Offensive Security launches OffSec, a new cybersecurity training program for enterprises

Offensive Security, the leading provider of hands-on cybersecurity training and certification, announced OffSec Flex, a new program for enterprises designed to simplify the cybersecurity training process and allow organizations to invest more in cybers… Continue reading Offensive Security launches OffSec, a new cybersecurity training program for enterprises

Offensive Security unveils Kali Linux roadmap

Offensive Security unveiled much of the 2019-2020 roadmap for the open source Kali Linux project, the most popular operating system used by penetration testers and ethical hackers. The strategy behind much of the roadmap is opening up Kali Linux even m… Continue reading Offensive Security unveils Kali Linux roadmap

Infiltrate 2019, Alexei Bulazel’s & Jeremy Blackthorne’s ‘Three Heads Are Better Than One: Mastering NSA’s Ghidra Reverse Engineering Tool’

Permalink
The post Infiltrate 2019, Alexei Bulazel’s & Jeremy Blackthorne’s ‘Three Heads Are Better Than One: Mastering NSA’s Ghidra Reverse Engineering Tool’ appeared first on Security Boulevard.
Continue reading Infiltrate 2019, Alexei Bulazel’s & Jeremy Blackthorne’s ‘Three Heads Are Better Than One: Mastering NSA’s Ghidra Reverse Engineering Tool’

Offensive Security appoints Ning Wang as CEO to lead organization’s next stage of growth

Offensive Security appoints Ning Wang as CEO. Wang joins the company with proven experience in growing businesses in the security and online training markets as COO and CFO of HackerOne and Lynda.com (formerly Spectrum Equity-backed and acquired by Lin… Continue reading Offensive Security appoints Ning Wang as CEO to lead organization’s next stage of growth

How can businesses get the most out of pentesting?

More than 4.5 billion data records were compromised in the first half of this year. If you still feel like your enterprise is secure after reading that statistic, you’re one of the few. Hackers utilizing high-profile exploits to victimize organizations… Continue reading How can businesses get the most out of pentesting?

Offensive Security redesigns Exploit Database, its archive of public exploits

Offensive Security released an update to Exploit Database (EDB), its archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers worldwide. Offensive Security’s Exploit Databa… Continue reading Offensive Security redesigns Exploit Database, its archive of public exploits

The U.S. military combined cyber and kinetic operations to hunt down ISIS last year, general says

The military used a combination of kinetic attacks, like missile strikes, with cyber operations, to fight ISIS in an important battle last year, a senior U.S. official revealed recently. U.S. Cyber Command, the country’s leading cyber warfare force, was involved in secretly launching a series of disruptive-style cyberattacks against the Islamic State (ISIS) in 2017 which knocked out their computer systems in Iraq. The tactic caused the terrorists to leave their heavy command posts, exposing them to a more conventional attack. Last week, for the first time, the former commander of the Army’s anti-ISIS coalition discussed a covert operation in detail where U.S. forces and allies successfully used offensive cyber measures to hunt down enemy forces. Gen. Stephen Townsend, who commanded Combined Joint Task Force-Operation Inherent Resolve in 2017, told an audience of Hawaii conference-goers via teleconference that the coalition cyberattacks leveled against ISIS were part of “a multi-domain operation […]

The post The U.S. military combined cyber and kinetic operations to hunt down ISIS last year, general says appeared first on Cyberscoop.

Continue reading The U.S. military combined cyber and kinetic operations to hunt down ISIS last year, general says

Offensive Security: Hacking and Breaking to Secure the Internet

For most people outside of the IT and cybersecurity industries, the words “hacker” and “hacking” have ghastly connotations. Many envision a criminal bereft of any morals, whose only purpose is to pilfer, spy or defame his victi… Continue reading Offensive Security: Hacking and Breaking to Secure the Internet

Leaked NSA tools, now infecting over 200,000 machines, will be weaponized for years

More than 200,000 machines have been infected by an NSA backdoor leaked nearly two weeks ago by the Shadow Brokers hacking group, according to the latest scans and estimates. Experts expect to see the exploits, implants and other NSA-built hacking tools in use for as long as a decade into the future. U.S. computers are by far the most frequently hit targets of DOUBLEPULSAR, a backdoor implant allowing attackers to stealthily collect information and run malicious code on a target’s machine, according to the Swiss security firm Binary Edge, which counted 183,107 infected machines as of early Monday morning. More than 67,000 of those machines were American, while China, Russia and the U.K. have suffered several thousand infections each. On Friday, that number was 100,000 globally. An average of 25,000 machines have been infected globally every day over the last week. Experts say the actual number is higher than Monday’s assessment because each count is slow and does always not catch everything […]

The post Leaked NSA tools, now infecting over 200,000 machines, will be weaponized for years appeared first on Cyberscoop.

Continue reading Leaked NSA tools, now infecting over 200,000 machines, will be weaponized for years