Skip to content

Security: pelmenept/awesome-tech

Security

docs/security.md

Table of Contents

top business concern for security

<script async src="https://secure.assets.tumblr.com/post.js"></script>

RT @cloudsa: Want to know what the future holds for #cloudsecurity? Listen to @EMEACloudGuy's & @jimreavis's chat: https://t.co/R9GYrRr2ix

โ€” Red Hat EMEA (@RedHatEMEA) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

ddos_attacks_growing

digital attack map

Dave vs Security: This is why you automate security into your process. #cybersecurity #devops #secops pic.twitter.com/H3Nn0GAGt5

โ€” Greg Bledsoe (@geek_king) 31 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

make_rhel7_pci-dss

zdnet_api_code_security

gartner_security_predictions

How to Apply DevOps Culture to Security#DevOpshttps://t.co/8UMlDqKahE

via #MVB @petecheslock pic.twitter.com/RBpCxGDsTQ

โ€” DZone (@DZone) 27 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

cybersecurity_skills_gap

Josh, how does Red Hat deal with security issues?#CUBEgems @joshbressers @RedHatNews #RHSummit #theCUBE pic.twitter.com/nvCSCG1pT6

โ€” theCUBE (@theCUBE) 29 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Cover up your laptop camera right nowhttps://t.co/3Orx88WqEH

โ€” Tech Insider (@techinsider) 29 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

ics-cert

owasp_video owasp_zap_video sophos_videos fortinet_videos tpsc_video
firewalls_channel secure_ninja_tv network_security_video kali_linux_video NetSecNow sophos_iberia_video

Security

Awesome Security Lists

CVE Common Vulnerabilities and Exposures

cve_details

The European Commission to audit Apache HTTP Server & @KeePass https://t.co/IINqtuQSwV #opensource #linux #sysadmin pic.twitter.com/Kg2EJdGyEg

โ€” nixCraft (@nixcraft) 21 de julio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

OWASP Open Web Application Security Project

owasp_testing_guide

Seguridad Web

<iframe width="560" height="315" src="https://www.youtube.com/embed/t4UgRVPvcOc?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

PHP Security

OpenSCAP and Lynis. Open Source security auditing tools

Cisco Security Advisories and Responses

Security Blogs

hack_in_the_security_conference

6 cybersecurity and emergency situations every IT depart should train for https://t.co/bXt7mDf9BA by @patgrayjr pic.twitter.com/gvGygVZGVc

โ€” TechRepublic (@TechRepublic) 27 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

When someone tells you that a firewall or Linux will solve all of their problems... #truth pic.twitter.com/bhTi0dgLQu

โ€” nixCraft (@nixcraft) 5 de agosto de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe width="560" height="315" src="https://www.youtube.com/embed/kF7nkpEPmZg?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

I'm trying to get out of server security mess created by incompetent sysadmin. #Truth #Life pic.twitter.com/uYii1k5VKr

โ€” nixCraft (@nixcraft) 21 de agosto de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

should I write my own crypto library?

[x] yes
[x] fuck yes

โ€” YOLO Crypto (@yolocrypto) 8 de octubre de 2014
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security articles

Blogs de Seguridad Informรกtica

Network Security

Security on Twitter

I love it when a hotel takes password security seriously. pic.twitter.com/mK9hLEjSGe

โ€” Help Net Security (@helpnetsecurity) 29 de diciembre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Seguridad en Twitter

<iframe width="560" height="315" src="https://www.youtube.com/embed/5zlzdQe7nig?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Facebook, Google, and WhatsApp are all planning to increase encryption https://t.co/K0Roq7nENd pic.twitter.com/fK9xhW3jx5

โ€” BI Tech (@SAI) 14 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

#Linux Webserver #Security is out! https://t.co/UcwrNmJIEm Stories via @Dinosn @sidekickhelps @Akwelz

โ€” Linux Security News (@LinuxSec) febrero 15, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

El lado del mal - ยฟPor quรฉ sale el candado rojo en los mensajes de Gmail? https://t.co/Qd1sxGy87E #Gmail }:) pic.twitter.com/EwQZUYPOuB

โ€” Chema Alonso (@chemaalonso) febrero 11, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

.@chemaalonso @LaVanguardia "internet es tan seguro como lo es el mundo hoy en dรญa " pic.twitter.com/aFMen7nErc

โ€” Diego Ruiz Moreno (@diegodron) 12 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

SMShing para robar tu 2nd Factor Authentication en tus cuentas Google o Apple #SMShing https://t.co/IujqX1ZZOb }:) pic.twitter.com/U6TrIMFZdO

โ€” Chema Alonso (@chemaalonso) 5 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Be warned, there's a nasty Google 2 factor auth attack going around. pic.twitter.com/c9b9Fxc0ZC

โ€” Alex MacCaw (@maccaw) 4 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

For you Wi-Fi nerds: A visual representation of WEP security on WLAN's. pic.twitter.com/Q5Sh9t7x3I

โ€” Michael Dorman (@_mdorman) 3 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

New SonicAlert: Microsoft Windows&trade; OS HTTP User-Agents (1/29/2016) by @DellSecurity Threats Research: https://t.co/hkm4abXYd4

โ€” Dell Security (@DellSecurity) febrero 1, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

The best way to visualize encryption to those who don't understand it over the Internet. Key Exchange https://t.co/6fwikgx9jc #security

โ€” nixCraft (@nixcraft) febrero 19, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Who's fixing containers? https://t.co/vltcct17s7 #glibc #ITsecurity #containers

โ€” Open Source Way (@opensourceway) febrero 19, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Why we use adblockers: 'We need to have more control over what we're exposed to' https://t.co/TvMoWgAExA pic.twitter.com/s6uwF5cPqh

โ€” The Guardian (@guardian) 10 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

3 months and 1 Million SSH attempts later https://t.co/3Mst0W0K44 #openssh #openbsd #unix #linux #opensource #linux #infosec #security

โ€” nixCraft (@nixcraft) 21 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security Virtualisation - what is it? https://t.co/agayoDZlvR #sdn #nfv @NatilikSEC

โ€” James Talbot (@jamesrtalbot) 25 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

"Securing Your Virtual Environment" https://t.co/IJXr5RfNnZ #RedHatConsulting #RedHat

โ€” Jose Simonelli (@ubercloud) 14 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/t0MvDZbR7oHOH3" width="668" height="714" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//www.slideshare.net/slideshow/embed_code/key/pXRqukKAUn7xq6" width="668" height="714" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Citibank IT guy deliberately wiped routers, shut down 90% of networks https://t.co/go9nfo936x pic.twitter.com/Df4ZMtccUF

โ€” Graham Cluley (@gcluley) 28 de julio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

What Is Fork Bomb And How Can You Prevent This Danger? | Unixmen https://t.co/zR64RHQlpI

โ€” Unixmen (@unixmen) 16 de octubre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security Podcasts

Security Toolkits and Policies. Penetration Testing

Antivirus and malware

nomoreransom

mac users malware

sophos_security_podcast

More info on Transmission app and new Mac ransomware https://t.co/z54gbNicbi via @aallan

VirusTotal has more info https://t.co/s4LWzSTfsG

โ€” nixCraft (@nixcraft) 6 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

software with most vulnerabilities

Los 8 tipos de #malware mรกs peligrosos para pymes y autรณnomos. https://t.co/6KuN7ti8L8 pic.twitter.com/v73IsCes0U via @ticbeat

โ€” Derecho de la Red (@DerechodelaRed) 25 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

dell_ransomware

<iframe width="560" height="315" src="https://www.youtube.com/embed/wn-uVP8HncA?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="100%" height="450" scrolling="no" frameborder="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/117239445&auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&visual=true"></iframe>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/vA2rJOLbXpC0K1" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/kWHezyAW85A?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Mirai Botnet Is Now Threat To Cellular Modems Made By Sierra https://t.co/WuIgfdYhmP #IoT #DDoS #Infosec #Security

โ€” nixCraft # (@nixcraft) 14 de octubre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

XSS and CSRF attacks

<iframe src="//www.slideshare.net/slideshow/embed_code/key/s7nsrrOnbcfVYG" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Mobile Security

mobile_security

Private Browsing

HTTPs and HSTS

Database encryption and security

Identity Management

Red Hat Identity Manager: Part 1 โ€“ Overview and Getting started https://t.co/b6HOQO4dVU

โ€” RHELdevelop (@RHELdevelop) 29 de abril de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

passwords

Good old admin/password via https://t.co/Mffd04MHFd pic.twitter.com/qONaLnMTAU

โ€” Linux Inside (@tecmint) 15 de octubre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe width="1280" height="720" src="https://www.youtube-nocookie.com/embed/KY4u5uEkF94?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Forcing users to change their passwords may do more harm than good https://t.co/7F4SjQDQMF @jackschofield pic.twitter.com/cyTv9smkpH

โ€” ZDNet (@ZDNet) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Top 11 AWS IAM Best Practices https://t.co/VnLgDpCo5c

โ€” Gin soaked boy (@integralist) enero 28, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Big news: We acquired Critical Path making us undisputed leader in white-label messaging systems #acquisition #pe http://t.co/ekq2da5Thr

โ€” Openwave Messaging (@owMessaging) 4 de diciembre de 2013
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Cable/broadband operators fear losing content to OTT players but still take the risk says Incognito Software survey http://t.co/VjVL3DRorO

โ€” Openwave Messaging (@owMessaging) 2 de agosto de 2013
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe width="560" height="315" src="https://www.youtube.com/embed/q7dpcDA8-8I?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/cNoVgDqqJmM?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Session Hijacking Detection

<iframe src="//www.slideshare.net/slideshow/embed_code/key/tP3JoZ7cHOke14" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Big Data Security

Take these steps to adopt a big data approach to security | https://t.co/YeanSkcT8R pic.twitter.com/vrsnN3luTA

โ€” Red Hat Training (@RedHat_Training) March 8, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Application Security: Web App Firewall. Blocking bots

Sawef - Send Attack Web Forms https://t.co/G2r90ecge6 pic.twitter.com/lxTp8HC4xY

โ€” DevOps Guy (@DevopsG) 8 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Plecost - Wordpress Vulnerabilities Finder https://t.co/Dc2tOgOP9R pic.twitter.com/DprDrRxvOm

โ€” DevOps Guy (@DevopsG) 8 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe src="//es.slideshare.net/slideshow/embed_code/key/XUythFr7ES5ap" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/NRQ8z1PRUUVVs6" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/Md0UCtdLgJUhd0" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/24h2tFCOR2T2PU" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Breaking Firewalls, Shellcode Injection, SQL Injection

Shellcode Injection

Email security. Anti Spam protection

Server Hardening

Next Generation Firewalls

NTP

Security Checklist

Security Checklist For Unix and Linux server #infosec #sysadmin https://t.co/QTwAlEQHOQ

โ€” nixCraft (@nixcraft) 20 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Major Security Vulnerabilities

PuTTY version 0.67 is released. This is a security update. https://t.co/7MXHcveBM6 #SSH #sysadmin #unix #linux

โ€” nixCraft (@nixcraft) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

I noticed there is no good visualization of the real Information Security triad, so i made one. You're welcome. #infosec pic.twitter.com/BAJvOIpVsh

โ€” Daniel Schatz (@virturity) 17 de noviembre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Keyloggers

Red Hat Vulnerabilities Catalog. Red Hat CVE Database.

  • Vulnerability Responses ๐ŸŒŸ๐ŸŒŸ Large scale security vulnerabilities like the ones below receive special attention from Red Hat Product Security. In order to create the best experience possible for our customers during these critical moments, a specialized vulnerability page is created within the Red Hat Product Security Center which aggregates information, diagnostic tools, and updates in one easy-to-use interface. This list is a catalog of these pages.

SQL injection

Windows Vulnerabilities

Linux Vulnerabilities

<iframe width="560" height="315" src="https://www.youtube.com/embed/kEsshExn7aE?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Heartbleed. April 2014

Shellshock. September 2014

Java Serialization Vulnerability. November 2015

HTTPS Bicycle Attack. December 2015

Backdoors. December 2015

LastPass. January 2016

  • LastPass I have discovered a phishing attack against LastPass that allows an attacker to steal a LastPass user's email, password, and even two-factor auth code, giving full access to all passwords and documents stored in LastPass. I call this attack LostPass.
  • ZDNet: LastPass phishing attack avoids two-factor authentication in data theft The exploited security flaw is severe enough that successful attacks compromise two-factor authentication codes.

OpenSSH Roaming Bug. January 2016

OpenSSL. January 2016

Linode SSH. February 2016

glibc stack based buffer overflow. February 2016

DROWN Attack. Cross protocol attack on TLS using SSLv2. March 2016

OpenSSH Security Advisory. March 2016

SSH attempts

Bad Tunnel. June 2016

HTTP/2. August 2016

DDos

What is a #DDoS attack. As for protecting yourself, put your site on a CDN https://t.co/6y3G7fDsNl pic.twitter.com/g0dBHvyRbt

โ€” Laurent Perche (@Laurent_Perche) 30 de julio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

#DDoSfacts pic.twitter.com/PfCvVvchjh

โ€” Mikko Hypponen (@mikko) 21 de octubre de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

DNS Attack Analysis

<iframe width="560" height="315" src="https://www.youtube.com/embed/33LIeX3ZSTA?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Shadow IT security risks

Shadow IT is a real risk for #ITsecurity. And if you donโ€™t think itโ€™s happening in your organization, youโ€™re wrong. https://t.co/CfUa5AabP7

โ€” SAP Labs LA (@saplabsla) 4 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

httpoxy. July 2016

#httpoxy: A CGI application vulnerability for PHP, Go, Python and others.https://t.co/A7kb7ryIGi

โ€” httpoxy (@httpoxy) 18 de julio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Flip Feng Shui SSH Cross VM Exploit. August 2016

Top security initiatives for 2016

HEIST technique

Container security. Whoโ€™s fixing containers? February 2016

.@joshbressers discusses #Linux #security as a fundamental tenet, not a feature (and certainly not an option): https://t.co/Ks8cJMwFin

โ€” Red Hat, Inc. (@RedHatNews) 17 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

DDos and Project Shield. February 2016

glibc vulnerability docker

hot potato windows privilege escalation

intrusion response procedures

<iframe width="560" height="315" src="https://www.youtube.com/embed/ceg4hyrcHJc?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Disk Encryption

<iframe width="560" height="315" src="https://www.youtube.com/embed/SEsIO8T5R80?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/1Rk04NGQPr0?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/JKzrCvlfMhE?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="420" height="315" src="https://www.youtube.com/embed/ll4f0Wim4pM?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/S0zt4opqL18?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

There arenโ€™t any published security advisories