Found 77 bookmarks
Newest
When Technology Takes Hostages: The Rise of 'Stalkerware'
When Technology Takes Hostages: The Rise of 'Stalkerware'
NSA zero-days and sophisticated state surveillance tools get all the headlines. But we’re overlooking the dangerous, life-threatening, rise of “stalkerware,” which enables domestic violence.
·vice.com·
When Technology Takes Hostages: The Rise of 'Stalkerware'
Domestic Violence Support | The National Domestic Violence Hotline
Domestic Violence Support | The National Domestic Violence Hotline
24 hours a day, seven days a week, 365 days a year, the National Domestic Violence Hotline provides essential tools and support to help survivors of domestic violence so they can live their lives free of abuse.
·thehotline.org·
Domestic Violence Support | The National Domestic Violence Hotline
How to Gather Technology Abuse Evidence for Court | NCJFCJ
How to Gather Technology Abuse Evidence for Court | NCJFCJ
If someone is using technology like text messages, email, or social media (like Facebook) to harass you, this guide will help you “capture” the evidence of the harassment, so you can bring it to court. You might think you can just show the judge your phone in court—but you probably won’t be allowed to just […]
·ncjfcj.org·
How to Gather Technology Abuse Evidence for Court | NCJFCJ
Webinar: Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Netlogon Elevation of Privilege Vulnerability with Mimikatz Integration - Immersive Labs
Webinar: Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Netlogon Elevation of Privilege Vulnerability with Mimikatz Integration - Immersive Labs
In this Anatomy of a Hack pre-recorded webinar, you’ll discover the details around the Zerologon vulnerability, how it works, and what’s at risk. Watch now!
·immersivelabs.com·
Webinar: Anatomy of a Hack: Hands-on Red Teaming with the “Zerologon” Netlogon Elevation of Privilege Vulnerability with Mimikatz Integration - Immersive Labs
Local Privilege Escalation on SaltStack Minions | Mat Rollings | Immersive Labs
Local Privilege Escalation on SaltStack Minions | Mat Rollings | Immersive Labs
Mat Rollings, Vulnerable App Developer at Immersive Labs, has uncovered a command injection vulnerability in SaltStack's Salt programme.
·immersivelabs.com·
Local Privilege Escalation on SaltStack Minions | Mat Rollings | Immersive Labs
When the sun bursts: responding to global cyber events - Immersive Labs
When the sun bursts: responding to global cyber events - Immersive Labs
The US government was recently hit by a severe cyberattack, SUNBURST, allegedly masterminded by Russian nation-state hackers directly affiliated to the GRU (UNC2452 or Cozy Bear). One of the frightening things about this hack wasn’t its scale or high-profile targets, but that it was not reasonably preventable. Most cyberattacks are triggered by a human error...
·immersivelabs.com·
When the sun bursts: responding to global cyber events - Immersive Labs
What does it take to keep young hackers on the right path? - Immersive Labs
What does it take to keep young hackers on the right path? - Immersive Labs
Most UK cybercrime suspects are on average just 17 years old. How can we help young hackers harness their cybersecurity skills and stay on the right path?
·immersivelabs.com·
What does it take to keep young hackers on the right path? - Immersive Labs
Cyber Crisis Simulator: Weathering the storm: public vs private crises - Immersive Labs
Cyber Crisis Simulator: Weathering the storm: public vs private crises - Immersive Labs
You can’t always anticipate a data breach. What do you do when the unexpected happens at a high-security organization? What if national secrets are now in the hands of your adversaries?
·immersivelabs.com·
Cyber Crisis Simulator: Weathering the storm: public vs private crises - Immersive Labs