Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

OWASP March 19 Connector

Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]

S'abonner au fil RSS global de la revue de presse



OWASP March 19 Connector

Par Open Web Application Security Project
Le [2015-03-20] à 13:52:46



Présentation : OWASP Global Connector March 17, 2015 www.owasp.org Contact Us Brought to you by the OWASP Foundation Communications 2015 Strategic Goals OWASP Adrenaline OWASP and the 2015 LATAM tour promoted on Mundo Hacker TV membership Corporate Members Conference AppSec EU 2015 Updates AppSec USA 2015 Call for Training Open OWASP SAMM Project Summit 2015 LATAM Tour Partner and Promotional Events chapters New OWASP Chapters Chapter Transitions projects OWASP Dependency-Track 1.0.0 Released OWASP Vicnum Project Updated OWASP Dependency Check 1.2.9 released CISO Survey Translated to Spanish Social Media OWASP Foundation Social Media --------------------------------------------------------------------- --------------------------------------------------------------------- Communications OWASP Communications Where do we go from here - OWASP releasing strategic goals for 2015 -------------------------------------------------------------------- by Tobias Gondrom, Chairman of the Board Over the last years OWASP has grown and further followed our successful path improving Web and Application Security around the world. Today, our organization is in great shape and we are building up to what is promising to become a fantastic year 2015 for OWASP In the previous years we frequently set strategic goals to focus our global activities and to further our mission in specific and measurable ways. It is important to note that these goals are by no means a view to limit our community activity on only these goals. But rather the goals are to inspire new actions in addition to our already many ongoing great activities and to focus some of our efforts where we see great potential for OWASP and our mission to make application security more visible around the world. This year we wanted to include more community feedback into these goals. In January, we sent out a survey to the OWASP Community asking for your thoughts on our strategic goals for 2015. And we received an amazing high turnout and feedback from over 1,100 people responding to our survey. Thank you all for that Your feedback was extremely valuable and greatly appreciated It guided our priorities in 2015 and beyond. And we also received a lot of messages from volunteers in the survey who want to join some of the activities on these goals. Don't worry we will get back to you on this, now. Today we proudly release the following three strategic goals for 2015 Build a scalable OWASP training program that spreads security training around the world. Strengthen OWASP chapters and increase Chapter's abilities to spread the message of OWASP through locally organized and run events. Mature the OWASP Projects Platform Provide the OWASP projects community a mature project platform to encourage senior developers to participate in the various and many OWASP projects. For More details on these goals and some of the actions we plan to do to achieve them, please take a look at our WIKI PAGE Over the recent months and years, we already see amazing new chapter activities, project work and a lot of people from the community joining as volunteers and leaders. We are an open community organisation, and every activity is driven by you, our thousands of volunteers, members and leaders around the world. So if you have an idea how to contribute to the goals above or any other exciting OWASP activity , we like to hear from you. If you like to join one of our many activities, please let us know, join the community list owasp-community lists.owasp.org, free to join for everyone and post your interest or idea there to find other interested people to join you, or write to our community manager Noreen Whysel. We want you to get involved YOU are OWASP - OWASP needs YOU With that, I wish all of us an amazing and exciting time ahead. Tobias Gondrom, Chairman of the Board OWASP Adrenaline ---------------- 2014 OWASP Annual Report Call for Content The OWASP Foundation is looking for exciting and illustrative success stories from YOU, the community for inclusion in our 2014 Annual Report. This years theme is simply Growing, Learning, Sharing, Leading. Tell us how you and your team worked to spread the OWASP mission link to mission statement in 2014. Here are some ideas but feel free to be creative How did your local regional global collaborate spread security awareness What types of educational outreach did you and or your team accomplish How did you and or your team leverage the OWASP platform to inspire non security professionals to turn their attention to application security Where did you leave a BIG OWASP footprint How did YOU benefit from the different facets of the OWASP platform Submit your content - articles, pictures, ideas here by April 14, 2015. This is your opportunity to share with the world why you participate. We want everyone to contribute Everyone's story is important to the Foundation. Become globally famous by submitting your picture and or brief bio so we can be sure to give you credit for your contribution. Of course, you may also request to remain anonymous if you prefer. OWASP and 2015 LATAM Tour represented on Mundo Hacker TV -------------------------------------------------------- OWASP was represented on Mundo Hacker TV by Fabio Cerullo CLICK HERE to watch the entire interview. --------------------------------------------------------------------- Membership OWASP Membership New Corporate Members --------------------- Software Improvement Group Renewed Corporate Members ------------------------- Aspect Security BCC Risk Advisory Denim Group Oracle Twitter --------------------------------------------------------------------- Conference OWASP Events OWASP AppSec EU Updates ----------------------- The Keynotes have been published and the program is taking shape Tuesday 19th May, 2015 Day One of the two day trainings Day One of the Project Summit Day One of the University Challenge Wednesday 20th May, 2015 One Day Trainings Day Two of the two day trainings Day Two of the Project Summit Day Two of the University Challenge Thursday and Friday 21st and 22nd May, 2015 Conference Days including Keynotes, CISO, DEV, Hack, Ops, and Research talks, HackPra Allstars, Hands on sessions, and more ... AppSec USA 2015 Call For Training Is Open ----------------------------------------- OWASP is soliciting training providers for the AppSec USA Conference. Please submit via this Google Form. Submission Deadline is April 15, 2015 We are interested in all topics related to Web Application Security and OWASP, in particular, but not limited to these are just examples Secure development frameworks, best practices, secure coding, methods, processes, SDLC Vulnerability analysis code review, pentest, static analysis Threat modelling Cloud Security Browser Security HTML5 Security OWASP tools or projects in practice New technologies, paradigms, tools Privacy in web apps, Web services REST, XML and data storage Operations and software security Management topics in Application Security Business Risks, Outsourcing Offshoring, Awareness Programs, Project Management, Managing SDLC More information on the Call for Training can be found HERE OWASP SAMM Project Summit ------------------------- Join us for the first OWASP SAMM Project Summit in Dublin March 27-28. Friday is User Day covering talks, training, and round tables followed by a social event. Saturday is Project Day covering the release of version 1.1, workshops, and roadmap discussions Participate and steer one of our great flagship projects to the next level Details and registration can be found HERE. Follow us on twitter OwaspSAMM LATAM Tour 2015 --------------- Agenda Santiago, Chile April 8-9, 2015 Patagonia, Argentina April 10, 2015 Bucaramanga, Colombia April 14, 2015 Montevideo, Uruguay April 15-16, 2015 Lima, Peru April 17-18, 2015 Santa Cruz, Bolivia April 17-18, 2015 San Jose, Costa Rica April 21, 2015 Guatemala, Guatemala April 21-22, 2015 Buenos Aires, Argentina April 23-24, 2015 Caracas, Venezuela April 23-24, 2015 Additional Information Call for Papers AND Training are now open. Submission deadline February 15, 2015 Sponsorship Opportunities are Available Partner and Promotional Events ------------------------------ Info Security Indonesia Conference March 24, 2015 Jakarta, Indonesia BlackHat Asia 2015 March 24-27, 2015 Singapore. OWASP members receive 200 off briefings using code BRow200. ISC 2 SecureIreland Conference 2015 March 31, 2015 Dublin Ireland. OWASP Members receive 20pourcents off general event fees. Discount code OWASPISSCIRE Cyber Security Summit Europe - Financial Sector April 14-15, 2015 Prague, Czech Republic. OWASP Members receive 20pourcents off general event fees. Discount code CSSOW AppsWorld Germany 2015 April 22-23, 2015 Berlin, Germany AppsWorld North America 2015 May 12-13, 2015 San Francisco, CA SANS CyberTalent Fair May 14-15, 2015 Virtual, online International Conference on Cyber Security ICCS May 16-17, 2015 City of Redlands, CA. OWASP members receive 25pourcents off the general event fee. Discount code ICCSOWASP Cloud Security World 2015 May 19-21, 2015 New Orleans, LA..OWASP members receive a 25pourcents discount off standard event fee. Discount code CLD15-OWASP Hack In the Box May 26-29, 2015 OWASP members receive 20pourcents off by using discount code OWASP-HITB2015AMS SC Congress Toronto June 10 - 12, 2015 Toronto, Canada. Register with your owasp email address and receive a discount. EuroPython 2015 July 20-26, 2015 Bilbao, Spain Info Security Malaysia Conference August 6, 2015 Kuala, Lumpur --------------------------------------------------------------------- bh europe contrast january coalfire --------------------------------------------------------------------- chapters OWASP Chapters New Chapters ------------ Southern New Hampshire - Chapter Leaders - James Burroughs and Edmond Holohan Knoxville, TN - Chapter Leader - Daniel HarveyBihar, India - Chapter Leader - Nishant Northern Sweden - Chapter Leaders - Markus Örebrand and Magnus Hultdin Chapter Transitions ------------------- Guatemala - New Chapter Leaders - Pablo Barrera and Camilo Fernandez Busan, Korea - Chapter Leaders - Jang-Goon Sohn Treasurer , Park Chang-Hyun, and Jang Byeong-jo Share your chapter's successes Submit your stories here --------------------------------------------------------------------- projects OWASP Projects OWASP Dependency-Track 1.0.0 Released ------------------------------------- Dependency-Track is a webapp that allows organizations to document the use of third-party components across multiple applications and versions. Further, it provides automatic visibility into the use of components with known vulnerabilities. Dependency-Track compliments the wildly successful and highly useful Dependency-Check project by embedding its core engine and fulfilling additional use cases. It's another tool to combat the A9 problem. You can get more information about the project and the release HERE OWASP Vicnum Project Updated ---------------------------- The OWASP Vicnum Project has been updated to include a vulnerable XXE VM at http xxe.sourceforge.net This VM was used in recent CTF events including the Breaking Bad challenge event at AppSec USA 2013 in NYC. As with other vulnerable or broken apps, the basic goal of the project is to Test web application scanners Test manual attack techniques Test source code analysis tools Look at the code that allows the vulnerabilities Test web application firewalls Have a little fun OWASP Dependency Check 1.2.9 released ------------------------------------- The OWASP Dependency-check team is pleased to announce the release of 1.2.9 This release contains general maintenance, upgrading dependent libraries, minor bug fixes, etc. Please visit the documentation site for information on obtaining the new version CLI, Maven Plugin, Ant, Task, Jenkins Plugin The changes of note are The Maven plugin was reworked to correctly process child modules when creating an aggregate project. Included in the change were several other issues end users have contacted me about. Reduced false negatives with regard to some versions of Spring. Fixed issue 196 - Some JAR files do not contain POM files yet a full POM is available from Central or alternatively Nexus . Both the Central and Nexus analyzers will now look for and retrieve the POM if one has not been found locally. A result of this change is that if both the Central and Nexus analyzer are disabled there is a chance of false negatives i.e. the dependency could not be correctly identified as vulnerable . Fixed issue 185 - Maven aggregate reports now display the project name that references vulnerable dependency. We continue to get help from the github community This release includes PRs from Ahmet Kiyak and Hans Joachim Desserud. Thanks for all your help OWASP CISO Guide Translated into Spanish ---------------------------------------- You can reference it HERE. --------------------------------------------------------------------- Social Media OWASP Social Media OWASP Social Media Sites ------------------------ OWASP YouTube Channel LinkedIn Twitter Google Facebook Ning StackOverflow




AddThis Social Bookmark Widget



Les derniers articles du site "Open Web Application Security Project" :

- Purchase an OWASP Individual Membership or Renew your Existing for a chance to WIN
- OWASP Connector Newsletter - March 31, 2016
- March 2016 Community News Flash
- OWASP Connector Newsletter - February 25, 2016
- February 2016 Community News Flash
- January 2016 OWASP Connector Newsletter
- January 2016 - Community News Flash
- OWASP Projects - Global Improvements Benchmark Specifics
- December 2015 Connector
- December 2015 - Community News Flash




S'abonner au fil RSS global de la revue de presse

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]



Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :