RSAC 2019: Picking Apart the Foreshadow Attack

Source: Threat Post
RSAC 2019: Picking Apart the Foreshadow Attack
Raoul Strackx, one of the researchers who discovered the Foreshadow speculative execution vulnerability, talks at RSA about the Catch-22 issue when it comes to fixing speculative execution flaws.

Uncategorized

RSAC 2019: Malicious Emailed URLs See Triple-Digit Increase

Uncategorized

RSAC 2019: Microsoft Zero-Day Allows Exploits to Sneak Past Sandboxes

Uncategorized

DeepSound – Audio Steganography Tool

Source: Darknet
DeepSound – Audio Steganography Tool
DeepSound – Audio Steganography Tool

DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract secret files directly from audio files or audio CD tracks.

This audio steganography tool can be used as copyright marking software for wave, flac, wma, ape, and audio CD.

DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE).

Read the rest of DeepSound – Audio Steganography Tool now! Only available at Darknet.

Uncategorized

Mobile Theft and Loss Report Finds Large Percentage of Missing Devices are Simply Misplaced

Source: Security Magazine
Mobile Theft and Loss Report Finds Large Percentage of Missing Devices are Simply Misplaced

Prey Inc. announced the results of the inaugural Prey Mobile Theft & Loss Report, which found that misplaced devices were responsible for the vast majority – 69 percent – of all devices reported missing in 2018. Ultimately, the Prey survey determined that mobile device owners are a greater threat to their devices than are thieves and that, when if comes to device theft, the most comfortable and familiar places, such as offices, homes or schools, can be the least safe.

Uncategorized

Latest Hacking News Podcast #232

Uncategorized

Google Launches Backstory — A New Cyber Security Tool for Businesses

Source: The Hacking News
Google Launches Backstory — A New Cyber Security Tool for Businesses
Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats.

Network infrastructures at most enterprises regularly generate enormous amounts of network

Uncategorized

BSides SF 2019: Remote-Root Bug in Logitech Harmony Hub Patched and Explained

Uncategorized

Texas School Safety Bill Proposes Threat Assessment Teams

Uncategorized

How Three Universities Embraced Stop the Bleed Training

Uncategorized
%d bloggers like this: