Triton Malware Threatens Lives & The Net Neutrality Repeal – A History –...
A history of ISP regulations, new malware is infecting industrial control systems, and three men plead guilty in the Mirai botnet case. All that coming up now on ThreatWire. ——————————- Shop:...
View ArticleHak5 2315 – 3D Printer Filaments Explained
Join Shannon Morse and David Randolph to discuss 3D printer filaments and how to shop for the best ones. Special thanks to David from https://printedsolid.com/ for guest hosting this episode!...
View ArticleTekThing 156 – Plantronics RIG 800LX Atmos Gaming Headset, Best Wire...
Plantronics RIG 800LX Atmos Gaming Headset, Best Wire Stripper, Recover Windows Password, MicroSD Card for Switch —– Porgs. There are Porgs On Our Set… Google’s brought AR stickers to the Pixel 2, and...
View ArticleThe Biggest Hacks of 2017 – ThreatWire
The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe:...
View ArticleHak5 2316 – The Hak5 Annual Blooper Reel!
Celebrate another year of craziness with us by checking out some of our favorite bloopers from 2017! Happy New Year and we’ll see ya next week! ——————————- Shop: http://www.hakshop.com Support:...
View ArticleAvoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation
Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks. Source: Vulnerabilitys & Threats
View ArticleTekThing 157 – Amazon Echo Spot Review, Best Gear of 2017, Can You Speed Up...
Best of 2017: TVs, Phones, Headphones, More. The Perfect Alarm Clock? Amazon Echo Spot Review. Two Fast VPNs Tested! —— 00:50 BEST OF 2017!!! What were the products that really stood out in 2017???...
View ArticleSnowden’s New Security System; Browsing Tracked By Login Forms – ThreatWire
Your browsing data could be tracked by login forms, Forever21 got hacked, and Snowden released his very own mobile security system. All that coming up now on ThreatWire. ——————————- Shop:...
View ArticleGAV Outage for 11.10.5 and earlier software versions
AV Signatures in 11.x releases With the release of 12.0, WatchGuard introduced a new GAV engine to take advantage of new AV industry technology and would discontinue support for older AVG engines in...
View ArticleWTB: macOS Exploit Published on the Last Day of 2017
The intelligence in this week’s iteration discuss the following threats: Data leak, Information stealing malware, Malspam, Misconfigured Database, Phishing, RAT, Vulnerabilities, and Zero-day. The IOCs...
View ArticleHak5 2317 – [[ PAYLOAD ]] – The Situation Response Payload
——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat...
View ArticleWhat is Strategic Threat Intelligence?
This is the second blog in a series called, “What is Threat Intelligence?” The first blog in the series can be found here. Stay tuned for future installments in this series. Maintaining a strong...
View ArticleThe Nightmare Before Christmas: Security Flaws Inside our Computers
How an Intel design decision with no review by industry security consultants led to one of the biggest vulnerabilities in recent history. Source: Vulnerabilitys & Threats
View ArticleFive Brilliant Innovations from CES for the Smart and Connected Home
At CES 2018, the smart home is leveling up. It’s no longer enough to simply connect more devices. Those connections must be fast, reliable and secure. Personal assistants are growing in popularity,...
View ArticleVulnerability Management: The Most Important Security Issue the CISO Doesn't Own
Information security and IT need to team up to make patch management more efficient and effective. Here’s how and why. Source: Vulnerabilitys & Threats
View ArticleWTB: Malicious Document Targets Pyeonchang Olympics
The intelligence in this week’s iteration discuss the following threats: Banking trojan, Botnet, Credit card theft, Data breach, Hardcoded backdoor, Malicious applications, Phishing, and...
View ArticleCISOs' Cyber War: How Did We Get Here?
We’re fighting the good fight — but, ultimately, losing the war. Source: Vulnerabilitys & Threats
View Article'Back to Basics' Might Be Your Best Security Weapon
A company’s ability to successfully reduce risk starts with building a solid security foundation. Source: Vulnerabilitys & Threats
View ArticleHak5 2318 – [[ PAYLOAD ]] – Best Payload Practices
——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat...
View ArticleThe Rise of Malware Using Legitimate Services for Communications
Malware often includes the ability to communicate with attacker controlled systems on the Internet from within compromised networks. This gives the attacker several important capabilities. Some...
View Article