blog.threatstop.com
ThreatSTOP blocking Superfish | The ThreatSTOP Blog
https://blog.threatstop.com/2015/02/23/threatstop-blocking-superfish
February 23, 2015. At ThreatSTOP we have been reading about the Lenovo/Superfish. Adware security hole with amazement. Not so much at the enormous gaping hole that has been discovered (sadly that seems to be SOP at too many places) but at the way that the various parties involved have completely failed to understand. That they have created such an enormous gaping hole. This will not stop. The gaping hole (which seems to get ever more gaping. Share on Facebook (Opens in new window). Leave a Reply Cancel r...
blog.threatstop.com
Virtualization | The ThreatSTOP Blog
https://blog.threatstop.com/tag/virtualization
ThreatSTOP’s Anti-Venom for CVE-2015-3456. May 14, 2015. A critical vulnerability identified by the National Vulnerability Database as CVE-2015-3456. Was published yesterday. It affects all KVM guests running on QEMU–a widely used emulator for virtual server hosting. This command and control vulnerability. Unchecked, this can impact thousands of organizations and millions of end users that rely on affected virtual machines for the distribution of shared computing resources. Attacks like Venom, Heartbleed...
blog.threatstop.com
News/Announcements | The ThreatSTOP Blog
https://blog.threatstop.com/category/newsannouncements
AIRI 2016 — DNS Inventor Dr. Paul Mockapetris Speaking. August 8, 2016. Dr Mockapetris will be speaking on September 13, 2016, from 4:15 pm to 5:00 pm. AIRI 2016 is taking place in West Palm Beach, September 11-14 at the PGA National Resort and Spa Hotel. Annual meeting will feature nearly fifty sessions. Share on Facebook (Opens in new window). Click to share on LinkedIn (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Google (Opens in new window). June 23, 2016.
blog.threatstop.com
CVE | The ThreatSTOP Blog
https://blog.threatstop.com/tag/cve
ThreatSTOP’s Anti-Venom for CVE-2015-3456. May 14, 2015. A critical vulnerability identified by the National Vulnerability Database as CVE-2015-3456. Was published yesterday. It affects all KVM guests running on QEMU–a widely used emulator for virtual server hosting. This command and control vulnerability. Unchecked, this can impact thousands of organizations and millions of end users that rely on affected virtual machines for the distribution of shared computing resources. Attacks like Venom, Heartbleed...
blog.threatstop.com
Shellshock | The ThreatSTOP Blog
https://blog.threatstop.com/tag/shellshock
ThreatSTOP’s Anti-Venom for CVE-2015-3456. May 14, 2015. A critical vulnerability identified by the National Vulnerability Database as CVE-2015-3456. Was published yesterday. It affects all KVM guests running on QEMU–a widely used emulator for virtual server hosting. This command and control vulnerability. Unchecked, this can impact thousands of organizations and millions of end users that rely on affected virtual machines for the distribution of shared computing resources. Attacks like Venom, Heartbleed...
mincey.org
Windows Firewall Port Ranges | mincey.org
http://www.mincey.org/cms/node/21
Windows Firewall Port Ranges. By michael on 22 March 2013. Windows 2008 R2 and Windows 7 incorporate the Windows Firewall with Advanced Security. Unfortunately, Windows 2008 Standard (non-R2 edition) does not have Advanced Security. One of the disappointing differences is the ability to add port ranges within the firewall. Since you can add ports to the firewall through the CLI, I created a batch script that will add a rule for each port that you need. Here is an actual example:. Hack in the box.
blog.threatstop.com
QEMU | The ThreatSTOP Blog
https://blog.threatstop.com/tag/qemu
ThreatSTOP’s Anti-Venom for CVE-2015-3456. May 14, 2015. A critical vulnerability identified by the National Vulnerability Database as CVE-2015-3456. Was published yesterday. It affects all KVM guests running on QEMU–a widely used emulator for virtual server hosting. This command and control vulnerability. Unchecked, this can impact thousands of organizations and millions of end users that rely on affected virtual machines for the distribution of shared computing resources. Attacks like Venom, Heartbleed...
mincey.org
VPN | mincey.org
http://www.mincey.org/cms/taxonomy/term/63
Shrew VPN client on Linux. By michael on 24 November 2011. I experienced strange issues when trying to connect the Shrew VPN client on Linux to pfSense 2.0. Essential information used for testing. PfSense version 2.0 Shrew VPN client version 2.1.5 Ubuntu 10.10, 11.04, and 11.10 Windows XP SP3 Windows 7 SP1 - - - - - - - - - - - - - - - - - - -. I decided to test other devices. I used an Ipad, Windows XP PC and Windows 7 PC. All were able to connect fine. Steps to disable spoof protection:. Hack in the box.
mincey.org
Firewall | mincey.org
http://www.mincey.org/cms/taxonomy/term/29
Windows Firewall Port Ranges. By michael on 22 March 2013. Windows 2008 R2 and Windows 7 incorporate the Windows Firewall with Advanced Security. Unfortunately, Windows 2008 Standard (non-R2 edition) does not have Advanced Security. One of the disappointing differences is the ability to add port ranges within the firewall. Since you can add ports to the firewall through the CLI, I created a batch script that will add a rule for each port that you need. Here is an actual example:. Hack in the box.
blog.threatstop.com
ThreatSTOP in use | The ThreatSTOP Blog
https://blog.threatstop.com/category/threatstop-in-use
Next Gen IP Firewall Reporting Video – Check it out! August 18, 2016. Share on Facebook (Opens in new window). Click to share on LinkedIn (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Google (Opens in new window). Click to email (Opens in new window). Click to share on Reddit (Opens in new window). SANS “Intelligent Network Security” Webinar with ThreatSTOP – August 25. August 17, 2016. Information or to register. How to leverage the existing DNS, firewall and ...
SOCIAL ENGAGEMENT