Remove category advisory-boards
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. Disclosure: I’m on advisory boards for Continuum and Ntrepid. There’s some context from Aaron Small, who made the project happen.

189
189
article thumbnail

GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

The Last Watchdog

We’ve shared some helpful guidance on password security at Zigrin Security blog. Unauthorized access via default, shared, or stolen credentials constituted more than a third of the entire Hacking category and over half of all compromised records. He is also a member of the GIAC Advisory Board. .

Hacking 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HID Mercury Access Controller flaws could allow to unlock Doors

Security Affairs

By using the manufacturer’s built-in ports, we were able to manipulate on-board components and interact with the device.Combining both known and novel techniques, we were able to achieve root access to the device’s operating system and pull its firmware for emulation and vulnerability discovery.” ” reads the advisory.

article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

I did did some ones I got more into bug bounty and so these were things to do but that wasn't how I got into it, really most of what I did was just looking at different bug bounty programs across the board, seeing what I can find. The way I was hired, I still can work in a kind of hard time advisory capacity for DDS.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

I did did some ones I got more into bug bounty and so these were things to do but that wasn't how I got into it, really most of what I did was just looking at different bug bounty programs across the board, seeing what I can find. The way I was hired, I still can work in a kind of hard time advisory capacity for DDS.

Hacking 52