Member News
New! (ISC)² Skill-Builders
Stay in front of the hottest topics and trends in cybersecurity and earn CPE credits on demand with (ISC)² Skill-Builders.
GitTech (Use Caution)
GitHub - m3f157O/combine_harvester: Rust in-memory dumper
Check your windows local security authority credential's safety with this awesome tool.
GitHub - Anof-cyber/Pentest-Mapper: A Burp Suite Extension for Application Penetration Testing to map flows, write test cases and track vulnerabilities
A Burp Suite Extension for Application Penetration Testing to map flows, write test cases and track vulnerabilities - GitHub - Anof-cyber/Pentest-Mapper: A Burp Suite Extension for Application Pen...
Cyber News
Kevin Mitnick Obituary - Las Vegas, NV
Celebrate the life of Kevin Mitnick, leave a kind word or memory and get funeral service information care of King David Memorial Chapel & Cemetery.
The Key to Identify PsExec - AboutDFIR - The Definitive Compendium Project
In one way or another, PsExec – a wildly popular remote administration tool in the Microsoft SysInternals Suite – peeks its head in the wild. Threat actors tend to leverage PsExec for various reasons, such as executing commands or programs on a remote host in a victim’s environment, or for more nefarious reasons, such as deploying ransomware. The focus of this blog is to bring attention to a relatively new method of identifying the source host from which PsExec was executed fro..
Microsoft: Hackers turn Exchange servers into malware control centers
Microsoft and the Ukraine CERT warn of new attacks by the Russian state-sponsored Turla hacking group, targeting the defense industry and Microsoft Exchange servers with a new 'DeliveryCheck' malware backdoor.
Google’s new security pilot program will ban employee Internet access | Ars Technica
The Internet is dangerous, so what if you just didn't use it? That's the somewhat ironic recommendation Google, one of the world's largest Internet companies, is making to its employees.
Firefox's protection against fingerprinting | Firefox Help
Like other browsers, Firefox’s functionality is influenced by your operating system, hardware, graphics cards, additional software, and even the fonts you install. Some website technologies, like HTML5 Canvas, can even uniquely identify you based on how your computer draws images
Typo leaks millions of US military emails to Mali web operator | Ars Technica
Spelling error misdirected sensitive Pentagon messages to company running Mali’s TLD.
Microsoft backtracks: Premium security logging is now free | SC Media
Standard license holders will get access to more than 30 types of logging previously available to higher paying customers, and all logs will be stored for twice as long, 180 days, by default.