Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

Fwd OWASP Foundation April 21 Connector

Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]

S'abonner au fil RSS global de la revue de presse



Fwd OWASP Foundation April 21 Connector

Par Open Web Application Security Project
Le [2015-04-22] à 19:24:57



Présentation : OWASP Global Connector April 22, 2015 www.owasp.org Contact Us Brought to you by the OWASP Foundation Communications OWASP in the News 2015 WASPY awards and Global Board Elections OWASP Translations New Hacking-Lab Challenges Support OWASP through Amazon Smile projects OWASP KALP Mobile project OWASP OpenSAMM OWASP ZAP 2.4.0 is now available Introduction to using ZAP with Docker OWASP AppSensor - CISO Briefing OWASP WASC Web Hacking Incidents Database Project OWASP Automated threats to Web Applications Project Conference Global AppSec Events Local and Regional Events Partner and Promotional Events chapters New OWASP Chapters Chapter Transitions Chapter Activities Updates to the Chapter Leader Handbook membership Corporate Members Social Media OWASP Foundation Social Media --------------------------------------------------------------------- --------------------------------------------------------------------- Communications OWASP Communications OWASP in the NEWS ------------------ OWASP Projects and activities are often the subject of webcasts and podcasts. Sit back and relax as you watch and listen to these recent episodes. Simon Bennetts - FLOSS Weekly ZAP interview North Sweden Chapter leaders, Markus Orebrand and Magnus Hultdin were featured in an Infotech Umea article Fabio Cerullo - OWASP and 2015 LATAM Tour - Mundo Hacker TV HP and OWASP Internet of Things Top Ten at RSA conference - A Good Housekeeping Seal for the Connected Home Security Ledger Mark Miller - OWASP 24 7 Podcast Series 2015 Global Board elections and WASPY Awards -------------------------------------------- Be on the lookout for more information on the upcoming Elections and Annual Awards The election process will begin May 1 with the Global Board call for candidates. More information will follow via email. OWASP Translation ----------------- Thank you to the local teams for translating OWASP documentation into many different languages. CISO Guide in Spanish New Hacking Lab Challenges -------------------------- The Hacky Easter challenges have returned Hacky Easter 2015 is a free, white-hat hacking competition for education and fun. The competition runs until May 31, 2015. CLICK HERE to access the challenges Good luck to all. Support OWASP Through Amazon Smile ---------------------------------- Did you know that when you access Amazon through the special OWASP Charity link OWASP received a percentage of the purchase This is an easy way to help support OWASP. 100pourcents of proceeds collected through Amazon Smile in 2015 will support the Women in AppSec initiative. --------------------------------------------------------------------- projects OWASP Projects OWASP KALP Mobile project ------------------------- OWASP KALP Mobile Project is for the users around the world who want to view the OWASP Top 10 vulnerabilities, download the Top 10 list on their mobile device, and email it. This is a lightweight information of OWASP Top 10 list, Cheat Sheets as well as Prevention Cheat Sheets created from the OWASP site. Visit the project page for links to download the application for Android and iOS devices. OpenSAMM Consortium Launches Industry's First Public Benchmarking Data for Improving Software Security ---------------------------------------------------------------------- OpenSAMM is an easy-to-use assessment which provides flexible datasets that can be customized by organization demographics, including sector, development and cultural profile, resulting in pragmatic milestones towards reducing overall security risk. The expanded access to these datasets makes OpenSAMM available to a larger number of organizations, which previously weren't able to apply valuable benchmarking data to their particular case. Each of the practical, constructive benchmarks within the framework was derived from best practices of leading application security firms. Read the entire press release HERE Open SAMM Project Page OWASP ZAP 2.4.0 is now available -------------------------------- Complete details of all the changes, visit the ZAP release Blog Post Some of the highlights are New Attack mode Advanced Fuzzing Access Control Testing UI Changes and much, much, much more Please consider attending the very first ZAP Summit which will take place at AppSec EU in Amsterdam on May 20, 2015. Attendees will have the opportunity to learn and extend their knowledge as well as hands on activities. Admission to the summit is free Introduction to using ZAP with Docker ------------------------------------- Following the latest release of ZAP 2.4.0, Samuli Elomaa has written a brief introduction to using ZAP with Docker What can you do with ZAP docker images The main advantages are Integrating ZAP as part of docker based build deploy CI-process in order to run non-interactive ZAP active scanning against other docker containers within the same cloud. Quickly deploying ZAP to docker friendly datacenter in order to use ZAP for scanning applications behind firewalls. Having the latest ZAP stable weekly release inside isolated container in your personal workstation. Read the full article with step by step instructions for usining ZAP with Docker at the OWASP Blog. OWASP AppSensor - CISO Briefing ------------------------------- AppSensor is about detecting and responding to attacks within software applications. In February the project team created a two-page flyer AppSensor - Introduction for Developers And now in April, a new 12-page booklet AppSensor - CISO Briefing has also been finalised The CISO Briefing is also available to buy at cost in hardcopy. These materials are intended to complement the more extended information on the microsite http www.appsensor.org , project wiki and AppSensor - Guide. AppSensor is also participating in the project summit at AppSec EU in May. OWASP WASC Web Hacking Incidents Database Project ------------------------------------------------- WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. A useful way to use WHID is to help provide data for Likelihood of Attack RISK ratings. There is a lot of public vulnerability data publicly available, but which ones are actively being used by attackers Read more, find Top 10 mappings, and submit an incident by visiting WASC Web Hacking Incidents Database project page OWASP Automated Threats to Web Applications Project --------------------------------------------------- There is significant knowledge about application vulnerability types, and some general consensus about identification and naming. Issues relating to the misuse of valid functionality, which may be related to design flaws rather than implementation bugs, are less well defined. Yet these problems are seen day-in day-out by web application owners. Excessive abuse of functionality is commonly mistakenly reported as application denial-of-service DoS such as HTTP-flooding or application resource exhaustion, when in fact the DoS is a side-effect. Some examples are blog comment spam, fake account creation, password cracking, web scraping, etc. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues. The OWASP Automated Threats to Web Applications Project is in the process of reviewing reports, academic and other papers, news stories and vulnerability taxonomies listings to identify and name classes of these - threat events to web applications that are undertaken using automated actions. The aim is to produce an ontology providing a common language for devops, architects, business owners, security engineers, purchasers and suppliers vendors, to facilitate clear communication and help tackling the issues. The project also intends to identify symptoms, mitigations and controls in this problem area. But for the moment the project would like to receive real-world experience on the prevalence and naming of such threats - especially from those responsible for the ongoing operation of web applications. One way to help would be to complete the new survey which has been published this week. Help identify real-world automated threats using this Google Form http goo.gl forms 9zKz56aAp5 For more information, please visit the Project Wiki Page --------------------------------------------------------------------- Conference OWASP Events Global AppSec Events -------------------- EU The Conference Program is Now Available Limited Seats are available in the pre conference Trainings Wednesday, May 20 - One day courses Android App Hacking - Internet Banking Edition Bootstrap and improve your SDLC with OpenSAMM Building Secure Single Page Applications Checking SSL TLS in Practice Tuesday and Wednesday, May 19-20 - Two day courses Assessing and Exploiting Web Apps with Samurai WTF Enterprise Business Application Security Attack and Defense Exploiting Websites by using offensive HTML, SVG, CSS, and other Browser-Evil Hands on Web and REST Testing Assessing Apps the OWASP way Javascript for Pentesters Ruby on Rails - Auditing Exploiting the Popular Web Framework Secure Java Coding Web Service and Single Sign-On Security Thursday and Friday 21st and 22nd May, 2015 are Conference Days including Keynotes, CISO, DEV, Hack, Ops, and Research talks, HackPra Allstars, Hands on sessions, and more ... USA 2015 AppSec USA 2015 September 22 - 25, 2015, San Francisco, CA Tickets Sales Now Open CLICK HERE to register Limited Sponsorships Are Still Available Career Fair Spaces now open Recruit the best AppSec Talent Spaces are limited. Please contact Kelly Santalucia for more information or to reserve your spot. Regional and Local Events ------------------------- LASCON 2015 October 19-22, 2015 Austin, TX AppSec Rio de la Plata 2015 November 17-20, 2015 Montevideo, Uruguay Partner and Promotional Events ------------------------------ AppsWorld Germany 2015 April 22-23, 2015 Berlin, Germany NCCDC April 24-26, 2015 San Antonio, TX AppsWold North America 2015 May 12-13, 2015 San Francisco, CA. OWASP members recieve 15pourcents off delegate passes. Enter voucher code I89GS APPSP15 SANS CyberTalent Fair May 14-15, 2015 Virtual, online BSides Knoxville May 15, 2015 Knoxville, TN International Conference on Cyber Security ICCS May 16-17, 2015 City of Redlands, CA. OWASP members receive 25pourcents off the general event fee. Discount code ICCSOWASP Cloud Security World 2015 May 19-21, 2015 New Orleans, LA..OWASP members receive a 25pourcents discount off standard event fee. Discount code CLD15-OWASP Hack In the Box May 26-29, 2015 OWASP members receive 20pourcents off by using discount code OWASP-HITB2015AMS SC Congress Toronto June 10 - 12, 2015 Toronto, Canada. Register with your owasp email address and receive a discount. Hack in Paris June 15-19, 2015 La Plaine Saint-Denis, Paris EuroPython 2015 July 20-26, 2015 Bilbao, Spain ISC 2 Security Congress APAC 2015 July 28-29, 2015 Manila, Philippines BlackHat USA August 1-6, 2015 Las Vegas, NV BSides Las Vegas August 4-5, 2015 Las Vegas, NV Info Security Malaysia Conference August 6, 2015 Kuala, Lumpur Security One2One Summit October 4-6, 2015 Austin, TX SecTor October 19-21, 2015 Toronto, CN --------------------------------------------------------------------- oneconsult symantec trustwave Ads are not endorsements and reflect the messages of the advertiser only. CLICK HERE for more information on advertising. --------------------------------------------------------------------- chapters OWASP Chapters New Chapters ------------ Leeds Beckett University New Student Chapter and Academic Supporter - Chapter Leaders - Joseph Gwynne-Jones - President, Christopher Easton - Vice President, James Johnson - Treasurer, Connor Wilson - Secretary, Cliffe Schreuders - Faculty Advisor Chapter Transitions ------------------- Manaus, Brazin - New Chapter Leader - Fabio Lapuinka Phoenix, AZ USA - New Chapter Leader - Joaquin Fuentes Charlottesville, VA USA - New Chapter Leader - Jeff Collyer UW Bothell Student Chapter - New Chapter Leaders - Tyler Laws, Brendan Sweeney Chapter Activities ------------------ OWASP Noida, India hosted a tour beginning April 6 to promote Cyber Safety Campaign Across India. The tour began on 6th April 2015 at the Poddar International School in Nagpur, Maharashtra, India Check out the event on Facebook Check out the Twitter Feed Share your chapter's successes Submit your stories here Updating the Chapter Leader Handbook ------------------------------------ Noreen Whysel, OWASP Community Manager has begun processing your comments and suggested changes to the Chapter Leader Handbook To add your comments, go to the Chapter Handbook page. On each chapter of the handbook, click the Discussion tab at the top left of the page to review the suggested changes. You will need to log in to add your own suggestions. At this time do not make any edits to the Chapter Leader Handbook pages. Only add suggestions to the Discussion page. Please contact Noreen if you need assistance. --------------------------------------------------------------------- Membership OWASP Membership New Corporate Members --------------------- Symantec Renewed Corporate Members ------------------------- Acunetix Rakuten Trustwave --------------------------------------------------------------------- Social Media OWASP Social Media OWASP Social Media Sites ------------------------ OWASP YouTube Channel LinkedIn Twitter Google Facebook Ning StackOverflow




AddThis Social Bookmark Widget



Les derniers articles du site "Open Web Application Security Project" :

- Purchase an OWASP Individual Membership or Renew your Existing for a chance to WIN
- OWASP Connector Newsletter - March 31, 2016
- March 2016 Community News Flash
- OWASP Connector Newsletter - February 25, 2016
- February 2016 Community News Flash
- January 2016 OWASP Connector Newsletter
- January 2016 - Community News Flash
- OWASP Projects - Global Improvements Benchmark Specifics
- December 2015 Connector
- December 2015 - Community News Flash




S'abonner au fil RSS global de la revue de presse

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]



Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :