574 Added | 1 Magazine | 4 Likes | 2 Following | 317 Followers | @brusaz | Keep up with brusaz on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “brusaz”

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to …

YARA Rules for Finding and Analyzing in InfoSec

Introduction<p>If you work in security anywhere, you do a lot searching, analyzing, and alerting. It’s the underpinning for almost any keyword you can …

Information Security

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as <i>The Matrix Reloaded</i> and <i>Live</i> …

Install Free SSL from Let’s Encrypt with Apache on Ubuntu

In this tutorial, we will setup HTTPS with Apache on Ubuntu server and generate free SSL certificate from <b>Let’s Encrypt</b>. It is a free certificate …

(Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild

Another reason to uninstall Adobe Flash Player—a new zero-day Flash Player exploit has reportedly been spotted in the wild by North Korean hackers. …


63 games and apps on Google Play served porn ads

If you still haven't made it a habit to inspect Google Play applications before installing them, then maybe this will make you rethink your ways. Security firm Check Point has discovered a new malicious code hiding inside 63 games and apps on Google Play -- a malicious code the company dubbed …


Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign

<b>Final update</b> Speed hits loom, other OSes need fixesA fundamental design flaw in Intel's processor chips has forced a significant redesign of the …

Information Security

A Safe Haven: Snowden’s New App Turns Your Phone Into Portable Security System

Announced on December 22nd, app basically works like this: install the Haven app on your telephone, and then put the phone anywhere you feel is in …

Top 10

Download the free AWS Security Best Practices eBook to learn how to protect your AWS infrastructure from attacks.

Security Cheat Sheet<p>AWS Security Best Practices<p>You use AWS. It’s secure out of the box, but introducing security issues through misconfiguration is …

Ad Blocking

Using Burp Suite’s Collaborator to Find the True IP Address for a .Onion Hidden Service

On this Thanksgiving day I’m going to write about something near and dear to all our hearts: stuffing. I’m not talking about the delicious pile of …

Information Security
Information Security
Information Security

Ichidan Search Engine Is a Popular Tool for Dark Web Surfers

<b>The Ichidan Dark Web search engine which can be found on the Dark Web is becoming and more popular as users of all types flock to it. The site has</b> …


Are Your Devices Compromised by the CIA?

For the 2nd WL Research Challenge, we have extracted over 400 companies, products, and terms mentioned in the Vault 7 docs. However, these words were …

The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor

Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of …

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to …

Information Security

Two-factor security is so broken, now hackers can drain bank accounts

Criminals have exploited a known flaw in how calls and text messages travel around the world to redirect a two-factor code for a person's bank …


Tor Browser 7.0 works harder to protect your anonymity on its own

The latest update for privacy-minded folks' favorite way to surf the web should make others' attempts at tracking what they do even more difficult. The Tor browser's 7. 0 version introduces a sandbox feature that, according to an interview on the Tor blog, should "make life a lot harder" for people …


Shadow Brokers Response Team

Join Shadow Brokers Response Team on Patreon for exclusive content and patron-only benefits from your favorite creators. Get access today!

Anti-DDoS Solution Based on iptables: nShield

An Easy and Simple Anti-DDoS solution for<br>VPS, Dedicated Servers and IoT devices based on iptables<p>Requirements<p>Linux System with python, iptables<br>• Nginx …