? Particularly so soon after the first part of a massive audit of Truecrypt’s code revealed no evidence of anything malicious. One comment on the Sophos blog.
deepinfosec.com
Five types of vulnerabilities you should know (and their meaning) – Deep InfoSec
http://deepinfosec.com/five-types-of-vulnerabilities-you-should-know-and-their-meaning
NIST Information Security Publications. Infosec analysis, served hot and fresh. Five types of vulnerabilities you should know (and their meaning). Five types of vulnerabilities you should know (and their meaning). June 28, 2014. I love listening to the Sophos podcast. These guys a) know what they’re doing, and b) love what they’re doing. That’s a deadly combination! They had a podcast explaining. 1 Remote Code Execution (RCE). Comparison: Piggybacking or tailgaiting someone through the door. This vulnera...
deepinfosec.com
Deep InfoSec – Page 2 – Infosec analysis, served hot and fresh
http://deepinfosec.com/page/2
NIST Information Security Publications. Infosec analysis, served hot and fresh. May 29, 2014. The web is buzzing with news about the Truecrypt page on sourceforge. The page tells us: WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues The page […]. Adblock for your fridge? May 25, 2014. Compliance does NOT equal Security! April 14, 2014. Mimikatz: A nasty little piece of awesomeness. March 20, 2014. March 13, 2014. Woohoo, the site is up! Hi, my name is Ghaith Chukfeh.
deepinfosec.com
DIY home network security with NxFilter and Security Onion – Deep InfoSec
http://deepinfosec.com/diy-home-network-security-with-nxfilter-and-security-onion
NIST Information Security Publications. Infosec analysis, served hot and fresh. DIY home network security with NxFilter and Security Onion. DIY home network security with NxFilter and Security Onion. September 21, 2014. As the title suggests, I’m going to show you how to set up a DIY home NSM (network security monitoring) solution on the cheap (read: free). Software you will need:. Hardware you will need:. A Linux-based router (running Tomato. Once you have all the tools, proceed as follows. If you’...
deepinfosec.com
The pitfalls of hosting in the cloud – or the fall of codespaces.com – Deep InfoSec
http://deepinfosec.com/the-pitfalls-of-hosting-in-the-cloud-or-the-fall-of-codespaces-com
NIST Information Security Publications. Infosec analysis, served hot and fresh. The pitfalls of hosting in the cloud – or the fall of codespaces.com. The pitfalls of hosting in the cloud – or the fall of codespaces.com. June 19, 2014. I get into debates frequently about the pros and cons of hosting in the cloud vs having your own environment co-located in a datacentre. On Tuesday, Code Spaces. A code hosting provider) replaced their homepage with this:. A hacker put codespaces out of business after.
deepinfosec.com
ghaith – Deep InfoSec
http://deepinfosec.com/author/ghaith
NIST Information Security Publications. Infosec analysis, served hot and fresh. What I learned from the Ashley Madison breach. August 21, 2015. Unless you’ve been living under a rock for the last month or so, you have heard about the massive data breach that Ashley Madison suffered recently. Here’s how the story […]. You are responsible for the work you put out. February 7, 2015. Infosec predictions for 2015. December 30, 2014. What fun would it be to end 2014 without a bit of speculation? August 1, 2014.
tisiphone.net
hacking | Hacks4Pancakes' tisiphone.net
https://tisiphone.net/tag/hacking
Hacks4Pancakes' tisiphone.net. Lesley Carhart, Full Spectrum Cyber-Warrior Princess]. February 10, 2016. Starting an InfoSec Career The Megamix Chapter 6. You can find the previous chapters in this continuing blog series here:. Starting an InfoSec Career The Megamix Chapters 1-3. Starting an InfoSec Career The Megamix Chapters 4-5. Chapter 6: Self-Study Options. For the Visual Learner:. Years of talks at information security conferences have been recorded and are freely available on YouTube. I’d avoid wa...
securesenses.net
#SecureSenses --remediation, not coping: Podcasts
http://www.securesenses.net/p/podcasts.html
SecureSenses - remediation, not coping. Secure may refer to: Security, being protected against danger or loss(es). Senses are physiological capacities of organisms that provide data for perception. Security podcasts that help me to to keep up with what's going on in the security and technology sphere:. 8220;Pauldotcom Security Weekly” – http:/ pauldotcom.com/. Penetration testing, hacking ,security news. 8220;Risky Business” – http:/ risky.biz/. No need to comment. Security news, interviewes. A great pod...
SOCIAL ENGAGEMENT