One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 457211
Date de publication 2018-01-09 14:00:00 (vue: 2018-01-09 14:00:00)
Titre Top 17 Blogs from \'17
Texte It was a great year in blogs for AlienVault! Here are the top blogs from 2017, selected by number of views from all sources. Drumroll please. Explain Bitcoin to Me by Tristan Johns. It’s an approachable but technical explanation of how Bitcoin works. MacSpy: OS X RAT as a Service by Peter Ewane. It’s about one of the first malware-as-a-service (MaaS) for OS X. Configuring Kali Linux on Amazon AWS Cloud for FREE by Irfan Shakeel. If you want to experiment with pentesting without spending money, this blog will let you know how. How Does Whonix Make Kali Linux Anonymous & How to Prevent It? by Irfan Shakeel. Learn what Whonix is and how it works, and how it can be used to go incognito while using Kali Linux. There’s also info on how to prevent folks from doing in in your corporate network. Ongoing WannaCry Ransomware Spreading Through SMB Vulnerability by AlienVault Labs. The blog details findings on WannaCry as it started in May 2017. LockCrypt Ransomware Spreading via RDP Brute-Force Attacks by Chris Doman. Best Advice for a Career in Cyber Security by Ryan Leatherbury. Ryan discusses networking, conferences, blogs, InfoSec on Twitter, hands-on tools, mentors and more! It’s Only a Hacker if It’s Linus Himself by Laureen Hudson. At AlienVault, we stick to precisely descriptive terms; we have malicious actors, we have security researchers, but unless we have the fortune to be talking about Linus himself, you’ll never see hackers in our documentation.  How the Vote Hacking Was Done at DefCon25 by @notpandapants. From a guest blogger who participated. The Diebold ExpressPoll 5000 is a piece of election hardware that is compromised to the core, and creates a hacker-friendly platform for large-scale election manipulation, on multiple fronts. Interesting blog, but a little scary too. Red Teamers Can Learn Secrets by Purple Teaming by Haydn Johnson. Great guest blog by a practitioner, teaching us why Red Teamers Should “Purple Team it”. MacronLeaks – A Timeline of Events by Chris Doman. Chris discusses the implications of leaked documents and the 2017 French election. How to Prepare to Take the OSCP by Blade Soriano. Guest blogge
Envoyé Oui
Condensat “purple 2017 5000 @notpandapants about actors advice after alienvault alissa all also amazon anonymous applications approach approachable are attacks attaining aws beginner’s best bitcoin blade blog blogger blogs brute bump but can career ceh certified chris cloud compromised conferences configuring containment core corporate creates cyber defcon25 demystifying describes descriptive designing details detection diebold discusses discussion documentation documents does doing doman done drumroll election ethical events ewane experiment explain explanation expresspoll findings first folks force fortune free french friendly fritz from from 2017 fronts getting gibson great guest guide hacker hackers hacking hands hardware have haydn helpful here himself honeypot honeypots honeypy how hudson i’m implementing implications important incident includes incognito info infosec interesting irfan isn’t isolation it” it’s james johns johnson jonathan kali knight know labs large laureen leaked learn leatherbury let linus linux little lockcrypt maas macronleaks macspy: maddux make malicious malware management manipulation may mentors micro money more multiple network networking never now number one ongoing only open operationalizing oscp others otx participated passed pentesting peter phillip piece platform please practitioner precisely prepare prepared prevent project purple questions ransomware rat rdp red researchers resources response ryan sample says scale scary secrets security see segmentation selected server service shakeel should smb soriano source sources spending spreading started stick stix/taxii take talking teaching team teamers teaming technical terms; there’s things through timeline tired title too tools top triage tristan twitter typing unless used using variety views vote vulnerability wannacry want well what who whonix why wide will without work: works year you’ll your
Tags
Stories Wannacry
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: