Content curation / Veille informationnelle


Le blog de MISC 100% sécurité informatique

  • Opération frais de port offerts !
    par Aline Hof le 29 mai 2019 à 14 h 29 min

    Bonne nouvelle : les frais de ports sont offerts sur notre boutique pour tous nos magazines actuellement en kiosque, l’occasion d’en profiter pour agrandir votre collection de numéros standards et hors-séries ! Rendez-vous sans plus tarder sur https://boutique.ed-diamond.com/en-kiosque pour en bénéficier ! L’offre est valable pour toutes les livraisons en France métropolitaine et s’applique une fois […]

  • EDR : Endpoint Detection & Response
    par redaction le 23 mai 2019 à 7 h 30 min

      La protection des points de terminaisons des infrastructures (stations, serveurs, mobiles, etc.) devient un axe majeur de la cybersécurité, où le traditionnel antivirus pourra difficilement lutter seul : quand les agents EDR entrent dans la danse pour lutter efficacement contre les menaces techniques du moment… Au sommaire de l’article 1 À propos des EDR […]

  • Android & TEE
    par redaction le 16 mai 2019 à 7 h 30 min

      Saviez-vous que votre Android n’est pas le seul OS dans votre smartphone ? À côté et bien caché s’exécute un environnement dédié à la sécurité plus communément appelé TEE. Partons à l’aventure et découvrons ce petit monde qui discrètement vous protège. Au sommaire de l’article 1 Introduction à la technologie ARM TrustZone 1.1 Une séparation […]


    Feed has no items.

Hacking Articles Raj Chandel's Blog

  • Hack the Box: Help Walkthrough
    par Raj Chandel le 23 juin 2019 à 14 h 28 min

    Help is a recently retired CTF challenge VM on Hack the Box and the objective remains the same– Capture the root flag. Hack the Box offers a wide range of VMs for practice from beginner to advanced level and it is great for penetration testers and researchers. Level: Intermediate Task: To find user.txt and root.txt... Continue reading → The post Hack the Box: Help Walkthrough appeared first on Hacking Articles. […]

  • Linux for Pentester: Time Privilege Escalation
    par Raj Chandel le 20 juin 2019 à 14 h 51 min

    In this article, we’ll talk about Time command which is a Linux utility and learn how helpful the time command is for Linux penetration testing and how we’ll progress time to scale the greater privilege shell. Table of Contents All About Linux Time Command Major Operation Perform by Time Abusing Time Utility SUID Lab Setups... Continue reading → The post Linux for Pentester: Time Privilege Escalation appeared first on Hacking Articles. […]

  • Beginner’s Guide to Nexpose
    par Raj Chandel le 19 juin 2019 à 15 h 56 min

    In this article, we’ll learn about Nexpose, which is used to scan a vulnerability network. There are various vulnerability scanners but the part that keeps it special is its smooth user interface and robust reporting options it offers, from the most common to the advance. Table of Content Introduction to Nexpose Nexpose Virtual Appliance Installation... Continue reading → The post Beginner’s Guide to Nexpose appeared first on Hacking Articles. […]


RSS - Actualité CNIL.fr Fil RSS des actualités de la Commission Nationale de L'Informatique et des Libertés (CNIL)


Internet Society Working for an Internet that is open, globally connected, and secure.

  • The Internet Is Your Oyster: MANRS at International Telecoms Week
    par Ryan Polk le 24 juin 2019 à 14 h 07 min

    What do oysters, clams, and mussels have in common with network operators? Hint: it’s not just that they are both in Atlanta this week, either in exhibits in the Georgia Aquarium or for the 2019 International Telecoms Week. It’s that both bivalves and network operators play an incredibly important role for their ecosystems: they filter […] The post The Internet Is Your Oyster: MANRS at International Telecoms Week appeared first on Internet Society. […]

  • The Week in Internet News: AI and IoT Could Lead to Industry 4.0
    par Grant Gross le 24 juin 2019 à 13 h 23 min

    The new revolution: Advances in the Internet of Things and Artificial Intelligence are leading to a fourth industrial revolution, Ars Technica suggests. This so-called Industry 4.0 represents “huge changes in much of the technology we deal with in our daily lives. Some of those changes have been for the better, making our interaction with machines […] The post The Week in Internet News: AI and IoT Could Lead to Industry 4.0 appeared first on Internet Society. […]

  • Applications for 2019 Chapterthon Now Open
    par Ilda Simao le 19 juin 2019 à 18 h 19 min

    We’re happy to announce that the call for applications for the 2019 Chapterthon is now open. Our world is more digitally connected than ever before, yet barriers still remain for the half of the world’s population who are unconnected. For 2019, Chapterthon projects will help with Connecting the Unconnected. The Internet is for everyone and […] The post Applications for 2019 Chapterthon Now Open appeared first on Internet Society. […]


Security.NL maakt Nederland veilig Security.NL maakt Nederland veilig


Naked Security Computer Security News, Advice and Research


Security Weekly Security Market Validation

  • Osquery, Netflix, & Mozilla – Application Security Weekly #66
    par Security Weekly Productions le 24 juin 2019 à 20 h 00 min

        Mozilla pushes a patch onto an Array, Netflix shares a stream of patches, Breach to bankruptcy for healthcare company, Osquery becomes a foundational tool, Avoiding DevOps dangers, and Assigning DevOps directions! News Bugs, Breaches, and More! Mozilla pushes a patch onto an Array Netflix shares a stream of patches. Check out Redhat’s explanation as well. […] The post Osquery, Netflix, & Mozilla – Application Security Weekly #66 appeared first on Security Weekly. […]

  • Don’t Ignore APIs – Application Security Weekly #66
    par Security Weekly Productions le 24 juin 2019 à 19 h 54 min

        API are now over 80% of the HTTP traffic and enterprise application breaches through compromised APIs are mounting!. A guide to API Security. They also discuss Public VS Private APIs and if the best practice should be segregation of the two. Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements Register for […] The post Don’t Ignore APIs – Application Security Weekly #66 appeared first on Security Weekly. […]

  • AttackDefense Labs Platform – Paul’s Security Weekly #609
    par Security Weekly Productions le 21 juin 2019 à 14 h 33 min

    We interview Vivek Ramachandran, who is the Founder & CEO of Pentester Academy. Pentester Academy, our AttackDefense Labs platform and other topics. Vivek will show a demo of their AttackDefense labs. We also have a free community security for your users to try out without requiring a subscription or credit card. Full Show NotesFollow us […] The post AttackDefense Labs Platform – Paul’s Security Weekly #609 appeared first on Security Weekly. […]


Liquidmatrix Security Digest Bringing Fire To The Village: Your Source For Computer, Network & Information Security News

  • Having The Security Rug Pulled Out From Under You
    par Larry Cashdollar le 18 octobre 2018 à 19 h 24 min

    Apache .htaccess changes led to arbitrary file upload vulnerabilities in jQuery project I attended the Messaging, Malware and Mobile Anti-Abuse Working Group (m3aawg.org) meeting in Brooklyn, NY.   I expected better weather to wander around the city while enjoying the conference and the neighborhood’s wide selection of food. I had been so confident of clear skies […] The post Having The Security Rug Pulled Out From Under You appeared first on Liquidmatrix Security Digest. […]

  • Long Term Security Attitudes and Practices Study
    par Ben Sapiro le 29 septembre 2018 à 23 h 27 min

    What makes security practitioners tick? That’s a simple question with a lot of drivers underneath it. We want to find out; please help us by signing up for our study. The Ask We’re launching a long term study of security practitioners to understand how they approach security, please sign up for our Long Term Security Attitudes […] The post Long Term Security Attitudes and Practices Study appeared first on Liquidmatrix Security Digest. […]

  • Fortnite: When Dollars and Cents Trumps Security!
    par Thomas Fischer le 16 août 2018 à 14 h 47 min

    When Epic Games recently announced and subsequently released Fortnite for Android, it took the decision to bypass the Play Store and ask users to side-load the app. After I read that Epic Games’ brilliant idea was to ask Android users to essentially downgrade the security on their devices, there was a lot of head-on-desk action. […] The post Fortnite: When Dollars and Cents Trumps Security! appeared first on Liquidmatrix Security Digest. […]


IT Security Guru The Site for our Community

  • Mobile Devices’ Munic OBD-II Dongles Powers AutoSense Connected Car Solution.
    par The Gurus le 24 juin 2019 à 10 h 32 min

    Mobile Devices Ing. (Munic.io) today announced that autoSense Ltd., a subsidiary of Swisscom (Switzerland) Ltd. and AMAG Group Ltd., will use its Munic OBD-II Dongles and Edge Computing Platform to power its connected car offering. autoSense’s connected car offering providesa complete set of driver centric applications, such as a Digital Logbook, Driving Behaviour, Car Localisation, […] The post Mobile Devices’ Munic OBD-II Dongles Powers AutoSense Connected Car Solution. appeared first on IT Security Guru. […]

  • NTT Security Launches Women In Cybersecurity Awards In Europe.
    par The Gurus le 24 juin 2019 à 10 h 31 min

    NTT Security, the specialised security company and centre of excellence in security for NTT Group, has launched its inaugural Women in Cybersecurity Awards as part of an initiative to recognise and inspire talented female professionals and newcomers in the cybersecurity industry. The new awards, developed in partnership with Global Digital Women (GDW), will recognise the […] The post NTT Security Launches Women In Cybersecurity Awards In Europe. appeared first on IT Security Guru. […]

  • How To Block DDoS Attacks Using Automation.
    par The Gurus le 24 juin 2019 à 10 h 31 min

    By Adrian Taylor, Regional Vice President at A10 Networks DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. In this article, we’ll explore the five ways, listed below, that automation can significantly improve response times during a DDoS attack, while assessing the means to […] The post How To Block DDoS Attacks Using Automation. appeared first on IT Security Guru. […]


    Feed has no items.

    Feed has no items.

    Feed has no items.

CERT-FR Centre gouvernemental de veille, d'alerte et de réponse aux attaques informatiques