Étude : Les trois quarts des grandes entreprises françaises ne parviennent pas à communiquer efficacement quant à leurs politiques de nettoyage de données en interne. Les disparités entre la création et la mise en application des politiques de nettoyage de données mettent en péril les données sensibles.
Source de l’article sur UNDERNEWS

The realistic approach to security is that incidents occur. While ideally, the CISO would want to prevent all of them, in practice, some will succeed to a certain degree—making the ability to efficiently manage an incident response process a mandatory skill for any CISO. Moreover, apart from the management of the actual response process, the CISO must also be able to efficiently communicate
Source de l’article sur The Hacker News

Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks. According to researchers at Binary Defense, the newly discovered Emotet sample leverages a « Wi-Fi spreader » module to scan Wi-Fi networks, and then attempts to
Source de l’article sur The Hacker News

La cybersécurité n’est plus un luxe, mais bien une nécessité autant pour les PME que les multinationales. Elle est au cœur de toutes les préoccupations des entreprises, qui la perçoivent encore trop comme un problème technologique. Pour Resadia, groupe d’experts IT en France, il s’agit bien d’un problème humain avant tout.
Source de l’article sur UNDERNEWS

Le taux d’équipement électronique chez les enfants et les adolescents ne cesse de croître : à 10 ans, 35% possèdent leur propre console de jeu, 28% leur propre tablette, et 11% leur propre téléviseur. Le téléphone portable arrive également très vite : 65 % des 11 et 14 ans possèdent le leur (étude médiamétrie).
Source de l’article sur UNDERNEWS

A few hours after Adobe today released security updates for five of its widely-distributed software, Microsoft also issued its February 2020 Patch Tuesday edition with patches for a total of 99 new vulnerabilities. According to the advisories, 12 of the total issues patched by the tech giant this month are critical in severity, and the remaining 87 have been listed as important. Five of the
Source de l’article sur The Hacker News

Here comes the second ‘Patch Tuesday’ of this year. Adobe today released the latest security updates for five of its widely used software that patch a total of 42 newly discovered vulnerabilities, 35 of which are critical in severity. The first four of the total five affected software, all listed below, are vulnerable to at least one critical arbitrary code execution vulnerability that could
Source de l’article sur The Hacker News

The United States Department of Justice today announced charges against 4 Chinese military hackers who were allegedly behind the Equifax data breach that exposed the personal and financial data of nearly 150 million Americans. In a joint press conference held today with the Attorney General William Barr and FBI Deputy Director David Bowdich, the DoJ officials labeled the state-sponsored
Source de l’article sur The Hacker News

La fin d’année aura été une période fructueuse pour les cybercriminels, s’attaquant aux utilisateurs en quête de bonnes affaires. Le Black Friday, le Cyber Monday, les achats de Noël ou encore le Nouvel An lunaire ont entraîné non seulement une croissance des ventes mais aussi des activités malveillantes. Les chercheurs de Kaspersky ont détecté une augmentation de 9,5 % […]
Source de l’article sur UNDERNEWS

OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery

The OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques.

Information Gathering Techniques Used by OWASP Amass for DNS Enumeration and More

The main functionality of Amass is as follows:

  • DNS: Basic enumeration, Brute forcing (optional), Reverse DNS sweeping, Subdomain name alterations/permutations, Zone transfers (optional)
  • Scraping: Ask, Baidu, Bing, DNSDumpster, DNSTable, Dogpile, Exalead, Google, HackerOne, IPv4Info, Netcraft, PTRArchive, Riddler, SiteDossier, ViewDNS, Yahoo
  • Certificates: Active pulls (optional), Censys, CertSpotter, Crtsh, Entrust, GoogleCT
  • APIs: AlienVault, BinaryEdge, BufferOver, CIRCL, CommonCrawl, DNSDB, GitHub, HackerTarget, IPToASN, Mnemonic, NetworksDB, PassiveTotal, Pastebin, RADb, Robtex, SecurityTrails, ShadowServer, Shodan, Spyse (CertDB & FindSubdomains), Sublist3rAPI, TeamCymru, ThreatCrowd, Twitter, Umbrella, URLScan, VirusTotal, WhoisXML
  • Web Archives: ArchiveIt, ArchiveToday, Arquivo, LoCArchive, OpenUKArchive, UKGovArchive, Wayback

Usage of Amass for DNS Enumeration, Attack Surface Mapping & External Asset Discovery

The Amass tool has several subcommands shown below for handling your Internet exposure investigation.

Read the rest of OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery now! Only available at Darknet.

Source de l’article sur Darknet