Home | Latest News | Popular News | Our Network | About | Contact
SecurityPhresh - News that keeps you ahead of others!
Popular Security News
Scientists Discover Underworld Ecosystem Teeming With Life - CNET
38 hours ago from CNET News
Locked within the Earth are organisms that can withstand extreme pressures, temperatures and lack of nutrients -- changing how we think about life.
US Advised To Adopt Australias Archaic Voting System In The Age Of Hacks
36 hours ago from iTnews
ANU says pencil and paper ballots are better for democracy.
Highly Active MuddyWater Hackers Hit 30 Organizations In 2 Months
36 hours ago from SecurityWeek
The cyberespionage group referred to as MuddyWater has hit over 130 victims in 30 organizations from late September to mid-November, Symantec security researchers said in a report published Monday. read more
Microsoft Patches Exploited New Windows Zero-day
11 hours ago from iTnews
In-the-wild vulnerability rated important, not critical.
Telegram, WhatsApp And Signal Open To Side-channel Attacks
36 hours ago from iTnews
Messaging apps inadequately protect state and user information.
Australias Encryption Laws Will Fall Foul Of Differing Definitions
32 hours ago from ZDNet
A cryptographers rebuttal to a GCHQ interception concept highlights how participants in the encryption-busting debate are talking past each other. What even is a "systemic weakness", anyway?
Congressional Committee Slams Equifax In Report On Data Breach - CNET
42 hours ago from CNET News
Equifax says the report contains inaccuracies.
These Hackers Are Using Android Surveillance Malware To Target Opponents Of The Syrian Government
2 days ago from ZDNet
SilverHawk hacking campaign uses fake versions of secure messaging apps like WhatsApp and Telegram to plant spyware on devices.
See More
Latest Security News
Google CEO Hearing Could Have Covered So Much More Ground - CNET
10 minutes ago from CNET News
Dragonfly, the search giant’s controversial China project, got too little of the spotlight, some observers say.
Hey, Stop Shaming Me For My Old Phone And Paper Map - CNET
10 minutes ago from CNET News
You dont need to ditch paper for screens and constantly upgrade your phone to be cool. Old is OK.
How Movie Editing Takes A Script And Makes A Whole New Film - CNET
10 minutes ago from CNET News
"Editing is really the final rewrite for all movies," says Tom Cross, editor of flicks like space race epic First Man. CNET chats with Cross about the process.
Pixel 3 Call Screen And Now Playing Are My Favorite Features - CNET
an hour ago from CNET News
Besides the camera of course.
New Galaxy S10 Specs, Price, Release Date Rumors: Headset Jack Stays; S10, Lite, Plus Sizes - CNET
an hour ago from CNET News
Get the latest leaks and rumors here about Samsungs next major phone.
See More
Latest News from Research Labs
Cryptocurrency Miner Spreads Via Old Vulnerabilities On Elasticsearch
4 hours ago from TrendMicro
We detected mining activity on our honeypot that involves the search engine Elasticsearch, which is a Java-developed search engine based on the Lucene library and released as open-source. The attack was deployed by taking advantage of known...
December Patch Tuesday: Year-End Batch Addresses Win32k Elevation Of Privilege And Windows DNS Server Vulnerabilities
7 hours ago from TrendMicro
The just-released Patch Tuesday for December includes a fix for the actively exploited Win32k Elevation of Privilege Vulnerability (CVE-2018-8611). The flaw allows an attacker to exploit a bug in the Windows Kernel and run arbitrary code...
Patch Tuesday, December 2018 Edition
17 hours ago from Krebsonsecurity
Adobe and Microsoft each released updates today to tackle critical security weaknesses in their software. Microsofts December patch batch is relatively light, addressing more than three dozen vulnerabilities in Windows and related applications....
Voice Of The Customer: The Walsh Group Found That Azure Active Directory Gives Them A Competitive Edge
21 hours ago from Microsoft
The Voice of the Customer blog series is designed to help you by sharing stories from real customers who are solving their identity and security challenges using Azure AD. The post Voice of the Customer: The Walsh Group found that Azure...
Google+ To Shut Earlier As New Bug Exposed Data Of 52.5 Million Users
22 hours ago from ESET Research
There is no evidence that the flaw was misused during the six days it was alive, said the tech giant The post Google+ to shut earlier as new bug exposed data of 52.5 million users appeared first on WeLiveSecurity
See More
Latest Security Videos & Podcasts
Black Hat Arsenal Asia 2019 CFT Open
one month ago from ToolsWatch
The Black Hat Arsenal team will be back in Singapore with the very same goal: give hackers security researchers the opportunity to demo their newest and latest code. The Arsenal tool demo area...[[ This is a content summary only. Visit...
Black Hat Arsenal Europe 2018 Lineup Announced
3 months ago from ToolsWatch
After days of reviewing the hundreds of submitted tools, ToolsWatch and Black Hat teams selected 50 tools. They will be demonstrated over 2 days the 5th and 6th of December 2018 at the Excel London...[[ This is a content summary only. Visit...
HITB Armory – Call For Tools Is OPEN! (Dubai, UAE)
3 months ago from ToolsWatch
Were pleased to announce the first ever HackInTheBox Armory! The HITB Armory is where you can showcase your security tools to the world. You will get 30 minutes to present your tools onstage,...[[ This is a content summary only. Visit my...
Blackhat Arsenal Europe 2018 CFT Open
4 months ago from ToolsWatch
The Black Hat Arsenal team is heading to London with the very same goal: give hackers security researchers the opportunity to demo their newest and latest code. The Arsenal tool demo area is...[[ This is a content summary only. Visit my...
Recon Village @ DEFCON 2018 (Hackathon)
5 months ago from ToolsWatch
ToolsWatch likes open source tools, for that reason we will participate in the Recon Village @ DEF CON 2018 as part of jury. Maxi Soler will be there 🙂 Recon Village is an Open Space with Talks,...[[ This is a content summary only. Visit...
See More
Latest Security Papers & Presentations
Red Team Assessment Phases: Target Identification
23 hours ago from InfoSec
The third phase of a red team assessment is target identification. In this phase, the red team moves from general information collected about the target to detailed information and potential plans...Go on to the site to read the full...
Roles And Responsibilities Of Information Security Auditor
23 hours ago from InfoSec
Most people break out into cold sweats at the thought of conducting an audit, and for good reason. Auditing the information systems of an organization requires attention to detail and thoroughness on...Go on to the site to read the full...
VulnHub Machines Walkthrough Series: Brainpan – Part 2
40 hours ago from InfoSec
In this article, we’ll be carrying on with our walkthrough of an interesting VulnHub machine called Brainpan. In Part 1 of this article, we looked into how we got the user-level reverse shell from...Go on to the site to read the full...
Red Team Assessment Phases: Reconnaissance
47 hours ago from InfoSec
The second phase of a red team assessment is reconnaissance. In this phase, the red team attempts to collect information relevant to the assessment while keeping as low of a profile as possible. In...Go on to the site to read the full...
10 Proven Security Awareness Tips From Osterman Research — CyberSpeak Podcast
2 days ago from InfoSec
Michael Osterman, president and analyst at Osterman Research, shares security awareness tips and strategies that organizations can implement immediately. Lisa Plaggemier, chief evangelist at InfoSec Institute, joins in the discussion, which...
See More