Skip to content

Security: cponcej/awesome-tech

Security

docs/security.md

Table of Contents

top business concern for security

<script async src="https://secure.assets.tumblr.com/post.js"></script>

RT @cloudsa: Want to know what the future holds for #cloudsecurity? Listen to @EMEACloudGuy's & @jimreavis's chat: https://t.co/R9GYrRr2ix

— Red Hat EMEA (@RedHatEMEA) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

ddos_attacks_growing

digital attack map

Dave vs Security: This is why you automate security into your process. #cybersecurity #devops #secops pic.twitter.com/H3Nn0GAGt5

— Greg Bledsoe (@geek_king) 31 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

make_rhel7_pci-dss

zdnet_api_code_security

gartner_security_predictions

How to Apply DevOps Culture to Security#DevOpshttps://t.co/8UMlDqKahE

via #MVB @petecheslock pic.twitter.com/RBpCxGDsTQ

— DZone (@DZone) 27 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

cybersecurity_skills_gap

Josh, how does Red Hat deal with security issues?#CUBEgems @joshbressers @RedHatNews #RHSummit #theCUBE pic.twitter.com/nvCSCG1pT6

— theCUBE (@theCUBE) 29 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Cover up your laptop camera right nowhttps://t.co/3Orx88WqEH

— Tech Insider (@techinsider) 29 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security

Awesome Security Lists

CVE Common Vulnerabilities and Exposures

OWASP Open Web Application Security Project

owasp_testing_guide

Seguridad Web

OpenSCAP and Lynis. Open Source security auditing tools

Cisco Security Advisories and Responses

Security Blogs

NetSecNow

hack_in_the_security_conference

6 cybersecurity and emergency situations every IT depart should train for https://t.co/bXt7mDf9BA by @patgrayjr pic.twitter.com/gvGygVZGVc

— TechRepublic (@TechRepublic) 27 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security articles

Blogs de Seguridad Informática

Network Security

Security on Twitter

Seguridad en Twitter

<iframe width="560" height="315" src="https://www.youtube.com/embed/5zlzdQe7nig?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Facebook, Google, and WhatsApp are all planning to increase encryption https://t.co/K0Roq7nENd pic.twitter.com/fK9xhW3jx5

— BI Tech (@SAI) 14 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

#Linux Webserver #Security is out! https://t.co/UcwrNmJIEm Stories via @Dinosn @sidekickhelps @Akwelz

— Linux Security News (@LinuxSec) febrero 15, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

El lado del mal - ¿Por qué sale el candado rojo en los mensajes de Gmail? https://t.co/Qd1sxGy87E #Gmail }:) pic.twitter.com/EwQZUYPOuB

— Chema Alonso (@chemaalonso) febrero 11, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

.@chemaalonso @LaVanguardia "internet es tan seguro como lo es el mundo hoy en día " pic.twitter.com/aFMen7nErc

— Diego Ruiz Moreno (@diegodron) 12 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

SMShing para robar tu 2nd Factor Authentication en tus cuentas Google o Apple #SMShing https://t.co/IujqX1ZZOb }:) pic.twitter.com/U6TrIMFZdO

— Chema Alonso (@chemaalonso) 5 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Be warned, there's a nasty Google 2 factor auth attack going around. pic.twitter.com/c9b9Fxc0ZC

— Alex MacCaw (@maccaw) 4 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

For you Wi-Fi nerds: A visual representation of WEP security on WLAN's. pic.twitter.com/Q5Sh9t7x3I

— Michael Dorman (@_mdorman) 3 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

New SonicAlert: Microsoft Windows&trade; OS HTTP User-Agents (1/29/2016) by @DellSecurity Threats Research: https://t.co/hkm4abXYd4

— Dell Security (@DellSecurity) febrero 1, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

The best way to visualize encryption to those who don't understand it over the Internet. Key Exchange https://t.co/6fwikgx9jc #security

— nixCraft (@nixcraft) febrero 19, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Who's fixing containers? https://t.co/vltcct17s7 #glibc #ITsecurity #containers

— Open Source Way (@opensourceway) febrero 19, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Why we use adblockers: 'We need to have more control over what we're exposed to' https://t.co/TvMoWgAExA pic.twitter.com/s6uwF5cPqh

— The Guardian (@guardian) 10 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

3 months and 1 Million SSH attempts later https://t.co/3Mst0W0K44 #openssh #openbsd #unix #linux #opensource #linux #infosec #security

— nixCraft (@nixcraft) 21 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Security Virtualisation - what is it? https://t.co/agayoDZlvR #sdn #nfv @NatilikSEC

— James Talbot (@jamesrtalbot) 25 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

"Securing Your Virtual Environment" https://t.co/IJXr5RfNnZ #RedHatConsulting #RedHat

— Jose Simonelli (@ubercloud) 14 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/t0MvDZbR7oHOH3" width="668" height="714" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//www.slideshare.net/slideshow/embed_code/key/pXRqukKAUn7xq6" width="668" height="714" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Security Podcasts

Security Toolkits and Policies. Penetration Testing

Antivirus and malware

mac users malware

sophos_security_podcast

More info on Transmission app and new Mac ransomware https://t.co/z54gbNicbi via @aallan

VirusTotal has more info https://t.co/s4LWzSTfsG

— nixCraft (@nixcraft) 6 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

software with most vulnerabilities

Los 8 tipos de #malware más peligrosos para pymes y autónomos. https://t.co/6KuN7ti8L8 pic.twitter.com/v73IsCes0U via @ticbeat

— Derecho de la Red (@DerechodelaRed) 25 de junio de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

dell_ransomware

<iframe width="560" height="315" src="https://www.youtube.com/embed/wn-uVP8HncA?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="100%" height="450" scrolling="no" frameborder="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/117239445&auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&visual=true"></iframe>
<iframe src="//www.slideshare.net/slideshow/embed_code/key/vA2rJOLbXpC0K1" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Mobile Security

mobile_security

Private Browsing

HTTPs and HSTS

Database encryption

Identity Management

Red Hat Identity Manager: Part 1 – Overview and Getting started https://t.co/b6HOQO4dVU

— RHELdevelop (@RHELdevelop) 29 de abril de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

passwords

<iframe width="1280" height="720" src="https://www.youtube-nocookie.com/embed/KY4u5uEkF94?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Forcing users to change their passwords may do more harm than good https://t.co/7F4SjQDQMF @jackschofield pic.twitter.com/cyTv9smkpH

— ZDNet (@ZDNet) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Top 11 AWS IAM Best Practices https://t.co/VnLgDpCo5c

— Gin soaked boy (@integralist) enero 28, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Big news: We acquired Critical Path making us undisputed leader in white-label messaging systems #acquisition #pe http://t.co/ekq2da5Thr

— Openwave Messaging (@owMessaging) 4 de diciembre de 2013
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Cable/broadband operators fear losing content to OTT players but still take the risk says Incognito Software survey http://t.co/VjVL3DRorO

— Openwave Messaging (@owMessaging) 2 de agosto de 2013
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe width="560" height="315" src="https://www.youtube.com/embed/q7dpcDA8-8I?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Big Data Security

Take these steps to adopt a big data approach to security | https://t.co/YeanSkcT8R pic.twitter.com/vrsnN3luTA

— Red Hat Training (@RedHat_Training) March 8, 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Application Security: Web App Firewall. Blocking bots

Sawef - Send Attack Web Forms https://t.co/G2r90ecge6 pic.twitter.com/lxTp8HC4xY

— DevOps Guy (@DevopsG) 8 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Plecost - Wordpress Vulnerabilities Finder https://t.co/Dc2tOgOP9R pic.twitter.com/DprDrRxvOm

— DevOps Guy (@DevopsG) 8 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<iframe src="//es.slideshare.net/slideshow/embed_code/key/XUythFr7ES5ap" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/NRQ8z1PRUUVVs6" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/Md0UCtdLgJUhd0" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

<iframe src="//es.slideshare.net/slideshow/embed_code/key/24h2tFCOR2T2PU" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen class="video"> </iframe>

Breaking Firewalls, Shellcode Injection, SQL Injection

Shellcode Injection

Email security. Anti Spam protection

Server Hardening

Next Generation Firewalls

Security Checklist

Security Checklist For Unix and Linux server #infosec #sysadmin https://t.co/QTwAlEQHOQ

— nixCraft (@nixcraft) 20 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Major Security Vulnerabilities

PuTTY version 0.67 is released. This is a security update. https://t.co/7MXHcveBM6 #SSH #sysadmin #unix #linux

— nixCraft (@nixcraft) 5 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Keyloggers

Red Hat Vulnerabilities Catalog. Red Hat CVE Database.

  • Vulnerability Responses 🌟🌟 Large scale security vulnerabilities like the ones below receive special attention from Red Hat Product Security. In order to create the best experience possible for our customers during these critical moments, a specialized vulnerability page is created within the Red Hat Product Security Center which aggregates information, diagnostic tools, and updates in one easy-to-use interface. This list is a catalog of these pages.

SQL injection

Windows Vulnerabilities

Linux Vulnerabilities

Heartbleed. April 2014

Shellshock. September 2014

Java Serialization Vulnerability. November 2015

HTTPS Bicycle Attack. December 2015

Backdoors. December 2015

LastPass. January 2016

  • LastPass I have discovered a phishing attack against LastPass that allows an attacker to steal a LastPass user's email, password, and even two-factor auth code, giving full access to all passwords and documents stored in LastPass. I call this attack LostPass.
  • ZDNet: LastPass phishing attack avoids two-factor authentication in data theft The exploited security flaw is severe enough that successful attacks compromise two-factor authentication codes.

OpenSSH Roaming Bug. January 2016

OpenSSL. January 2016

Linode SSH. February 2016

glibc stack based buffer overflow. February 2016

DROWN Attack. Cross protocol attack on TLS using SSLv2. March 2016

OpenSSH Security Advisory. March 2016

SSH attempts

Bad Tunnel. June 2016

DDos

Shadow IT security risks

Shadow IT is a real risk for #ITsecurity. And if you don’t think it’s happening in your organization, you’re wrong. https://t.co/CfUa5AabP7

— SAP Labs LA (@saplabsla) 4 de marzo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

Top security initiatives for 2016

Container security. Who’s fixing containers? February 2016

.@joshbressers discusses #Linux #security as a fundamental tenet, not a feature (and certainly not an option): https://t.co/Ks8cJMwFin

— Red Hat, Inc. (@RedHatNews) 17 de mayo de 2016
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>

DDos and Project Shield. February 2016

glibc vulnerability docker

hot potato windows privilege escalation

intrusion response procedures

<iframe width="560" height="315" src="https://www.youtube.com/embed/ceg4hyrcHJc?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

Disk Encryption

<iframe width="560" height="315" src="https://www.youtube.com/embed/SEsIO8T5R80?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/1Rk04NGQPr0?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="560" height="315" src="https://www.youtube.com/embed/JKzrCvlfMhE?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

<iframe width="420" height="315" src="https://www.youtube.com/embed/ll4f0Wim4pM?rel=0" frameborder="0" allowfullscreen class="video"></iframe>

There aren’t any published security advisories