Defcon talk: Hacking Inter-VM Instance data
The talk on pdf form at Defcon media servers: Inter-VM data exfiltration – The art of cache timing covert channel on x86 multi-core By Etienne Martineau a kernel developer. So…
Defend Your Systems
Discussion of public breaches of security
The talk on pdf form at Defcon media servers: Inter-VM data exfiltration – The art of cache timing covert channel on x86 multi-core By Etienne Martineau a kernel developer. So…
Patch Tuesday August ( 8/11/2015) Here is Microsoft patch Tuesday August 2015 edition https://technet.microsoft.com/en-us/library/security/ms15-aug.aspx How can I say that unpatched computers will get hacked? Any Metasploit pentester will tell you…
Bart Kulach has a pdf from this year’s Defcon23 “Hack the Legacy! IBMi (aka AS/400) revealed” He recommends to check the website he set up http://www.hackthelegacy.org/ The items he has…
SIEM Security Information Event Management Gartner Magic Quadrant image from http://www.gartner.com/technology/reprints.do?id=1-2J31FF4&ct=150706&st=sb Gartner What is it that we need? To protect our systems and perform functions? Good information from all of…
Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash…