background preloader

CyberSecurity

Facebook Twitter

Automating Security: 7 Major Benefits of a SOAR – The New Stack. Chris Tozzi Chris has worked as a Linux systems administrator and freelance writer with more than 10 years of experience covering the tech industry, especially open source, DevOps, cloud native and security. He also teaches courses on the history and culture of technology at a major university in upstate New York. SOAR — or security orchestration, automation and response — is a collection of processes, software and tools that allows teams to streamline security operations. SOAR platforms are a hot topic in the realm of cybersecurity these days, and with good reason. By helping to plan and orchestrate responses to security incidents, SOARs offer critical functionality that extends beyond that provided by security incident and event management (SIEM) platforms, a more conventional type of security tool. That, at least, is a high-level overview of why SOARs are beneficial. 1. This makes the security response less burdensome. 2. 3. 4. 5. 6. 7.

SIEMs may also provide some integrations. A Complete Glossary: 70+ Cyber Security Terms (From A to Z) Those who believe using a long password is all it takes to keep your data secure have a lot to learn. There is so much more that goes into cyber security. Especially when you consider that the process of securing your data, and your identity, is an absolute must no matter what industry you’re in. To help on your journey of learning more about cyber security, we’ve compiled over 70 of the most common terms used and defined them for you. Interested in a specific term?

Jump ahead to: Note: Letters of the alphabet without a relevant term are not listed. As you’ve browsed the internet, you’ve probably run into a lot of terms like “phishing” and “malware” and have been unsure what they mean and how they pertain to you. Ready to expand your cyber security vocabulary? A through E Let’s start at the top! Admin privilege: Having ultimate control of any given system. Adware: Software that automatically displays or downloads material when a user is offline.

F through J K through O P through T Don’t stop now! 25 Cyber Security Terms That Everyone Should Know. The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. Against that backdrop, highly personal and sensitive information such as social security numbers were recently stolen in the Equifax hack, affecting over 145 million people.

Unfortunately, as long as computers exist, we are at risk of having our digital data compromised and manipulated. However, living in the digital age is not all that scary – especially if you know what you’re doing. Understanding how your device works is not as hard as it sounds. But, if you could nail long division in the 4th grade, then you can learn cyber basics that will get you pretty far in your own personal security as well as your company’s. We’re here to make this learning curve easier by providing a list of the 25 most important cyber security terminology that everyone should know: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.

Forensics

SystemHardening. The Comprehensive Guide To AppArmor: Part 1 - Information & Technology - Medium. If this post seems very long or too difficult to do in one go, please do not be discouraged! It is perfectly fine to take time and tackle the sections one at a time at your own pace. If you need help with anything please do reach out to me or the AppArmor devs on IRC. I wanted to do this post on the basics of AppArmor and how to get started with using it on your system. This post started as a very small guide on AppArmor but as I wrote it I felt more and more convinced it needed details to explain various features and issues. As such it has now ended up as a comprehensive guide on how to start using and understanding the AppArmor tools. In case you don’t know what AppArmor is, the official wiki provides a decent explanation: AppArmor is an mandatory access control (MAC) like security system for Linux.

Essentially AppArmor provides MAC functionality to Linux and is used to supplement the traditional DAC (file permissions) functionality that the OS provides. Aa-status aa-genprof #! Aa-logprof. Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense) Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. In addition, our steady flow of hacking Windows 10 and hacking macOS articles might make it seem like a reasonably secure operating system doesn't exist. But I'm here to tell you that there is a viable alternative that could provide some sense of security and trust. There are quite a few noteworthy Linux distributions with excellent development records and support communities to choose from. To name just a few, there's Manjaro, BlackArch, Parrot Security OS, and Kali, but I decided to feature Ubuntu for several reasons: Ubuntu has a strong support community.

Now, when you first set up an Ubuntu system, there are a few security considerations to keep in mind. Overall, this series is somewhat geared toward Windows 10 users interested in transitioning to Ubuntu, so I'll start building the operating system from scratch at the point of installation. Step 1Download the Ubuntu ISO. Itpol/linux-workstation-security.md at master · lfit/itpol. MITRE ATT&CK™ Firejail Usage | Firejail. Welcome to Firejail, a SUID security sandbox based on Linux namespaces and seccomp-bpf. We are a volunteer weekend project and our target is the desktop. Linux beginner or accomplished programmer, you are welcome to join us at This document is an effort to centralize Firejail information currently spread across several howtos, blogs and discussion threads.

I’ll start with a short description of the kernel technologies involved, move to sandbox configuration and management, and explore some of the most common usage scenarios. 1. There is nothing magic about the internal workings of a sandbox, just some kernel security technologies stack one on top of the other. 1.1. All Firejail security features are implemented inside Linux kernel. We divide the kernel technologies used for sandboxing in three categories: Front-end technologies are simple and very effective. Back-end technologies are smart and sophisticated. Mozilla Firefox PDF exploit (2015). 1. 2.

OSINT

Bootloader and Partitions · trimstray/the-practical-linux-hardening-guide Wiki. You can file an issue about it and ask that it be added. Table of Contents Bootloader Protection for the bootloader can prevent unauthorized users who have physical access to the system, e.g. attaining root privileges through single user mode. Protect bootloader with password Rationale Password protection on the boot loader configuration ensures users with physical access cannot trivially alter important bootloader settings. It also prevents users from entering single user mode, changing settings at boot time, access to the bootloader console, reset the root password, access to non-secure operating systems and the ability to disable SELinux. Solution # Generate password hash: grub2-setpassword # Update grub configuration: sed -i s/root/bootuser/g /etc/grub.d/01_users # Regenerate grub configuration: grub2-mkconfig -o /boot/grub2/grub.cfg Comments You should think about sense of setting the password for bootloader because it can be problematic for the production clusters.

Other solution is: /dev/shm. PakCERT - Top Cyber Security Company in Pakistan (since 2000)