January, 2016

article thumbnail

Kali Linux 2016.1 Release - Rolling Edition

Kali Linux

Our First Release of Kali-Rolling (2016.1) Today marks an important milestone for us with the first public release of our Kali Linux rolling distribution. Kali switched to a rolling release model back when we hit version 2.0 (codename), however the rolling release was only available via an upgrade from 2.0 to kali-rolling for a select brave group. After 5 months of testing our rolling distribution (and its supporting infrastructure), we’re confident in its reliability - giving our users th

article thumbnail

How email in transit can be intercepted using dns hijacking

Elie

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack discussed in a previous post, it is equally effective at defeating email in-transit encryption.

DNS 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why I joined Digital Shadows

Digital Shadows

Departing Forrester Research wasn’t an easy decision; it was a great job. I was able to help guide the security. The post Why I joined Digital Shadows first appeared on Digital Shadows.

40
article thumbnail

Vulnerability Management Myths

NopSec

Automation Strikes Back! There are tons of technologies out there that are trying to “AUTOMATE” every aspect of human life. For the most part, people are open to the change because it makes their lives easier and overall more efficient. So why are so many security operation teams failing to adopt automation when it comes to vulnerability management?

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device

Elie

This post summarizes which equipement the FBI use to seize the content of servers and laptops despite many of them use full disk encryption and which defenses exist.

article thumbnail

Digital Shadows honored as Bloomberg Business Top Innovator

Digital Shadows

We’re pleased to announce that Bloomberg Business has named Digital Shadows as one of the top breakthrough and disruptive businesses. The post Digital Shadows honored as Bloomberg Business Top Innovator first appeared on Digital Shadows.

40

More Trending

article thumbnail

Criminal services – Bulletproof hosting

Digital Shadows

Cybercrime can be a lucrative business if you do it well. But how do criminals ensure the success of their. The post Criminal services – Bulletproof hosting first appeared on Digital Shadows.

article thumbnail

Digital Shadows Welcomes Rick Holland as Vice President of Strategy

Digital Shadows

Last year was an exciting time for Digital Shadows; we opened our new co-headquarters in San Francisco, achieved over 400%. The post Digital Shadows Welcomes Rick Holland as Vice President of Strategy first appeared on Digital Shadows.

40
article thumbnail

The Strategic Corporal and Information Security

Digital Shadows

For those unfamiliar with the term “strategic corporal”, it sprung out of the conflicts in Afghanistan and Iraq. The concept. The post The Strategic Corporal and Information Security first appeared on Digital Shadows.

article thumbnail

DD4BC Arrests: What Now for Extortion?

Digital Shadows

Earlier this week, Europol published a press release stating that an individual suspected of being a “key member” of the. The post DD4BC Arrests: What Now for Extortion? first appeared on Digital Shadows.

DDOS 40
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

A Complex Threat Landscape

Digital Shadows

Achieving a better understanding of the threat landscape is key for organizations; the better they know their enemies, the better. The post A Complex Threat Landscape first appeared on Digital Shadows.

article thumbnail

RATs: Invasion of Your Privacy

Digital Shadows

When most people hear the word “RAT” they envision a large rodent that dines in dumpsters while seeking solace in. The post RATs: Invasion of Your Privacy first appeared on Digital Shadows.

article thumbnail

Digital Currency and Getting Paid In The Underground

Digital Shadows

It’s been said that money makes the world go round. People expect to be paid for their time, goods, and. The post Digital Currency and Getting Paid In The Underground first appeared on Digital Shadows.

article thumbnail

Lots to learn? Academia and intelligence

Digital Shadows

With the ongoing emergence of CTI you could be forgiven for thinking that the discipline of intelligence was new. But. The post Lots to learn? Academia and intelligence first appeared on Digital Shadows.

40
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.