Category Cyber News

FCC Docket 17-108

If you want to submit a comment to the FCC, click on In the center of the page under the heading “Proceedings,” it says
17-108 Restoring Internet Freedom +New Filing/+Express

Click on the link labeled “+Express” and file your comment there.

In the top box type 17-108
The second box, your name.
Then fill in and comment to submit.

Please take this seriously folks!

Read More

There’s now a tool to test for NSA spyware

A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant

“Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.”

Full article

Read More

Kali Linux 2017.1 Release

“Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release has a few more surprises up its sleeve.”

Kali Linux 2017.1

Read More

CTF Challenge and team

Linux Militia has a CTF team forming
CTF Time – Competitive CTF (Team) (message for invite)
CTF Linux Militia team
CTF Learn – Individual challenges and learning portal
Join our team and join our Discord server! (Send message for login approval).

Join our team and join our Discord server! (Sent message for login approval).

In computer security, Capture the Flag (CTF) is a computer security competition. CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world...

Read More


Weekly discussion on internet and computer security with Bret Piatt. Find it here – CyberTalkRadio and don’t forget to hit the Archives as well. They are on iHeart radio, News Radio WOAI 1200 (San Antonio, Texas) (@Saturdays from 11:00 P.M. to Midnight on 1200 WOAI), Twitter @cybertalkradio, and Youtube!

Read More

Auditing linux , unix 120 seconds flat

A script to audit linux and unix distributions based mainly on the CIS standards and universal linux hardening guidelines.

Nix Audit made easier (RHEL, CentOS)
Nix Auditor – GitHub

Also head over to CIS Secure Suite homepage for more greatness! Follow CIS Security on Youtube, Facebook and Twitter

CIS Secure Suite

Read More

OWTF 2.1a “Chicken Korma” released


Yes folks, it is that time again, a new release of the Offensive Web Testing Framework, OWASP OWTF, one of several OWASP Flagship projects:
We find OWTF most useful in large assessment where you have little time to evaluate a large number of targets. The ability to launch plugins selectively and dynamically as well as removing work from the load, pause and resume, etc. makes OWTF shine where most other tools struggle 🙂

Read More

Phishing with Unicode Domains

Phishing with Unicode Domains

The homograph protection mechanism in Chrome, Firefox, and Opera unfortunately fails if every characters is replaced with a similar character from a single foreign language. The domain “аррӏе.com”, registered as “”, bypasses the filter by only using Cyrillic characters.

Read More

The CyberDef Dojo

Attention San Antonio, Texas region friends! Check out the CyberDef Dojo group! Great people and an awesome portal to network with Cybersecurity and IT like-minded friends. Also, we have a Slack chat channel to hang out and discuss current affairs and have fun.

The CyberDEF Dojo is San Antonio’s largest concentration of cyber security professionals. It is a meetup that meets every second Wednesday of the month that is dedicated to raising awareness on cyber security, attracting new talent into the San Antonio cyber security industry, and cultivating the talent already existing in San Antonio. We learn, we hack, and we pitch our ideas for community feedback. It is a safe place for people to learn more about cyber security and meet other people with similar interests...

Read More

Information Systems Security Association

“Local chapters host periodic meetings, usually monthly, for educational and networking purposes. Events with broader scope are held at the regional, national and international levels.

ISSA members receive continuing education credits for attending all ISSA-sponsored activities, as well as activities sponsored by other organizations that uphold similar membership standards.

The following list includes some of the important ways that ISSA members work toward achieving the Association’s goals:

Organize international conferences, local chapter meetings and seminars that offer educational programs, training and valuable networking opportunities.
Provide access to information through the ISSA website as well as an online newsletter and monthly journal.
Offer support for professional certificat...

Read More