Private Internet Access - Open Source Repository
Lynis – Open source security auditing tool Detailed Explanation
Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world
I apologize upfront for tooting a Medium article, but the OSINT info is pretty good.
OSINT: How to find information on anyone - Petro Cherkasets
Activate This ‘Bracelet of Silence,’ and Alexa Can’t Eavesdrop
This includes the possibility of using your Android phone as a Security Key via Bluetooth or NFC.
OpenSSH adds support for FIDO/U2F security keys
US Cyber Command, DHS, and FBI expose new North Korean malware | ZDNet
Signal Is Finally Bringing Its Secure Messaging to the Masses | WIRED
How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4 — Artifice Security
I am hoping the PS5 will be a total disaster for Sony. Their corrupt model of control, horrible customer service and lamentable security should drive all gamers to other platforms.
Sony Is Struggling With PlayStation 5 Price Due to Costly Parts - Bloomberg
OWASP SAMM (Software Assurance Maturity Model) is the OWASP framework to help organizations assess, formulate, and implement, through our self-assessment model, a strategy for software security they can be integrated into their existing Software Development Lifecycle (SDLC).
Coronavirus ‘Hits All the Hot Buttons’ for How We Misjudge Risk
Oooh, I want to join the Fediverse SOC!
"Mutuum Foedus Inure"
Now I know how I will help fund my early retirement. F**King RoboCallers
Install app, get burner credit card number and then "sue them for as much as $3,000 per call under the Telephone Consumer Protection Act (TCPA)".
I read it and am still trying to figure out what it's all about. 🤨
How the CIA used Crypto AG encryption devices to spy on countries for decades - Washington Post