Quantcast
Browsing all 90 articles
Browse latest View live

Triton Malware Threatens Lives & The Net Neutrality Repeal – A History –...

A history of ISP regulations, new malware is infecting industrial control systems, and three men plead guilty in the Mirai botnet case. All that coming up now on ThreatWire. ——————————- Shop:...

View Article


Hak5 2315 – 3D Printer Filaments Explained

Join Shannon Morse and David Randolph to discuss 3D printer filaments and how to shop for the best ones. Special thanks to David from https://printedsolid.com/ for guest hosting this episode!...

View Article


TekThing 156 – Plantronics RIG 800LX Atmos Gaming Headset, Best Wire...

Plantronics RIG 800LX Atmos Gaming Headset, Best Wire Stripper, Recover Windows Password, MicroSD Card for Switch —– Porgs. There are Porgs On Our Set… Google’s brought AR stickers to the Pixel 2, and...

View Article

The Biggest Hacks of 2017 – ThreatWire

The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe:...

View Article

Hak5 2316 – The Hak5 Annual Blooper Reel!

Celebrate another year of craziness with us by checking out some of our favorite bloopers from 2017! Happy New Year and we’ll see ya next week! ——————————- Shop: http://www.hakshop.com Support:...

View Article


Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks. Source: Vulnerabilitys & Threats

View Article

TekThing 157 – Amazon Echo Spot Review, Best Gear of 2017, Can You Speed Up...

Best of 2017: TVs, Phones, Headphones, More. The Perfect Alarm Clock? Amazon Echo Spot Review. Two Fast VPNs Tested! —— 00:50 BEST OF 2017!!! What were the products that really stood out in 2017???...

View Article

Snowden’s New Security System; Browsing Tracked By Login Forms – ThreatWire

Your browsing data could be tracked by login forms, Forever21 got hacked, and Snowden released his very own mobile security system. All that coming up now on ThreatWire. ——————————- Shop:...

View Article


GAV Outage for 11.10.5 and earlier software versions

AV Signatures in 11.x releases With the release of 12.0, WatchGuard introduced a new GAV engine to take advantage of new AV industry technology and would discontinue support for older AVG engines in...

View Article


WTB: macOS Exploit Published on the Last Day of 2017

The intelligence in this week’s iteration discuss the following threats: Data leak, Information stealing malware, Malspam, Misconfigured Database, Phishing, RAT, Vulnerabilities, and Zero-day. The IOCs...

View Article

Hak5 2317 – [[ PAYLOAD ]] – The Situation Response Payload

——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat...

View Article

What is Strategic Threat Intelligence?

This is the second blog in a series called, “What is Threat Intelligence?”  The first blog in the series can be found here.  Stay tuned for future installments in this series. Maintaining a strong...

View Article

The Nightmare Before Christmas: Security Flaws Inside our Computers

How an Intel design decision with no review by industry security consultants led to one of the biggest vulnerabilities in recent history. Source: Vulnerabilitys & Threats

View Article


Image may be NSFW.
Clik here to view.

Five Brilliant Innovations from CES for the Smart and Connected Home

At CES 2018, the smart home is leveling up. It’s no longer enough to simply connect more devices. Those connections must be fast, reliable and secure. Personal assistants are growing in popularity,...

View Article

Vulnerability Management: The Most Important Security Issue the CISO Doesn't Own

Information security and IT need to team up to make patch management more efficient and effective. Here’s how and why. Source: Vulnerabilitys & Threats

View Article


WTB: Malicious Document Targets Pyeonchang Olympics

The intelligence in this week’s iteration discuss the following threats: Banking trojan, Botnet, Credit card theft, Data breach, Hardcoded backdoor, Malicious applications, Phishing, and...

View Article

CISOs' Cyber War: How Did We Get Here?

We’re fighting the good fight — but, ultimately, losing the war. Source: Vulnerabilitys & Threats

View Article


'Back to Basics' Might Be Your Best Security Weapon

A company’s ability to successfully reduce risk starts with building a solid security foundation. Source: Vulnerabilitys & Threats

View Article

Hak5 2318 – [[ PAYLOAD ]] – Best Payload Practices

——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat...

View Article

Image may be NSFW.
Clik here to view.

The Rise of Malware Using Legitimate Services for Communications

Malware often includes the ability to communicate with attacker controlled systems on the Internet from within compromised networks. This gives the attacker several important capabilities. Some...

View Article
Browsing all 90 articles
Browse latest View live