I’ve Been Hacked – What To Do After You’ve Been Hacked
/
1 Comment
By Carter Graydon at Hacked.com
There’s nothing quite…
First it was Marriott, now Quora has been Hacked…
100 million Quora users may have had their data accessed by an unauthorized third party. Quora is actively investigating the incident, and has already taken steps to improve its security.
Marriott Data Breach and What You Need to Know
Marriott International said its Starwood guest reservation database was breached, exposing the personal info of about 500 million customers.
The SecurityOrb Show – An Interview with Dr. Elizabeth Milovidov, Esq. founder of DigitalParentingCoach.com. – 11/27/2018
I had the opportunity to speak with Dr. Elizabeth Milovidov, Esq. founder of DigitalParentingCoach.com about Internet Safety.
Listen to what Dr. Milovidov has to say here:
CVE-2018-15454 (Cisco SIP) Exploit Information
From October 2018, NCCIC analysts have observed network traffic indicating
attempts, by unknown actors against multiple government agencies, to exploit a
vulnerability [CVE-2018-15454] in the Session Initiation Protocol (SIP)
inspection engine of Cisco ASA Software and Cisco FTD Software.
Amazon AWS GuardDuty
Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following data sources: VPC Flow Logs, AWS CloudTrail event logs, and DNS logs.
Amazon AWS Inspector
Amazon Inspector is an automated security assessment service that helps you test the network accessibility of your Amazon EC2 instances and the security state of your applications running on those instances.
Using Docker To Install OpenVAS On CentOS
An interesting post from Gerry Williams at gerrywilliams.net
Description:
Saw…
OpenVAS image for Docker on Ubuntu
A Docker container for OpenVAS on Ubuntu. By default, the latest images includes the OpenVAS Base as well as the NVTs and Certs required to run OpenVAS
WP GDPR Compliance WordPress Plug-in Exploited
A WordPress plug-in known as the WP GDPR Compliance plug-in contains a dangerous privilege escalation vulnerability that attackers have been actively exploiting to compromise websites.