network-midlands.co.uk – Penetration testing (also known as pen testing or ethical/white hat hacking) is where your website, computer network or wireless network is tested to find vulnerabilities that could be exploited by a… Tweeted by @networkmidlands https://twitter.com/networkmidlands/status/1287131812607791106
Hackers leak 7m Dave.com accounts; 17m Couchsurfing accounts for sale
hackread.com – Thousands of tourists every year travel globally with a lot of them actually residing for free. This happens thanks to a platform named Couchsurfing.com which allows travelers to connect with natives… Tweeted by @HackRead https://twitter.com/HackRead/status/1287081886288883720
Business as Unusual? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2020
complexdiscovery.com – Editor’s Note: The results of the recent Summer 2020 eDiscovery Business Confidence Survey present the unfortunate and continuing impact of COVID-19 on the business of eDiscovery. However, for these … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1287372189612814337
5 Basic Tips To Ensure Cybersecurity Diligence
hackernoon.com – James Murphy James Murphy is a tech guru and a blogger from New York. James mostly writes about new technologies. Cybersecurity plays a very important role in this digitally-focused world because wit… Tweeted by @hackernoon https://twitter.com/hackernoon/status/1287306671820361729
brandonskerritt/RustScan
github.com – Turns a 17 minutes Nmap scan into 19 seconds. Find all open ports fast with Rustscan, automatically pipe them into Nmap. Find ports quickly using Rustscan (8 seconds at its fastest). Automatically ru… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1286178618133983232
Stellar Women in e-Discovery: Allyship with Altlaw
relativity.com – For this second allyship-focused episode (you can find the first one here), Stellar Women in e-Discovery traveled across the pond to London in early 2020. While there, I had a chance to talk about me… Tweeted by @RelativityHQ
ILTANET
iltanet.org – In this discussion, we will explore why robust SaaS platforms must be built for experts yet designed for everyone. As systems and workflows become more complex, the importance of simplicity in design… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1285953803775283200
How I Built a Deep Learning Powered Emoji Slackbot 😄 😖 😀
towardsdatascience.com – As I put the finishing touches on my PhD thesis in computer systems at UC Berkeley, I often wonder what life in the AI world is like. My AI friends are constantly bragging about how deep learning wil…
VC Investment in Cybersecurity Dips & Shifts with COVID-19
darkreading.com – [This is the second installment of a two-part series on COVID-19’s impact on the cybersecurity industry. Read the first part, “Cybersecurity Spending Hits Temporary Pause Amid Pandemic,” here]. Not e… Tweeted by @pmenonkp https://twitter.com/pmenonkp/status/1286200504784244736
SANS Security Training Scholarship — WiCyS – Women in Cybersecurity
wicys.org – Stage 1 – SANS CyberStart Game:100 interested candidates will have the chance to demonstrate (and discover) their passion for cybersecurity in an interactive, gamified learning platform. CyberStart G… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1285666279018373122
Adobe Product Security Incident Response Team (PSIRT) Blog | Security Bulletins Posted
blogs.adobe.com – Adobe has published security bulletins for Adobe Bridge (APSB20-44), Adobe Photoshop (APSB20-45), Adobe Prelude (APSB20-46) and Adobe Reader Mobile (APSB20-50). Adobe recommends users update their pr… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1285635773727940614
High-Tech Hearsay: Can a Computer Be a Person for Legal Purposes?
relativity.com – People are often amazed that the US Supreme Court considers a corporation to be a person for some legal purposes. In the election funding case, Citizens United v. FEC, No. 08-205 (U.S. Jan. 21, 2010)… Tweeted by @RelativityHQ
SANS Survey Explores Path to Closing the Critical Skills Gap for a Modern and Effective Security Operations Center (SOC)
prnewswire.com – BETHESDA, Md., July 21, 2020 /PRNewswire/ — CISOs who can reduce or close their critical skills gaps have the highest probability of minimizing the business impact of cyberattacks – even when budget… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1285628188278874117
A Growing Concern? Budgetary Constraints and the Business of eDiscovery
blog.aceds.org – Editor’s Note: The results of the recent Summer 2020 eDiscovery Business Confidence Survey present the continuing impact of COVID constraints on the business of eDiscovery. However, for these pandemi… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1285599935119921152
2020 Claims Satisfaction Survey Report
advisenltd.com – Excellent service in terms of claims handling is crucial for the reputation of insurers. It is, after all, how they prove their mettle. The management of a claim can make or break an insurer as it ce… Tweeted
SharePoint and Pwn :: Remote Code Execution Against SharePoint Server Abusing DataSet
srcincite.io – When CVE-2020-1147 was released last week I was curious as to how this vulnerability manifested and how an attacker might achieve remote code execution with it. Since I’m somewhat familar with ShareP… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1285257596501295104
Summer Sale
aceds.org – I wanted a certification that separates me from my peers. Upon discovering CEDS, I was convinced this was exactly the type of distinction I had been seeking. Since achieving CEDS certification, I’ve … Tweeted by @acedsonline https://twitter.com/acedsonline/status/1285213236212707336
Microsoft Teams Compliance: How to Stay on the Right Side of the Law
uctoday.com – As companies begin to use collaboration apps like Microsoft Teams across hundreds and thousands of employees, they must pay special attention to staying compliant. Is data collection meeting privacy … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1285560377997234176
X-Road Community Event 2020 — X-Road® Data Exchange Layer
x-road.global – The open-source community around X-Road® is growing fast. It is already ten times bigger than five years ago when a group of developers gathered to discuss X-Road-related topics. Since 2018, communit… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1285535738965229571
Bypassing LSA Protection (aka Protected Process Light) without Mimikatz on Windows 10
redcursor.com.au – Remove the RunAsPPL registry key and reboot (probably the worst method since you’ll lose any credentials in memory) Disable PPL flags on the LSASS process by patching the EPROCESS kernel structure Re… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1285132817903448065