Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cyber ThreatsFeatured

Capgemini Announces The Closing Of The Acquisition Of Leidos Cyber, The Commercial Cybersecurity Division Of Leidos.

Capgemini announced today, following the fulfillment of all regulatory requirements, the closing of the acquisition of Leidos Cyber, the commercial cybersecurity arm of the FORTUNE 500® companyLeidos, announced in June 2018. The team of almost 500 elite cybersecurity professionals, located mainly in North America, will join the Group to address its increasing client demand for cybersecurity services and solutions. “We are delighted to welcome the Leidos commercial cyber team to the Group. Not only will they be reinforcing our North America cybersecurity practice, their…

Cloud SecurityCyber Threats

Aquilai Launches Ajax Intelligence Phishing Solution.

Aquilai has launched their cloud based Ajax Intelligence solution to combat all forms of email phishing prevalent on Microsoft Exchange, Office 365 and G Suite emails. Shaped in collaboration with GCHQ and National Cyber Security Centre staff, Ajax Intelligence is the most effective solution against email phishing available on the market. The architecture is optimised and validated as being effective against current and evolving phishing threats that will continue to impact all types of business, from campaigns that trick employees into clicking a malicious…

Cyber ThreatsThreat Detection

New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats.

With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. It aggregates and evaluates disconnected data feeds to help identify what threats pose a danger to the organisation and ensure security teams focus on the right areas. The variety of threat intelligence sources available on…

Cyber Threats

ISC)² Invests In The Professional Development Of Global Cybersecurity Workforce.

(ISC)² – the world’s largest non-profit membership association of certified cybersecurity professionals – today announced the founding of its Professional Development Institute (PDI) to combat one of the largest challenges facing the cybersecurity community today – a global shortage of skilled and trained professionals to defend organizations against the evolving onslaught of cyber threats. Provided as a free portfolio of course offerings to (ISC)2 members and associates, PDI will help enhance their skills and abilities by providing access to rich continuing professional education (CPE)…

Cyber Threats

CylancePROTECT Now Available On AWS Marketplace.

Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today announced the availability of its award-winning endpoint protection offering, CylancePROTECT® on AWS Marketplace. Cylance has built the largest AI platform in the industry, enabling it to offer a portfolio of solutions ranging from enterprise endpoint protection, detection, and response, to Smartantivirus for consumers, to OEM solutions. Under the new agreement with AWS, marketplace customers now have access to CylancePROTECT for advanced AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.…

EraserNEW TOOLSSecure DeleteSecure EraseSecure Erase Files

Eraser – Secure Erase Files from Hard Drives on Windows

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7, 8, 10 and Windows Server 2012.Why Use Eraser?Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records,…

Collection of Security AssessmentsDATANEW TOOLSSecListsSecurity Assessments

SecLists – A Collection Of Multiple Types Of Lists Used During Security Assessments, Collected In One Place (Usernames, Passwords, URLs, Sensitive Data Patterns, Fuzzing Payloads, Web Shells, And Many More)

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.This project is maintained by Daniel Miessler, Jason Haddix, and g0tmi1k.InstallZipwget -c -O \ && unzip…

Cyber BitesCyber Threats

Mozilla Firefox 67 to Warn About Breached Sites.

Firefox Monitor is a Mozilla service that has partnered with Have I been Pwned to alert users when their email address has been discovered in a data breach. In the past, Firefox Monitor was a standalone service, but starting in Firefox 67 it will now be included as an extension. As part of a test in November 2018, Mozilla started displaying notifications to Firefox users when they visited a site that historically has had a data breach. You can see an example of one of these breach notifications below.…

Cyber BitesCyber Threats

Hackers ‘scramble’ patient files in Melbourne.

Federal agencies investigating breach, reported to be a ransom demand. Hackers have “scrambled” patient files at a Melbourne heart specialist clinic in what was reportedly a ransom attempt. The Australian Cyber Security Centre has confirmed it’s providing advice and assistance to the Melbourne Heart Group, which leases practice space from the Cabrini hospital in Malvern. “As the matter is ongoing, it is not appropriate to comment further,” a spokesman from the centre said. The Australian federal police is also involved in a joint investigation.…