Browsing tag

ISO

ISO 27701, the new cybersecurity and data privacy standard

According to data protection specialists, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) launched a new set of recommendations related to user privacy to help organizations to comply with data protection laws in different parts of the world. The new standard, ISO 27701, was created for adoption in any organization that […]

New attack spreads LokiBot & NanoCore malware in ISO image files

Both NanoCore and LokiBot are Info-stealing Trojans. Security researchers at the San Francisco-based firm Netskope have discovered a new malware campaign distributing the info-stealer malware LokiBot and NanoCore via ISO image file attachments that appear to be an invoice. It is noteworthy that LokiBot malware was discovered back in October 2017 and is equipped with […]

How To Mount ISOs And Other Image File Types In Linux?

Have you ever needed to check the contents of an image file? Maybe you forgot which version of that Linux distribution that was. There can be many reasons for double-checking an image, but how do you do that without burning it? Let’s find out, no extra software required. Every tech savvy Linux user should be […]

Security Onion – Linux Distro For IDS, NSM, And Log Management

Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Security-onion […]

Exploit Pack – Penetration Testing Framework

Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so penetration testers can focus on what’s really important. The threat. This blend of software engineers and subject matter experts provides an unique advantage by combining technical know-how with true insight into the problem set, resulting in […]