PLABS
softwareguideswar roomaboutgo-home
Latest Configuration Guides
Platform Title
Date
Red Hat Enterprise Linux 6.5 Snort Intrusion Detection System w/ Barnyard2 and PostgreSQL Support
February 9, 2014
Red Hat Enterprise Linux 6.4 Apache 2 Web Server w/ PHP5, OpenSSL, Suhosin and PostgreSQL, MySQL, IBM DB2 and/or Oracle Databases
May 24, 2013
IBM AIX 7.1 Setting Up TCP/IP, SSH and a GNU C / C++ Development Environment on AIX
January 9, 2012
Affiliations

The Cavalry is a global grassroots organization that is focused on issues where computer security intersects public safety and human life. We strive to ensure that these technologies are worthy of the trust we place in them.

Media and Research Requests
For journalists of all media, please use my PGP key for e-mail communications. Most requests I receive are for validating claims of major security events or vulnerabilities.

About one out of every five events I examine turn out to be fully or partially true. Our little community is increasingly becoming filled with rotten apples.

There is also an assumption of anonymity on my part, with exceptions only in very specific and authorized situations.


For research discoveries and disclosure, I already have a trusted list of journalists. For individuals and groups looking to include me in their efforts, please communicate using my PGP key listed above. Do your due dilligence first. I get a lot of requests and vetting what is legitimate is time consuming..
threatpost|  News

Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

16 October 2017 - A flawed Infineon Technology chipset left HP, Lenovo and Microsoft devices open to what is called a 'practical factorization attack,' in which an attacker computes the private part of an RSA key.

Adobe Patches Flash Zero Day Exploited by Black Oasis APT

16 October 2017 - Adobe today released an out-of-band Flash Player update addressing a zero-day vulnerability being exploited by a little-known Middle Eastern APT group called Black Oasis.

KRACK Attack Devastates Wi-Fi Security

16 October 2017 - The KRACK, or key reinstallation attack, disclosed today allow attackers to decrypt encrypted traffic, steal data and inject malicious code depending on the network configuration.

Cyberespionage Group Steps Up Campaigns Against Japanese Firms

14 October 2017 - Researchers unearth new tactics and strategies used by the criminals behind the hacking group known as Bronze Butler.

Hyatt Hit By Credit Card Breach, Again

13 October 2017 - Hyatt said its payment systems have been breached, exposing credit card data from 41 hotels in 11 countries between March and July this year.

Snort  |  Blog

Snort Subscriber Rule Set Update for 10/12/2017

12 October 2017 - Just released:Snort Subscriber Rule Set Update for 10/12/2017We welcome the introduction of the newest rule release from Talos. In this release we introduced 34 new rules of which 17 are Shared Object rules and made modifications to 11 additional rules of which 0 are Shared Object rules. There were…

Snort 2.9.11.0 has been released!

11 October 2017 - Please join the Snort team as we welcome the addition of Snort 2.9.11.0 to general availability!Snort 2.9.11.0 can be downloaded from the usual location on Snort.org.Below are the release notes:Snort 2.9.11[*] New additionsChanges to eliminate Snort restart when there are changes to the memory alloc…

Snort Subscriber Rule Set Update for 10/10/2017, MSTuesday

10 October 2017 - Just released:Snort Subscriber Rule Set Update for 10/10/2017, MSTuesdayWe welcome the introduction of the newest rule release from Talos. In this release we introduced 33 new rules of which 6 are Shared Object rules and made modifications to 28 additional rules of which 2 are Shared Object rules. T…

Snort Subscriber Rule Set Update for 10/05/2017

5 October 2017 - Just released:Snort Subscriber Rule Set Update for 10/05/2017We welcome the introduction of the newest rule release from Talos. In this release we introduced 21 new rules of which 4 are Shared Object rules and made modifications to 12 additional rules of which 1 are Shared Object rules. There were n…


© 2001-2017 Procyon Labs / Randal T. Rioux