Security Vulnerabilities

/Security Vulnerabilities

Week 31 In Review – 2014

Resources REcon 2014 Videos – recon.cx REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here. RVAsec 2014 Videos – rvasec.com Miss a talk or even the entire conference? No problem! All of the speaker videos [...]

Week 30 In Review – 2014

Resources BSides Cleveland 2014 Videos – irongeek.com These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here. Dispelling Confusion and Myths: iOS Proof-of-Concept – zdziarski.com A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS [...]

Week 29 In Review – 2014

Resources BGA talk slides – twitter.com Marshall twitted his BGA talk slides on twitter. You can download the pdf from here. Building a Modern Security Engineering Organization – slideshare.net Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes. Car Hacker's [...]

Week 28 In Review – 2014

Resources Vendor Checklist app / Trust Metric app – archon.thewatchers.net ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented. Dumping Data from Memcached Servers – breenmachine.blogspot.com Memcached servers provide a dynamic, distributed [...]

Week 26 In Review – 2014

Black Hat USA Briefings Giveaway Enter to win an Black Hat USA 2014 Briefings ticket worth $2,2000 from Infosec Events Events Related Hack in Paris 2014 Wrap-Up Day #1 – blog.rootshell.be Hack in Paris, a French security conference held in Disneyland Resort Paris. The conference started with a sunny sky over the conference centre in the [...]

Week 25 In Review – 2014

Resources Circle City Con 2014 Videos – www.irongeek.com These are the Circle City Con 2014 videos. You can watch and download all of the recordings from here. OWASP Security Shepherd – owasp.org Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn [...]

Week 24 In Review – 2014

Resources CySCA2014-in-a-Box – cyberchallenge.com.au CySCA2014-in-a-Box is a Virtual Machine that contains most of the challenges faced by players during CySCA2014. It allows players to complete challenges in their own time, to learn and develop their cyber security skills. From a Username to Full Account Takeover – blog.spiderlabs.com Usernames, email addresses and phone numbers are invaluable pieces of [...]

Week 23 In Review – 2014

Resources CRITs-Collaborative Research Into Threats – crits.github.io Upload threat data and uncover critical information to keep your organization safe. Develop additional capabilities using the Services Framework to combine CRITs with third-party and home-grown intelligence systems. Heartbleed, Cupid and Wireless – sysvalue.com Since Luis Grangeia presentation on cupid had gotten quite a bit of attention, he felt it’s [...]

Week 22 In Review – 2014

Events Related HITB Amsterdam 2014 Wrap-up HITB Amsterdam 2014 Wrap-up Day #1 – blog.rootshell.be Xavier is in Amsterdam for attending at the new edition of Hack In The Box. This is a special edition with many improvements. HITB2014AMS – Day 1 – State of the ART: Exploring the New Android KitKat Runtime – www.corelan.be This is a [...]

Week 21 In Review – 2014

Resources BSides Nashville 2014 Videos – www.irongeek.com These are the videos of BSides Nashville 2014. You can download the videos from here. Powershell's Pastebin – pastebin.com Pastebin is #1 paste tool. Here is a list of Powershell's pastebin. 2014 Trustwave Global Security Report Available Now – blog.spiderlabs.com Trustwave released their annual 2014 Trustwave Global Security Report, an analysis [...]