PRINT
PRINT
SEND MAIL
SEND MAIL

Category: EDITOR’S NEWS

TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Cyber ThreatsEDITOR’S NEWS

As Christmas approaches, 20% of Brits reveal they have been duped by scam emails from ‘trusted’ brands

DomainTools, a leader in domain name and DNS-based cyber threat intelligence, recently announced the results of a survey of 1,000 UK consumers, which revealed that 20% of British consumers have been caught out by phishing emails pretending to be from a trusted, legitimate brand, but which in reality are used for malicious purposes such as the theft of PII or the installation of malware on a network. Concerningly, a further 16% of respondents to the survey were unsure whether they had clicked on a…

Cyber ThreatsEDITOR’S NEWS

Immersive Labs and IASME enable cyber careers for neurodivergent individuals in the UK

Immersive Labs has today announced early success of its Neurodivergent Digital Cyber Academy (NDCA), an initiative that’s been funded by the Cyber Skills Immediate Impact Fund from the Department of Digital, Culture, Media & Sport. Through the NDCA, IASME – a leading Cyber Essentials accreditation body – has been able to find and nurture the cyber talent of 13 neurodivergent individuals to employ in its own community Security Operations Centre (SOC). IASME CEO Dr Emma Philpott, who also runs the UK Cyber Security Forum,…

Cyber ThreatsEDITOR’S NEWS

Researchers at Tenable discover a serious vulnerability in Zoom Conferencing

Yesterday, cybersecurity company Tenable announced that its research team has discovered a serious vulnerability in Zoom’s Desktop Conferencing Application [CVE-2018-15715] that would allow a remote attacker or rogue meeting attendee to hijack screen controls, impersonate meeting attendees via chat messages and kick attendees out of meetings. The flaw exposes up to 750,000 companies around the world that use Zoom to conduct day-to-day business. A cyber criminal could leverage the vulnerability to: Hijack screen control: Bypass screen control permissions during remote attendee screen share to…

Cyber ThreatsEDITOR’S NEWS

40% of British consumers grab a Cyber Monday bargain, but half of them are happy to shop with a previously breached company

DomainTools, a leader in domain name and DNS-based cyber threat intelligence, today announced the results of a survey of 1,000 UK consumers, which revealed that 40% respondents planned to utilise the big-name discounts available on Black Friday and Cyber Monday. More concerningly, half (50%) of these respondents were happy to shop with retailers that had been breached in the past. Cyber Monday is set to be one of the biggest shopping days of the year for UK retailers, hoping to emulate the success of…

Cyber ThreatsEDITOR’S NEWS

83 percent of UK consumers unsure of fintech, according to wide-ranging survey

More than eight out of ten people in Britain (83 percent) are ‘unsure’ of fintech, according to a survey of 2,000 UK consumers commissioned by TopLine Comms. Fintech companies leverage technology to offer financial services. Despite the fintech sector in the UK thriving, attracting more fintech investment than China and the US in H1 2018, the research shows UK consumers are still wary of new finance companies, and feel more comfortable using the services of traditional banks. Just under two thirds (61 percent) said…

Cyber ThreatsEDITOR’S NEWS

Alert Logic announces new Partner Connect Program

Alert Logic, the leading provider of Security-as-a-Service solutions, this week launched the Alert Logic® Partner Connect Program, empowering partners to offer market-leading security solutions that enhance their existing offerings. The new program enables partners to accelerate revenue while increasing the value they offer to their customers, especially resource-constrained buyers and mid-market organisations that must secure cloud, hybrid and on-premises environments. The program also helps end users obtain the comprehensive security services and expertise they need from the channel community that already serves them. Many…

Cyber ThreatsEDITOR’S NEWS

BSIMM9 Study Highlights Impact of Cloud Transformation and Growth of Software Security Community

Earlier this month, Synopsys released BSIMM9, the latest version of the Building Security In Maturity Model (BSIMM) designed to help organisations plan, execute, and measure their software security initiatives (SSIs). The ninth iteration of BSIMM reflects data collected over a 10-year study of real-world SSIs across 120 firms. BSIMM9 highlights the impact of cloud transformation, the emergence of a new vertical industry—retail—represented in the data pool, and the growth of the software security community. “Development, security, and operations teams need to align, and BSIMM9 provides…

Cyber ThreatsEDITOR’S NEWS

Janrain Survey Shows Consumers Still Trust Brands but Want More Control over Data

Janrain®, the company that pioneered the Customer Identity and Access Management (CIAM) category, today announced during Cybersecurity Awareness Month the results of its latest Consumer Attitudes Toward Data Privacy and Security Survey, which show U.S. consumers still generally trust brands but welcome consent-based relationships following the recent spate of breaches and controversies affecting data privacy. Janrain surveyed over 1,000 U.S. consumers who demonstrated a surprising capacity for forgiveness and understanding, with nearly half of them willing to give brands a pass for data breaches…

Cyber ThreatsEDITOR’S NEWS

One Identity Global Survey Shows Organisations Continue to Struggle to Get Basic Identity and Access Management Best Practices Right, Potentially Exposing Them to Security Risks

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, today released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged access management (PAM) security disciplines — likely exposing organisations to data breaches and other significant security risks. Conducted by Dimensional Research, One Identity’s “Assessment of Identity and Access Management in 2018” study polled more than 1,000 IT security professionals from mid-size to large enterprises on their approaches,…