Monthly Archives: August 2015
August 31, 2015 | by Edcel Suyo | Blog posts

It was a night of fun and festivities as the Women’s Society of Cyberjutsu gathered in the Annual Cyberjutsu Awards Dinner. This is a celebration on its second year which continues to recognize women who have portrayed exceptional contribution in cyber security.
Tags: cyberjutsu, ptp, wapt, women in cybersecurity, Women's Society of Cyberjutsu
Read more
August 30, 2015 | by Edcel Suyo | Researches

Businesses and organizations spend billions to protect data from cyber attacks across the Internet. Another thing that you should consider are threats coming from the inside. Staff-related security breaches such as that of Morgan Stanley investment firm and Ashley Madison site where the CEO tells the possibility of the hack done by an insider tells us to always keep our guards on – even from our own staff.
Tags: insider threat, IT Security, Network Defense, pnd, social engineering
Read more
August 25, 2015 | by Edcel Suyo | Blog posts

Would you buy a car without doing a test drive first? Probably not. Today eLearnSecurity raises the bar in IT Security training again as we offer a free test-drive of every course before you enroll.
Test-drive these hands-on training courses by clicking the link below. You will be redirected to the page where you can request for a demo access of the corresponding course!
Tags: ares, IT security training courses, maspt, pnd, ptp, PTS, pwd, wapt, waptx, was360
Read more
August 21, 2015 | by Edcel Suyo | Company News

Check out what we have for you this August 2015! Develop your skills in network defense, web defense, mobile application security, or software reverse engineering.
Enroll into any of these exciting hands-on training courses before 31st August 2015 and use Coupon Code 10D-10P during enrollment to apply a 10% discount.
Tags: Advanced Reverse Engineering of Software, ares, IT security training courses, maspt, Mobile Application Security and Penetration Testing, pnd, Practical Network Defense, practical web defense, pwd
Read more
August 20, 2015 | by Edcel Suyo | Researches

10 GB worth of data from adult dating site, Ashley Madison, was dumped on the dark web using an Onion address which is only accessible through a Tor browser. Account details, including names, addresses and phone numbers of the social networking site were exposed.
Tags: AdultFriendFinder, Ashley Madison, cyber attack, hack, hackers
Read more
August 16, 2015 | by Edcel Suyo | Video

Active Directory policies can be used by System Administrators to deploy systems and users preferences, secure systems, lock down the workstation, create user accounts etc. By default, the active directory policies have Read permissions granted to the domain users.
IT Security Researcher Davide Girardi (aka GiRa) attempts to gain full access to a local administrator account‘s records as well as execute an escalation to a full domain admin account.
Tags: active directory policy, Domain Admin, network attack, pentest demo, xss
Read more
August 13, 2015 | by Edcel Suyo | Researches

The Top 5 Hackme’s for the month of July have been published and based on the list, there’s only one new challenge that was added which came in 5th place – LFI SCD.
Check out the rest of the challenges in the list below.
Tags: hack.me, hackme, top 5 hackme
Read more
August 8, 2015 | by Edcel Suyo | Video

SQLi is a technique where code is injected to data-driven applications. These codes includes malicious SQL statements which are inserted into an entry field for execution such as dumping database contents.
If you think your apps are secure or your target web app is not vulnerable to SQLi, think again!
Tags: 2nd order SQLi, attack demo, SQL injection, sqli, sqlmap, webinar
Read more
August 6, 2015 | by Edcel Suyo | Blog posts

Every pentester starts somewhere. Those who are interested to start a career in IT Security, it’s good to learn from professionals who have been in the industry for a considerable amount of time. We had an opportunity to chat with Armando Romeo, CEO and Founder of eLearnSecurity, where he shared his thoughts and opinions about penetration testing, hacking, and cyber security.
Tags: Armando Romeo, interview, penetration tester, penetration testing, penetration testing student, professional penetration tester, ptsv3
Read more
August 3, 2015 | by Edcel Suyo | Blog posts

The Women’s Society of Cyberjutsu (WSC) celebrates the Women in Cybersecurity Day which aims to recognize those who have made an impact in the world of cybersecurity and within the WSC. There will be an annual Cyberjutsu awards dinner which includes rewards and prizes for attendees.
Tags: cyberjutsu, dinner, Event, women in cybersecurity
Read more