Martin's selection of few interesting IT Security, Privacy, and free tools from the Net

Monday, March 9, 2015

New Pen Test Poster from SANS



Get it here.

http://counterhack.net/Poster_PenTest_2015.pdf

Posted by MVJBlogger at 1:44 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Poster
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Search This Blog

Translate

About Me

MVJBlogger
View my complete profile

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments

Popular Posts

  • New Pen Test Poster from SANS
    Get it here. http://counterhack.net/Poster_PenTest_2015.pdf
  • Good news - Firefox (v58 - Jan 2018) will add a new feature - BLOCK canvas-browser-fingerprinting
    Mozilla is testing a new feature in the upcoming version of its Firefox web browser that will grant users the ability to block canvas f...
  • Serverless Architectures - We can't add any endpoint protection (firewall,HIPS,EDR) so, what can we do?
    No magic bullet here - Serverless computing forces software architects and developers to approach security the way it should've been a...
  • Useful Add-On - For Symantec DLP - for better dashboard with Real-time Data. (if you have extra money to spend)
    This might help those who need real-time data According to the article:-  MetriX provides those within security with an unprecedented...
  • njRat (not New Jersey Rat) Malware - infect 24K computers, and is used by 487 groups.
    This is the downside of (evil)code that can easily be ported or shared. According to the article:- "Symantec analysed 72...
  • I was not aware of this - Google DNS was hijacked for 22 minutes on March 16
    It does not seem to be Google's fault but the ISP  According to the article:-  Google's Public DNS servers are used...
  • You are not safe any more - Malvertising hits websites such as YouTube, Amazon and Yahoo
    If three of the most popular sites are being targeted by Malware how, can a common man survive. If you have not done this before , ...
  • Six examples - How employee accounts could be compromised.
    Everyone knows compromised accounts are hard (not impossible) to detect.  One of the problem is that employees don't like it when...
  • With negligent admins , hackers don't have to work hard - A hacker managed to obtain the sensitive documents (U.S. Military Drone Documents) by gaining access to a Netgear router that was using the default FTP login settings for file sharing.
    The authentication vulnerability in Netgear routers that hacker exploits to access the sensitive military data was initially discovered tw...
  • Value of a hacked PC in Pictures
    From: http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

Categories

  • 3rd party
  • 3rd Party Risk
  • abuse
  • Active Directory
  • Add-On
  • admin error
  • advisory
  • AI
  • AMAZON
  • Android
  • App Security
  • Apple
  • APT
  • ATM
  • attack
  • Authentication
  • automation
  • automobiles
  • Availability
  • backdoor
  • Bad Programming
  • Bad Security
  • Banks
  • Basics
  • bec
  • best practice
  • Big Brother
  • Big Data
  • biology
  • Biometrics
  • BLOCKCHAIN
  • Botnet
  • browser
  • Bureaucracy
  • Business
  • buzzword
  • BYOD
  • c
  • certificate
  • checklist
  • child privacy
  • children
  • chrome
  • Cloud
  • Communication
  • COMPLIANCE
  • Compromise
  • confidentiality
  • Consumer Goods
  • containers
  • Contrarian View
  • COVID-19
  • creative
  • credentials
  • Credit Card
  • Credit Card Privacy
  • cryptocurrency
  • cryptomining
  • Cyber Insurance
  • CyberAttack
  • Cyberespionage
  • CyberSecurity
  • Dangerous
  • Dashboard
  • Data Breach
  • data collection
  • Data exposed
  • Data Loss
  • database
  • DDoS
  • Defense-In-Depth
  • Denials
  • discovery
  • dishonesty
  • DLP
  • DNS
  • do-it-yourself
  • doubbt
  • double-standards
  • Dumb
  • email
  • encryption
  • end of life
  • endpoint
  • EOL
  • ERP
  • Exfiltration
  • exploit
  • exposed
  • extortion
  • extra
  • Fact-is-stranger-than-fiction
  • fake
  • fingerprinting
  • Fix
  • Flaw
  • Forensic tool
  • Forensics
  • Fraud
  • Free book
  • Free Courses
  • free poster
  • Free Software
  • free tools
  • Funny
  • Future Tech
  • Gadgets
  • GDPR
  • General
  • General Knowledge
  • Geo-Tracking
  • gone with the wind
  • Good News
  • Good Reads
  • Google
  • gov
  • Government
  • GRC
  • Guidelines
  • Habits
  • Hack Tools
  • hacked
  • Hacking
  • Hacktivism
  • Hall Of Shame
  • hardware bug
  • health
  • HealthCare
  • Hijack
  • HIPAA
  • History
  • HOW-TO
  • HP
  • Human Nature
  • human vulnerability
  • Hypocricy
  • IAM
  • Identification
  • identity theft
  • illiterate
  • Incident Response
  • Industry News
  • infection
  • Insider Threat
  • inspiring
  • interesting
  • internal theft
  • Invention
  • IoT
  • iPhone
  • Ir-responsible
  • ISACA
  • ISP
  • Jargon
  • Law
  • Layered Security
  • laz
  • laziness
  • lazy coding
  • Legal
  • LIES
  • LIFE
  • Linux
  • mail
  • Malware
  • Management
  • Marketing
  • Medical
  • Mergers and Takeovers
  • Metadata
  • Methodology
  • Metrics
  • mfa
  • Microsoft
  • misinformation
  • mistakes
  • Mobile
  • Mobile App
  • Money
  • Monitoring
  • Multi-Factor
  • Myths
  • Nature
  • Negative Report
  • networking
  • new feature
  • nice
  • no-confidence
  • non-profit
  • Open Source
  • OS
  • Outdated
  • OutSourced
  • password
  • patches
  • PDF
  • Pen Test
  • Penalty
  • Philosophy
  • Phishing
  • PII
  • PKI
  • Policies
  • Poster
  • Predictions
  • Privacy
  • process failure
  • product knowledge
  • Programming
  • Protection
  • Public Incidents
  • Questions
  • QUIZ
  • Quotes
  • Ransomware
  • RAT
  • Repeated Failures
  • Report
  • Research
  • Risk
  • ROI
  • RSA
  • SANS
  • SANS top 20
  • scams
  • scareware
  • Science
  • Scientists
  • screw-up
  • Security
  • Security Analytics
  • security awareness
  • Security Breach
  • Security Ignorance Syndrome
  • Security Mistakes
  • serious
  • serverless
  • SIEM
  • SIS
  • smart devices
  • smart home
  • smart phones
  • SmartHome
  • SOAR
  • Social Network
  • Software
  • spyware
  • State Sponsored
  • Storage
  • Strange
  • supply chain
  • surveillance
  • Survey
  • Symantec
  • Synergy
  • Technology
  • Terminology
  • testing
  • Theft
  • third party
  • third party insecurity
  • Threat
  • tips
  • tracking
  • training
  • traking
  • Trojan
  • Trust
  • tutorial
  • unethical
  • Universe
  • USB
  • useful
  • Victims
  • Video
  • virtualization
  • Vmware
  • VPN
  • Vulnerability
  • Watchout
  • wearable tech
  • Web
  • web attack
  • White Papers
  • WiFi
  • windows
  • Wireless
  • Wisdom
  • Worm
  • XP
  • zero trust
  • zero-day

Blog Archive

  • ►  2020 (71)
    • ►  July (8)
    • ►  June (6)
    • ►  May (10)
    • ►  April (8)
    • ►  March (16)
    • ►  February (12)
    • ►  January (11)
  • ►  2019 (145)
    • ►  December (10)
    • ►  November (9)
    • ►  October (11)
    • ►  September (10)
    • ►  August (22)
    • ►  July (8)
    • ►  April (10)
    • ►  March (17)
    • ►  February (24)
    • ►  January (24)
  • ►  2018 (352)
    • ►  December (18)
    • ►  November (30)
    • ►  October (25)
    • ►  September (19)
    • ►  August (37)
    • ►  July (43)
    • ►  June (49)
    • ►  May (36)
    • ►  April (26)
    • ►  March (22)
    • ►  February (9)
    • ►  January (38)
  • ►  2017 (155)
    • ►  December (30)
    • ►  November (29)
    • ►  October (35)
    • ►  September (14)
    • ►  August (5)
    • ►  July (14)
    • ►  June (2)
    • ►  May (8)
    • ►  April (6)
    • ►  March (6)
    • ►  February (4)
    • ►  January (2)
  • ►  2016 (64)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  July (7)
    • ►  June (3)
    • ►  May (7)
    • ►  April (19)
    • ►  March (6)
    • ►  February (8)
    • ►  January (8)
  • ▼  2015 (127)
    • ►  October (16)
    • ►  September (18)
    • ►  August (20)
    • ►  July (21)
    • ►  June (23)
    • ►  May (22)
    • ►  April (3)
    • ▼  March (1)
      • New Pen Test Poster from SANS
    • ►  February (2)
    • ►  January (1)
  • ►  2014 (411)
    • ►  December (7)
    • ►  November (1)
    • ►  October (6)
    • ►  September (4)
    • ►  August (20)
    • ►  July (27)
    • ►  June (8)
    • ►  May (33)
    • ►  April (68)
    • ►  March (191)
    • ►  February (46)
Simple theme. Powered by Blogger.