APWG: Two-Thirds of all Phishing Sites Used SSL protection in Q3

APWG: Two-Thirds of all Phishing Sites Used SSL protection in Q3

| | APWG, HTTPS
This week, APWG released its findings from Q3 that compiles insights from their member companies and provides an analysis of how phishing is changing. The key findings from the latest report show ...
NetworkMiner 2.5

NetworkMiner 2.5 Released

I am happy to announce the release of NetworkMiner 2.5 today! This new version includes new features like JA3 and parsers for the HTTP/2 and DoH protocols. We have also added support ...

Microsoft OneDrive Personal Vault, Google’s New Privacy and Security Controls, REAL ID Deadline

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 89 for October 7th 2019: Microsoft’s new OneDrive personal ...
Raspberry Pi 4 Model B running PolarProxy

Raspberry PI WiFi Access Point with TLS Inspection

This is a how-to guide for setting up a Raspberry Pi as a WiFi Access Point, which acts as a transparent TLS proxy and saves the decrypted traffic in PCAP files. Image: ...
APWG: Phishing Continues to Rise, Threat Actors Love Gift Cards

APWG: Phishing Continues to Rise, Threat Actors Love Gift Cards

| | APWG, bec, HTTPS, Phishing
This week APWG released its findings from Q2 of this year that compiles insights from their member companies and provides an analysis of how phishing is changing. This quarter's report shows that ...
HTTP websites marked as not secure

WordPress HTTPS, SSL & TLS – A Guide For Website Administrators

When you visit a website, your browser (also known as a client) sends a HTTP request to a web server. Once the web server sends an HTTP response, the browser can then ...
EH-Net - Chappell - Top 10 Uses of Wireshark for Hackers Part II

Top 10 Uses of Wireshark for Hackers Part II

In a world... OK, just kidding. This isn't a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a ...

Simple Security Configuration Can Help Your Sensitive Data From Being Stolen

When malware sneaks inside your network, it needs to communicate back to the internet whether to exfiltrate sensitive datasets it found, accept commands of its evil masters or even simply let them ...
Detecting and Mitigating HTTPS Floods…Without Decryption Keys

Detecting and Mitigating HTTPS Floods…Without Decryption Keys

What is an HTTPS flood attack? Why is everybody talking about it these days? And is it really such a big threat? HTTPS flood attack is a generic name for DDoS attacks ...
More Than Half of Phishing Sites Now Use HTTPS

More Than Half of Phishing Sites Now Use HTTPS

| | HTTPS
As Google Chrome and other web browsers further embrace HTTPS in a visual way, it’s becoming a requirement that threat actors use it, too. By the end of Q1 2019, more than ...
Loading...