SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data …
Tag:
Security
-
-
MonitoringNetwork TrafficPasswordSecuritySpamUS-CertWindows
Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
by blackMOREby blackMORERecommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
-
Bugs (Software and Hardware)OthersSecurityTechnical Documentation
Check Point SandBlast protected users from a Zero-Day Microsoft Office Vulnerability
by blackMOREby blackMORENeil Armstrong, the great space explorer, once said “research is all about creating new knowledge.” And of course, with knowledge we are in a better position to predict, and thus …
-
NewsOthersSecuritySecurity SoftwareSecurity Tools
What are the Challenges of Using Open Source Cybersecurity Tools?
by blackMOREby blackMOREBy making their source code freely available, developers of open source software rely on the power of the wider community in order to help them audit and improve their code. …