Académique Documents
Professionnel Documents
Culture Documents
Summary
Symantec ThreatCon Low: Basic network posture
This condition applies when there is no discernible network incident activity and no malicious
code activity with a moderate or severe risk rating. Under these conditions, only a routine
security posture, designed to defeat normal network threats, is warranted. Automated systems
and alerting mechanisms should be used.
Interesting News
* Threat landscape for smart buildings
We decided to study the live threats to building-based automation systems and to see what malware their owners
encountered in the first six months of 2019.
* * The Cyber Intelligence Report has a brand new look and the 2019 Quarter 4 issue will be released the begining October.
There are some great walkthroughs inside you shouldn't miss. We have an active Facebook group that discusses topics
ranging from computer forensics to ethical hacking and more. Join the Cyber Secrets Facebook group here. If you would
like to receive the CIR updates by email, Subscribe at: CIR@informationwarfarecenter.com
Index of Sections
Current News
* Packet Storm Security
* Krebs on Security
* Dark Reading
* The Hacker News
* Security Week
* Infosecurity Magazine
* Naked Security
* Quick Heal - Security Simplified
* Threat Post
Advisories
* US-Cert (Current Activity-Alerts-Bulletins)
* Symantec's Latest List
* Packet Storm Security's Latest List
Credits
Packet Storm Security
* How Google Changed The Secretive Market For The Most Dangerous Hacks In The World
* 200K Sign Petition Against Equifax Data Breach Settlement
* Facebook Suspends Tens Of Thousands Of Apps Over Privacy Issues
* Forcepoint VPN For Windows Patches Privilege Escalation Vuln
* New North Korean Malware Targeting ATMs Spotted In India
* WeWork Unsecured WiFi Exposes Documents
* Thinkful Confirms Breach
* Payment Card Thieves Hack Click2Gov Bill Paying Portals In 8 Cities
* Hotel Booking Sites Come Under Fire From Magecart
* Advanced Hackers Are Infecting IT Providers To Get At Customers
* Iowa Officials Claim Confusion Over Scope In Pen-Test Arrest
* Smart TVs, Subscription Services Leak Data To Facebook, Google
* Hotel Websites Infected With Skimmer Via Supply Chain Attack
* Medical Records For 24.3 Million Left Exposed
* New Algorithms Aim To Stamp Out Abuse On Twitter
* Poor Protocol Design For IoT Devices Fueling DDoS
* Novaestrat Exec Arrested After Ecuadorian Data Leak
* Alleged JPMorgan Hacker Set To Plead Guilty
* The Air Force Will Let Hackers Try To Hijack An Orbiting Satellite
* Gootkit Crew Left Database Exposed Without A Password
* Attackers Pose As Business Executives To Secure Security Certificates
* Personal Data From Entire 16.6M Population Of Ecuador Leaked Online
* Uber Confirms Account Takeover Vulnerability
* iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts
* 198M Records Of Prospective Auto Buyers Leaked
Krebs on Security
* Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme
* Update Google Chrome Browser to Patch New Critical Security Flaws
* IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador's History
* Smominru Botnet Indiscriminately Hacked Over 90,000 Computers Just Last Month
* The Definitive RFP Templates for EDR/EPP and APT Protection
* Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions
* United States Sues Edward Snowden and You'd be Surprised to Know Why
* Thousands of Google Calendars Possibly Leaking Private Information Online
* 125 New Flaws Found in Routers and NAS Devices from Popular Brands
* WhatsApp 'Delete for Everyone' Doesn't Delete Media Files Sent to iPhone Users
* How Cloud-Based Automation Can Keep Business Operations Secure
* US Sanctions 3 North Korean Hacking Groups Accused for Global Cyber Attacks
* Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug
* New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
* WebARX — A Defensive Core For Your Website
Security Week
Infosecurity Magazine
Threat Post
* http://sec40.go.th/counter.txt
* https://maketi.gov.to/007.html
* http://sayoang.polmankab.go.id/vz.htm
* http://paopao.polmankab.go.id/vz.htm
* http://lapeo.polmankab.go.id/vz.htm
* http://sambaliwali.polmankab.go.id/vz.htm
* http://panyampa.polmankab.go.id/vz.htm
* http://kesbangpol.polmankab.go.id/vz.htm
* http://sidorejo.polmankab.go.id/vz.htm
* http://ugibaru.polmankab.go.id/vz.htm
* http://kenje.polmankab.go.id/vz.htm
* http://sumberjo.polmankab.go.id/vz.htm
* http://galunglombok.polmankab.go.id/vz.htm
* http://petoosang.polmankab.go.id/vz.htm
* http://alu.polmankab.go.id/vz.htm
* http://saragian.polmankab.go.id/vz.htm
* http://mombi.polmankab.go.id/vz.htm
* http://bonnebonne.polmankab.go.id/vz.htm
* http://anreapi.polmankab.go.id/vz.htm
* http://kalumammang.polmankab.go.id/vz.htm
Tools & Techniques
Packet Storm Security Tools Links
GBHackers Analysis