<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scan For Security</title>
	<atom:link href="https://www.scanforsecurity.com/feed" rel="self" type="application/rss+xml" />
	<link>https://www.scanforsecurity.com</link>
	<description>Penetration testing, methodologies, tools, standards, information security, certifications.</description>
	<lastBuildDate>Thu, 04 Jan 2024 17:43:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Crafting an Effective Incident Recovery and Remediation Plan: A Strategic Blueprint</title>
		<link>https://www.scanforsecurity.com/reporting-templates/crafting-an-effective-incident-recovery-and-remediation-plan.html</link>
		<pubDate>Thu, 04 Jan 2024 17:33:04 +0000</pubDate>
		<dc:creator><![CDATA[Uladzislau Murashka]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1153</guid>
		<description><![CDATA[<p>In the dynamic realm of cybersecurity, an effective incident recovery and remediation plan stands as the cornerstone for organizational resilience. Beyond mere defense, it ensures a proactive response to potential threats, minimizing damage and fortifying the organization against future attacks. This comprehensive guide offers a detailed roadmap to create a cost-effective incident recovery and remediation [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/crafting-an-effective-incident-recovery-and-remediation-plan.html">Crafting an Effective Incident Recovery and Remediation Plan: A Strategic Blueprint</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>In the dynamic realm of cybersecurity, an effective incident recovery and remediation plan stands as the cornerstone for organizational resilience. Beyond mere defense, it ensures a proactive response to potential threats, minimizing damage and fortifying the organization against future attacks. This comprehensive guide offers a detailed roadmap to create a cost-effective incident recovery and remediation plan, addressing critical steps to fortify your cyber defenses.</p>



<h2><strong>Assess Your Risks and Resources: A Holistic Examination</strong></h2>



<p>The inception of a robust incident recovery and remediation plan starts with a comprehensive assessment of risks and resources. Beyond merely identifying threats such as ransomware, phishing, or denial-of-service attacks, delve into the depths of your current security posture. Evaluate the efficacy of detection and response tools, existing policies, procedures, and the skill set of your cybersecurity staff. This multifaceted evaluation becomes the guiding compass, enabling organizations to prioritize actions judiciously and allocate resources efficiently.</p>



<h2><strong>Define Your Objectives and Metrics: A Strategic Vision</strong></h2>



<p>The journey to a resilient incident recovery and remediation plan requires a well-defined vision. This involves establishing clear objectives and metrics to measure success. Go beyond generic goals and embrace the SMART approach (Specific, Measurable, Achievable, Relevant, Time-bound). By setting Key Performance Indicators (KPIs), organizations can quantifiably track progress, ensuring a strategic alignment of efforts and outcomes.</p>



<h2><strong>Develop Your Plan and Strategy: Blueprinting Resilience</strong></h2>



<p>As the plan takes shape, attention shifts to the development phase. This involves outlining the intricate details of roles and responsibilities, communication channels, escalation and reporting procedures, and meticulous documentation methods. What emerges is a blueprint that defines the specific actions to be taken in response to varied incidents. From isolating affected systems to restoring backups and patching vulnerabilities, each step is a strategic move in the larger chessboard of incident recovery.</p>



<h2><strong>Test and Update Your Plan and Strategy: The Crucible of Resilience</strong></h2>



<p>A resilient incident recovery plan is one that has weathered the crucible of testing. Regular simulations and exercises become the testing grounds, revealing the plan&#8217;s readiness and resilience. This is not just a formality but a critical step to identify weaknesses and gaps. The post-test phase becomes equally crucial, demanding a meticulous review and update of the plan. Insights from real incidents and best practices feed into this iterative process, enhancing efficiency and adaptability.</p>



<h2><strong>Train and Educate Your Team and Stakeholders: Empowering the Frontlines</strong></h2>



<p>The success of an incident recovery and remediation plan rests on the shoulders of the team executing it. Hence, the focus shifts to training and education. It&#8217;s not just about imparting skills; it&#8217;s about instilling a sense of awareness and commitment. Team members need to internalize policies and procedures. Simultaneously, stakeholders – customers, partners, regulators – become integral parts of this educational journey, understanding the plan&#8217;s benefits and the expectations surrounding incident recovery and remediation efforts.</p>



<h2><strong>Evaluate and Optimize Costs and Benefits: Strategic Investment</strong></h2>



<p>In the ever-evolving landscape of cybersecurity, a cost-effective incident recovery and remediation plan is not just an expense; it&#8217;s a strategic investment. Organizations must meticulously evaluate the return on investment (ROI), considering both tangible and intangible benefits. Beyond the immediate costs, the plan’s impact on reputation, trust, and loyalty comes into play. Legal and regulatory risks also undergo scrutiny. This step becomes an opportunity to optimize costs and benefits, exploring avenues such as automation, outsourcing, and leveraging cloud services.</p>



<h3><strong>Conclusion: Forging a Resilient Future</strong></h3>



<p>In conclusion, the creation of a cost-effective incident recovery and remediation plan is not a one-time endeavor but an ongoing commitment to organizational resilience. Each step is a strategic move, contributing to the overarching goal of fortifying the organization against cyber threats. As the cybersecurity landscape evolves, so must the incident recovery plan – a living document that adapts, learns, and grows stronger with each challenge.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/crafting-an-effective-incident-recovery-and-remediation-plan.html">Crafting an Effective Incident Recovery and Remediation Plan: A Strategic Blueprint</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Alternatives for Let&#8217;s Encrypt &#8211; Free Automatic CAs</title>
		<link>https://www.scanforsecurity.com/reporting-templates/alternatives-for-lets-encrypt-free-automatic-cas.html</link>
		<pubDate>Tue, 24 Nov 2020 21:12:59 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1143</guid>
		<description><![CDATA[<p>For many, Let&#8217;s Encrypt has become an integral part of web development, and automatic certificate renewal every 90 days has become a routine. In fact, it is now the most popular certification authority on the Internet. It&#8217;s great, but also dangerous. This begs the question: What if Let&#8217;s Encrypt&#8217;s servers temporarily stop working? I don&#8217;t [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/alternatives-for-lets-encrypt-free-automatic-cas.html">Alternatives for Let&#8217;s Encrypt &#8211; Free Automatic CAs</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>For many, <a href="https://letsencrypt.org/" target="_blank" rel="noreferrer noopener" aria-label="Let's Encrypt (opens in a new tab)">Let&#8217;s Encrypt</a> has become an integral part of web development, and automatic certificate renewal every 90 days has become a routine. In fact, it is now the most popular certification authority on the Internet. It&#8217;s great, but also dangerous.</p>



<p>This begs the question: What if Let&#8217;s Encrypt&#8217;s servers temporarily stop working? I don&#8217;t want to think about the possible causes of failure. But it is advisable to provide a fallback. That is the same convenient automated free certification center.</p>



<p>Fortunately, there are fallbacks. At least two. The same free automated CAs (<a href="https://en.wikipedia.org/wiki/Certificate_authority" target="_blank" rel="noreferrer noopener" aria-label="Certificate Authorities (opens in a new tab)">Certificate Authorities</a>) modeled on Let&#8217;s Encrypt.</p>



<h2>ACME Protocol</h2>



<p>All communications with Let&#8217;s Encrypt take place using the <a rel="noreferrer noopener" aria-label="ACME  (opens in a new tab)" href="https://en.wikipedia.org/wiki/Automated_Certificate_Management_Environment" target="_blank">ACME</a> (Automated Certificate Management Environment) protocol. It is an open protocol for automating interactions with CAs. There is nothing specific to Let&#8217;s Encrypt, it is supported by several other CAs.</p>



<p>Now is the moment when more and more CAs are starting to work through ACME. This means that almost all of our tools, scripts, and processes for obtaining certificates from Let&#8217;s Encrypt will work fine with other CAs that support ACME.</p>



<p>To rebuild to another CA, you just need to change the API address in the configured scripts from https://acme-v02.api.letsencrypt.org/directory (Let&#8217;s Encrypt) to https://api.buypass.com/acme/directory (BuyPass , see below about it) or some other.</p>



<p><strong>We need a CA that meets two criteria:</strong></p>



<ul><li>supports ACME,</li><li>issues free SSL/TLS certificates.</li></ul>



<p>These criteria are met by a Norwegian CA called <a href="https://www.buypass.com/ssl/products/acme" target="_blank" rel="noreferrer noopener" aria-label="BuyPass (opens in a new tab)">BuyPass</a>.</p>



<p>The free service is called BuyPass Go SSL: automatic issuance and renewal of certificates + ACME support. What you need.</p>



<p>The whitepaper explains how to set up obtaining and renewing a certificate using Certbot, an official client from the Electronic Frontier Foundation to work with Let&#8217;s Encrypt or any other CA that supports the ACME protocol.</p>



<p>Registration at the CA and obtaining a certificate in BuyPass is elementary, as in the case of Let&#8217;s Encrypt, there is no difference here.</p>



<p>Registration with your email address for notifications (&#8216;YOUR_EMAIL&#8217;) and agree to the terms of use (&#8211;agree-tos):</p>



<pre class="wp-block-preformatted">root@acme:~# certbot register -m 'YOUR_EMAIL' --agree-tos --server 'https://api.buypass.com/acme/directory' </pre>



<p>Obtaining a certificate:</p>



<pre class="wp-block-preformatted">root@acme:~# certbot certonly --webroot -w /var/www/example.com/public_html/ -d example.com -d www.example.com --server 'https://api.buypass.com/acme/directory' </pre>



<p>Subsequently, other Certbot commands are used as needed to revoke a certificate (revoke), renew expired certificates (renew), and delete a certificate (delete).</p>



<p>It is recommended to put the renewal command in cron and run it automatically to check expired certificates just in case. For example, like this:</p>



<pre class="wp-block-preformatted">#Cron-job scheduled under root to run every 12th hour at a specified minute (eg. 23, change this to your preference) 23 */12 * * * /opt/certbot/certbot-auto renew -n -q >> /var/log/certbot-auto-renewal.log </pre>



<p>BuyPass has some limits on ACME. The main limit is the number of certificates for a registered domain (20 per week). This refers to the part of the domain that is purchased from the domain name registrar. </p>



<p>That is, this is the limit for all subdomains in total. Another limit is 5 duplicates per week. This is the limit of certificates for each specific subdomain. There are limits on validation errors &#8211; 5 per account, per host, and per hour.</p>



<p>Limit of requests to endpoints new-reg, new-authz, and new-cert: 20 per second. / Directory request limit: 40 per second.</p>



<p>A maximum number of pending authorizations: 300.</p>



<p>Instead of Certbot, you can use another acme.sh client, which is also initially configured for Let&#8217;s Encrypt, but easily directed to another CA with ACME support.</p>



<pre class="wp-block-preformatted">./acme.sh --issue --dns dns_cf -d example.com --server "https://api.buypass.com/acme/directory" </pre>



<h2>ZeroSSL</h2>



<p>Another CA that issues free 90-day certificates under the ACME protocol is the Austrian ZeroSSL.</p>



<p>The aforementioned acme.sh program has ZeroSSL support, so it is very easy to register:</p>



<pre class="wp-block-preformatted">acme.sh --register-account -m foo@bar.com --server zerossl </pre>



<p>Next, one command to generate a certificate:</p>



<pre class="wp-block-preformatted">acme.sh --issue --dns dns_cf -d example.com --server zerossl </pre>



<p>There are no limits on API calls. There are other advantages: this CA provides free certificates not only for 90 days but also for 1 year, there are a web dashboard and technical support.</p>



<p>By the way, ZeroSSL generates certificates even through a web interface, step by step with domain verification by email. But, of course, this method is not suitable for automation.</p>



<h2>Other ACME servers</h2>



<p>It will also be useful to add to your favorites or write down <a href="https://docs.https.dev/list-of-acme-servers" target="_blank" rel="noreferrer noopener nofollow" aria-label="a list of all known ACME servers (opens in a new tab)">a list of all known ACME servers</a> somewhere. There are still a few of them, but the number is constantly growing. </p>



<p>So that if something happens, you can always quickly solve the problem with a trusted certificate.</p>



<h2>Conclusion</h2>



<p>Let&#8217;s Encrypt is an outstanding organization doing a great job. But it&#8217;s dangerous to put all your eggs in one basket. The more the CA works under the ACME protocol and distributes free certificates in automatic mode, the more diverse and reliable the ecosystem as a whole.</p>



<p>Let&#8217;s Encrypt may experience downtime, or it may temporarily suspend its activity &#8211; and then Buypass and ZeroSSL will come to hedge. </p>



<p>Having these fallbacks ultimately increases the credibility of Let&#8217;s Encrypt itself because it&#8217;s no longer a single point of failure. And changing the CA for ACME is a matter of a few seconds.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/alternatives-for-lets-encrypt-free-automatic-cas.html">Alternatives for Let&#8217;s Encrypt &#8211; Free Automatic CAs</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Exploring alternative VPN protocols</title>
		<link>https://www.scanforsecurity.com/reporting-templates/exploring-alternative-vpn-protocols.html</link>
		<pubDate>Tue, 24 Nov 2020 20:30:19 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1139</guid>
		<description><![CDATA[<p>The VPN protocol should ideally be secure, functional, and fast. But there is another factor: popularity. An unpopular protocol is more difficult to implement and maintain: its software needs to be installed and configured, and users and administrators need to be trained. Sometimes protocols become popular despite their technical shortcomings, simply because of aggressive promotion [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/exploring-alternative-vpn-protocols.html">Exploring alternative VPN protocols</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>The VPN protocol should ideally be secure, functional, and fast. But there is another factor: popularity. An unpopular protocol is more difficult to implement and maintain: its software needs to be installed and configured, and users and administrators need to be trained.</p>



<p>Sometimes protocols become popular despite their technical shortcomings, simply because of aggressive promotion by a large company. </p>



<p>It happens, and vice versa, the protocol of independent developers solves such an urgent problem for some part of the users that it is quickly gaining popularity on its own. This happened with OpenVPN or WireGuard.</p>



<p>Some protocols are losing popularity. Some never become widely known, sometimes deservedly, sometimes not. In this article, we will talk about several of these protocols.</p>



<h2>PPTP</h2>



<p><strong>PPTP (Point to Point Tunneling Protocol)</strong> has been in the background quite rightly. I would like to believe that young readers have not come across him anymore, but ten years ago he was a textbook example of an undeservedly popular protocol.</p>



<p>Its popularity was ensured by the monopoly of its developer &#8211; Microsoft Corporation. From the mid-nineties to the late 2000s, the vast majority of client devices were Windows computers. Obviously, the presence of a built-in client in Windows automatically made the protocol at least common.</p>



<p>Microsoft wouldn&#8217;t be itself if it didn&#8217;t take advantage of this to maintain and strengthen its monopoly position. PPTP used standard PPP and GRE for data transfer, but a non-standard, proprietary set of protocols was used for authentication and encryption: MPPE (Microsoft Point-to-Point Encryption) and MS-CHAP.</p>



<p>Because of this, free implementations of both the client and the PPTP server were at one time as sore subject as GIF and MP3. Then the patents expired, poptop for Linux and MPD for FreeBSD became popular alternatives to proprietary products.</p>



<p>However, warnings about the security issues of homemade cryptography were not groundless. The strengths of MMPE and MS-CHAP have been declining several times, and in 2012 the protocol was finally discredited: researchers proved that the strength of MS-CHAP-v2 is no better than DES. </p>



<p>After that, it became impossible to perceive PPTP as a secure protocol, and it quickly lost its last remnants of popularity.</p>



<p><strong>Should you use PPTP?</strong><br>Obviously strongly discouraged.</p>



<h2>SSTP</h2>



<p><strong>SSTP (Secure Socket Tunneling Protocol)</strong> is Microsoft&#8217;s second attempt to create its own VPN protocol. This time they did not invent their own cryptographic algorithms but used standard SSL / TLS. They also no longer interfere with the creation of free implementations.</p>



<p><a rel="noreferrer noopener" aria-label="SSTP  (opens in a new tab)" href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-sstp/c50ed240-56f3-4309-8e0c-1644898f0ea8" target="_blank">SSTP</a> is PPP over HTTPS. The obvious advantage is that it perfectly passes through NAT and theoretically even through a proxy. The advantage is far from unique, OpenVPN was able to work on top of TCP / 443 long before that.</p>



<p>OpenVPN, however, does not just use UDP by default, not TCP. Tunnels over TCP have serious performance problems &#8211; they can be tens of times slower on the same hardware.</p>



<p>Windows obviously has a built-in client &#8211; starting with Windows Vista. For Linux, there are client implementations and plugins for NetworkManager. There are also third-party clients for macOS such as EasySSTP. For mobile devices, you will also have to search and install third-party applications.</p>



<p>If you need to deploy an SSTP server, <a href="https://accel-ppp.org/" target="_blank" rel="noreferrer noopener nofollow" aria-label="accel-pppd (opens in a new tab)">accel-pppd</a> and SoftEther support it from free projects.</p>



<p><strong>Should you use SSTP?</strong><br>Unless if forced by corporate policy.</p>



<h2>SOFTETHER</h2>



<p><strong>SoftEther is a multi-protocol VPN server </strong>similar to MPD or accel-ppp. It supports L2TP / IPsec, PPTP, SSTP, OpenVPN and the non-standard SoftEther protocol of the same name. This is a fairly young project, its first version was released in 2014.</p>



<p><a href="https://www.softether.org/" target="_blank" rel="noreferrer noopener" aria-label="SoftEther (opens in a new tab)">SoftEther</a> protocol is Ethernet over HTTPS. Since standard SSL is responsible for encryption and authentication, security is not a big issue.</p>



<p>The authors claim performance is ten times higher than <a href="https://en.wikipedia.org/wiki/OpenVPN" target="_blank" rel="noreferrer noopener" aria-label="OpenVPN (opens in a new tab)">OpenVPN</a>. It&#8217;s hard to believe, but I have no opportunity to verify their statements. The client is only for Linux and Windows, so other platforms will have to use different protocols.</p>



<p><strong>Should you use SoftEther?</strong><br>If the authors&#8217; performance claims are correct, it might be worth it.</p>



<h2>OPENCONNECT</h2>



<p>The term <strong>SSL VPN without context</strong> is a common term but completely meaningless. &#8220;Supports SSL VPN&#8221; can mean both SSTP and OpenVPN and many incompatible proprietary protocols.</p>



<p>Almost every vendor has its own protocol. For example, Cisco AnyConnect, Juniper Pulse Connect, Palo Alto GlobalProtect. </p>



<p>If an organization has the widespread use of a client for such a protocol, it can be very difficult to change the equipment of a VPN concentrator &#8211; which is what vendors are trying to achieve.</p>



<p>The free <a href="http://www.infradead.org/openconnect/" target="_blank" rel="noreferrer noopener" aria-label="OpenConnect project (opens in a new tab)">OpenConnect project</a> provides server and client implementations for the Cisco, Juniper, and Palo Alto protocols. The OpenConnect client runs on Windows and a variety of UNIX-like systems: not only Linux and macOS but also BSD systems and even Solaris.</p>



<p>OCServ can save an organization a lot of money because proprietary implementations often license these protocols per user.</p>



<p><strong>Should you use OpenConnect?</strong><br>If your organization has implemented one of these protocols and is now itself not happy &#8211; absolutely. Since none of these protocols are protected by patents (and there is nothing much to patent in them), the only real risk to the project&#8217;s existence is the lawsuits over trademarks. </p>



<p>There are no registered trademarks in the name of the project, so the risk is low. In addition, the project has existed since 2009, and until now none of the vendors have sued the authors.</p>



<h2>VARIATIONS ON THE IPSEC TOPIC</h2>



<p>It would seem that <strong>IPsec is the most standardized protocol</strong> of all, and all network equipment vendors support it. But with a standardized protocol, you can&#8217;t lure users into the vendor lock-in trap, so proprietary variations of IPsec are regularly invented.</p>



<p>Sometimes they solve a very real problem that is difficult to solve with pure IPsec. </p>



<p>For example, Cisco GETVPN (Group Encrypted Transport) simplifies the deployment of a secure network for MPLS users, since MPLS itself does not provide any protection against traffic interception.</p>



<p>In other cases, as with EZVPN, vendors try to bribe users with the relative ease of configuration compared to &#8220;normal&#8221; IPsec.</p>



<p><strong>Should you use proprietary IPsec variations?</strong><br>If the prospect of forever remaining tied to one supplier does not scare you … In the case of EZVPN, for example, some devices support only the server, and some only support the client, so the choice may also be limited to a specific model.</p>



<h2>TINC</h2>



<p>Most VPN protocols are point-to-point or star-based. Mesh networks are still quite an exotic scenario. Nevertheless, protocols for these purposes exist and are being developed. </p>



<p>The TINC project has been in development since 1998. This means it is older than OpenVPN, which released its first version in 2001. It supports Windows and all UNIX-like operating systems but does not have a version for mobile operating systems.</p>



<p>The main feature is the automatic creation of a mesh network. Even if there are many nodes in the network, traffic between them will be transmitted directly, rather than through a central server. </p>



<p>This could make <strong>TINC a working alternative to Dynamic Multi-Point VPN</strong> and the mentioned GETVPN for corporate networks. Well, or it could if network equipment vendors and popular free network operating systems supported it.</p>



<p><strong>Should you use TINC?</strong><br>At least it will be interesting to experiment for sure.</p>



<h2>Conclusion</h2>



<p>There are a lot of VPN protocols in the world. Even if you prefer to use only the most popular, it is useful to know about others &#8211; the choice will be more informed.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/exploring-alternative-vpn-protocols.html">Exploring alternative VPN protocols</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Cryptocurrency-Related Domain Names Hijacked by Phishing GoDaddy&#8217;s Registrar Employees</title>
		<link>https://www.scanforsecurity.com/reporting-templates/cryptocurrency-related-domain-names-hijacked-by-phishing-godaddys-registrar-employees.html</link>
		<pubDate>Tue, 24 Nov 2020 20:08:59 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1136</guid>
		<description><![CDATA[<p>Well-known cybersecurity journalist Brian Krebs reported that employees of the GoDaddy domain registrar were the victims of attacks using social engineering and, as a result, handed over control over the domains of several cryptocurrency projects to attackers. According to Krebs, the attacks began in mid-November this year. The first to report the problem was employees [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/cryptocurrency-related-domain-names-hijacked-by-phishing-godaddys-registrar-employees.html">Cryptocurrency-Related Domain Names Hijacked by Phishing GoDaddy&#8217;s Registrar Employees</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>Well-known cybersecurity journalist Brian Krebs reported that employees of the GoDaddy domain registrar were the victims of attacks using social engineering and, as a result, handed over control over the domains of several cryptocurrency projects to attackers.</p>



<p>According to Krebs, the attacks began in mid-November this year. The first to report the problem was employees of the liquid.com cryptocurrency exchange.</p>



<p>Then a similar problem was discovered at NiceHash. The company&#8217;s domain settings at GoDaddy were changed, causing traffic and email to be temporarily redirected to a different location. NiceHash was forced to freeze all client funds for about 24 hours until the domain settings were reverted to their original settings.</p>



<p>Krebs writes NiceHash&#8217;s mail service has been redirected to privateemail.com, an email platform operated by another major registrar, Namecheap Inc. Using Farsight Security, a service that displays changes to domain name records, Krebs figured out that several other cryptocurrency platforms could have fallen victim to the same criminal group. </p>



<p>Thus, similar attacks seem to have suffered: Bibox.com, Celsius. network, and Wirex. app. None of these companies reported any incidents.</p>



<p>The NiceHash founder wrote that unauthorized changes were made from the GoDaddy internet address, and the attackers tried to use the gained access to incoming NiceHash emails to reset passwords on various third-party services, including Slack and Github. </p>



<p>However, the company said in a statement that the hackers did not gain access to any important service and did not steal any information.</p>



<p>However, the company said in a statement that the hackers did not gain access to any important service and did not steal any information.</p>



<p>At the same time, it was not possible to quickly contact GoDaddy, because it was then that a serious failure occurred in the registrar&#8217;s work, due to which e-mail and phones did not answer.</p>



<p>Unfortunately, GoDaddy representatives have already confirmed that several of their employees did indeed fall victim to social engineering. The exact number of compromised employees was not disclosed. GoDaddy said a security audit revealed unauthorized changes to some of the company&#8217;s customer accounts.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/cryptocurrency-related-domain-names-hijacked-by-phishing-godaddys-registrar-employees.html">Cryptocurrency-Related Domain Names Hijacked by Phishing GoDaddy&#8217;s Registrar Employees</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>What is SOC 2 compliance</title>
		<link>https://www.scanforsecurity.com/reporting-templates/what-is-soc-2-compliance.html</link>
		<pubDate>Mon, 23 Nov 2020 20:09:30 +0000</pubDate>
		<dc:creator><![CDATA[Uladzislau Murashka]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1123</guid>
		<description><![CDATA[<p>About SOC 2 SOC 2 compliance is a crucial framework for technology and cloud computing companies. SOC 2 is a compliance framework for data privacy and security developed by the American Institute of CPAs (AICPA). Its goal is to make sure that systems are set up so they assure security, availability, processing integrity, confidentiality, and privacy [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/what-is-soc-2-compliance.html">What is SOC 2 compliance</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<h3>About SOC 2</h3>



<p>SOC 2 compliance is a crucial framework for technology and cloud computing companies. <a rel="noreferrer noopener" aria-label="SOC 2 (opens in a new tab)" href="https://en.wikipedia.org/wiki/System_and_Organization_Controls" target="_blank">SOC 2</a> is a compliance framework for data privacy and security developed by the <a href="https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html">American Institute of CPAs (AICPA)</a>.</p>



<p>Its goal is to make sure that systems are set up so they assure security, availability, processing integrity, confidentiality, and privacy of customer data. SOC 2 is both a technical audit and a requirement that comprehensive information security policies and procedures be written and followed.</p>



<p>An example would be that our service is available when needed and that personal information passing through it is maintained confidential at all times. </p>



<p>Many of the security aspects SOC 2 addresses involves external interactions that could affect internal or customer data security. The AICPA developed SOC 2 as a way to encourage the implementation and oversight of proper security procedures. </p>



<p>Similar to other security guidelines, SOC 2 outlines a basic structure for security measures, but then allows companies to customize those basic measures to their needs. </p>



<p>Organizations that provide tech services and systems to third parties should be familiar with SOC 2. Service organizations are usually required to pass a SOC 2 audit in order to partner with or provide services to other companies. The framework is designed to ensure that relevant organizations, such as Cloud computing providers and software-as-a-service companies, process information securely.</p>



<p><strong><a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://www.cybersecuriosity.com/services/penetration-testing-services" target="_blank">Penetration testing</a> </strong>is primarily used to test control effectiveness in SOC 2 Type II audits and <strong>required to pass the compliance checks</strong>.</p>



<h3>Why is SOC 2 compliance important?</h3>



<p>The most obvious answer is that SOC 2 compliance demonstrates that your organization maintains a high level of information security.</p>



<p>The rigorous compliance requirements, which are put to the test in an on-site audit, ensure that sensitive information is being handled responsibly. Organizations that implement the necessary controls are therefore less likely to suffer data breaches or violate users’ privacy.</p>



<p>This protects the organization from the negative effects of breaches, such as regulatory action and reputational damage, and gives them a competitive advantage.</p>



<p>SOC 2-compliant organizations can use this fact to prove to customers that they’re committed to information security, which in turn will create new business opportunities.</p>



<h3>How are SOC 1 and SOC 2 different?</h3>



<p>Depending on the service or system you provide, third parties might ask whether you’re SOC 1 or SOC 2 compliant.&nbsp;</p>



<p>You might think&nbsp;that SOC 2 is an updated version of SOC 1, but&nbsp;they are&nbsp;actually two&nbsp;different frameworks.&nbsp;You might be required to&nbsp;complete one SOC audit or both.&nbsp;</p>



<p>SOC 1 is less common and applies when you host financial information that could affect third parties’ financial reporting. </p>



<p>SOC 2 applies to all other types of sensitive information related to the third party. If you don’t host financial data, this is the only compliance audit you should complete. </p>



<p>By contrast, if you only host financial information, you don’t&nbsp;need to complete SOC 2.&nbsp;</p>



<p>Organizations that host both types of data will need to complete both compliance audits.</p>



<h3>What is a SOC 2 audit?</h3>



<p>A SOC 2 audit provides an in-depth assessment of an organization’s: </p>



<ul><li>Security;&nbsp;</li><li>Availability;&nbsp;</li><li>Processing integrity;&nbsp;</li><li>Confidentiality;&nbsp;and/or&nbsp;</li><li>Privacy controls.&nbsp;</li></ul>



<p>SOC is broken down in many ways. There is SOC 1, 2, and 3 – which all contain slightly different requirements – but even within SOC 2, which we’re focusing on here, there are two types of certification.</p>



<p><strong>Type 1</strong> involves passing the SOC 2 audit and proving that your policies, procedures, and technologies adhere to the framework’s requirements at that time.</p>



<p><strong>Type 2</strong> involves ongoing compliance with SOC 2 and a thorough audit process that tests the real-world application of your policies, processes, and technologies.</p>



<h3 id="cc65">Type 1 or Type 2?</h3>



<p>SOC 2 has 2 different types like SOC1. Type 1 reports cover the description of systems and suitability of design of controls (Known as criteria in SOC terminology) whereas type 2 reports have everything in type 1 reports<br>and the effectiveness of the controls over a period of time. Type 2 SOC 2 reports are considered more useful since the auditor verifies that the controls work in an appropriate manner over a period of time.</p>



<h3>What does a SOC 2 audit report contain?</h3>



<p>The audit report is more than just a&nbsp;list&nbsp;of findings&nbsp;and a checklist of compliance requirements. SOC 2&nbsp;allows plenty of room for interpretation, because&nbsp;every organisation will have its own requirements based on the way it operates.&nbsp;</p>



<p><strong>As such, the audit report should provide: </strong></p>



<ul><li>An opinion letter,</li><li>Management assertion,</li><li>A detailed description of the system or service,</li><li>Details of the selected trust services categories,</li><li>Tests of controls and the results of testing.</li></ul>



<h3>What does SOC 2 certification cover?</h3>



<p>To achieve SOC 2 certification, organisations must implement controls on:</p>



<h4>System monitoring</h4>



<p>Organisations must always monitor their information systems, keeping track of who is accessing sensitive information and what changes they are making to it.</p>



<p>This process should include the adoption of access controls, which ensure that only approved users can open sensitive information. A sophisticated access control management system will contain layers of controls that ensure employees can only view information that’s relevant to their job.</p>



<p>This not only reduces the risk posed by malicious insiders but also mitigates the damage should a cyber criminal gain unauthorised access to an account. As such, access controls provide an extra level of security in the event that employees choose weak passwords or expose their credentials in a phishing scam.</p>



<h4>Data breach alerts</h4>



<p>No matter how sophisticated your cyber security defences are, you will suffer a data breach sooner or later, because there are simply too many attackers and too many vulnerabilities.</p>



<p>When a security event occurs, you need a system that will alert you of the threat. This doesn’t just refer to unauthorised access, but also to suspicious file transfers or changes to sensitive data.</p>



<p>These are particularly important to look out for when it comes to threats such as spear phishing, where an attacker poses as a senior employee or third party and requests that a lower-level employee sends them a certain file.</p>



<p>The organisation in question hasn’t technically been breached – the attack is nothing more than an email from an illegitimate address – but when the employee complies with the request, a serious incident has occurred.</p>



<h4>Audit procedures</h4>



<p>Organisations must adopt a rigorous audit procedure to ensure they keep detailed records of the way personal information and other sensitive data is used.</p>



<p>It’s only by doing this that you can trace the source of a data breach and determine the full extent of the damage.</p>



<h4>Forensics</h4>



<p>The final aspect of SOC 2 compliance concerns the way you respond to threats. This covers the steps you take to identify the full extent of the breach, understand how the incident occurred and prevent further damage.</p>



<p>Having such forensics systems in place gives you the assurance that incidents will be handled promptly, ensuring that a bad situation doesn’t get any worse.</p>



<h3>What does SOC 2 require?</h3>



<p>First and foremost, SOC 2 requires that you develop security policies and procedures. These need to be written out and followed, and auditors can and will ask to review them.</p>



<p>The policies and procedures should encompass: security, availability, processing integrity, confidentiality, and privacy of data stored in the cloud.</p>



<h3>What must I monitor for SOC 2?</h3>



<p>Meeting SOC 2 compliance means establishing a process and practices that guarantee oversight across your organization. Specifically, you want to be monitoring for any unusual, unauthorized, or suspicious activity. Often this takes place at the level of system configuration and user access. </p>



<p>You need to be able to monitor for both known malicious activity (like a common phishing scheme or obviously inappropriate access) and unknown malicious activity (like a zero-day threat or a new type of misuse). </p>



<p>To find these “unknowns,” you must establish a baseline of normal activity in your cloud environment, because this will make it clear when abnormal activity takes place. The best way to do this is with a continuous security monitoring service.</p>



<h3>What kind of alerts must I set up?</h3>



<p>To ensure that you are meeting SOC 2 requirements, you must receive alerts whenever unauthorized access to customer data occurs. If you do not receive these alerts in time, you may not be able to respond and take corrective action in a timely fashion.</p>



<p>To combat false alarms and increase the signal to noise ratio, you need a system that only sounds the alarm when activity strays outside of what is normal for your environment.</p>



<p><strong>SOC 2 in particular requires that you set up alerts for:</strong></p>



<ul><li>Exposure or modification of data, controls, configurations</li><li>File transfer activities</li><li>Privileged filesystem, account, or login access</li></ul>



<p>Make sure your organization is clear on what constitutes a threat indicator for your environment and risk profile, and then fine-tune your alerts so you know when something significant happens and you can move quickly to preserve the integrity of your data.</p>



<h3>Is AWS SOC 2 compliant?</h3>



<p>If you’re running in AWS, as the majority of cloud-based organizations are, then you’re probably wondering whether AWS meets SOC 2 compliance. The short answer is Yes. If you’d like to review it yourself (trust, but verify), customers can access the AWS SOC 2 report <a href="https://console.aws.amazon.com/artifact/home" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">here</a>.</p>



<h3>Is Microsoft Azure SOC 2 compliant?</h3>



<p>Similar to AWS, Microsoft Azure passes <a rel="noreferrer noopener" aria-label="compliance  (opens in a new tab)" href="https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-soc?view=o365-worldwide" target="_blank">compliance </a>checks as well and based on their <a rel="noreferrer noopener" aria-label="reports  (opens in a new tab)" href="https://azure.microsoft.com/en-us/resources/microsoft-azure-compliance-offerings/" target="_blank">reports </a>which they provide frequently, they can guarantee sufficient security level to their clients as well as Amazon.</p>



<h2>Conclusion</h2>



<p>Like other types of compliance checks, SOC 2 must guarantee potential users and clients of services or companies a sufficient level of information security and protection from possible data leaks, in addition, guaranteeing the availability of the service and the integrity of information. </p>



<p>Companies that pass this type of checks are always in great demand for their services due to the guarantees provided that the risks are minimized.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/what-is-soc-2-compliance.html">What is SOC 2 compliance</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Directory bruteforce and sensitive files discovery</title>
		<link>https://www.scanforsecurity.com/reporting-templates/directory-bruteforce-and-sensitive-files-discovery.html</link>
		<pubDate>Thu, 19 Nov 2020 22:34:59 +0000</pubDate>
		<dc:creator><![CDATA[Uladzislau Murashka]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1115</guid>
		<description><![CDATA[<p>The brute force (or directory bruteforcing) attack is still one of the most popular password-cracking methods. Nevertheless, it is not just for password cracking. Brute force attacks can also be used to discover hidden pages and content in a web application. This attack is basically “a hit and try” until you succeed. This attack sometimes [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/directory-bruteforce-and-sensitive-files-discovery.html">Directory bruteforce and sensitive files discovery</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>The brute force (or directory bruteforcing) attack is still one of the most popular password-cracking methods. Nevertheless, it is not just for password cracking. </p>



<p>Brute force attacks can also be used to discover hidden pages and content in a web application. This attack is basically “a hit and try” until you succeed. This attack sometimes takes longer, but its success rate is higher.</p>



<p>Basically, any directory brute-forcing attack is based on a couple of parameters:</p>



<ol><li>Response code,</li><li>Response length.</li></ol>



<p>To start brute-forcing we need to send a request. So in most cases, it will be a simple GET request, but to obtain responses much faster then we&#8217;ll need somehow to cut the body, and this way it will be useful to switch for HEAD request. If we don&#8217;t need a body it will reduce response size and time, so we can see results faster. Let&#8217;s see some interesting and useful tools which can help us to get information about sensitive directories and files on a remote machine.</p>



<h4><strong>Dir Buster</strong></h4>



<p>DirBuster is a multi-threaded java application designed to brute force directories and files names on web/application servers. DirBuster comes with a total of 9 different lists; this makes DirBuster extremely effective at finding those hidden files and directories. </p>



<p><strong>How to run:</strong></p>



<figure class="wp-block-image"><img src="https://www.scanforsecurity.com/wp-content/uploads/2020/11/image.png" alt="Dir Buster configuration" class="wp-image-1117" srcset="https://www.scanforsecurity.com/wp-content/uploads/2020/11/image.png?v=1605790565 744w, https://www.scanforsecurity.com/wp-content/uploads/2020/11/image-300x210.png?v=1605790565 300w, https://www.scanforsecurity.com/wp-content/uploads/2020/11/image-100x70.png?v=1605790565 100w, https://www.scanforsecurity.com/wp-content/uploads/2020/11/image-696x488.png?v=1605790565 696w, https://www.scanforsecurity.com/wp-content/uploads/2020/11/image-599x420.png?v=1605790565 599w" sizes="(max-width: 744px) 100vw, 744px" /><figcaption>Dir Buster configuration</figcaption></figure>



<h4>DirB</h4>



<p>DirB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary-based attack against a web server and analyzing the response. DirB main purpose is to help in professional web application auditing.</p>



<p>The tool “Dirb” is in-built in Kali Linux, therefore, Open the terminal and type the following command to start a brute force directory attack.</p>



<p><strong>How to run:</strong></p>



<pre class="wp-block-preformatted">$ dirb http://192.168.1.1/dvwa </pre>



<h4>WFuzz</h4>



<p>Wfuzz is a tool designed for brute-forcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), brute-force GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP, etc), brute force Forms parameters (User/Password), Fuzzing, etc.</p>



<p><strong>How to use:</strong></p>



<pre class="wp-block-preformatted">$ wfuzz -c -W /usr/share/wfuzz/wordlist/dir/common.txt --hc 400,404,403 http://192.168.1.1/dvwa/FUZZ<br></pre>



<h4>Metasploit: HTTP Directory Scanner</h4>



<p>This module identifies the existence of interesting directories in a given directory path.</p>



<pre class="wp-block-preformatted">> use auxiliary/scanner/http/dir_scanner   <br>msf auxiliary(dir_scanner) > set dictionary /usr/share/wordlists/dirb/common.txt<br>msf auxiliary(dir_scanner) > set rhosts 192.168.1.5<br>msf auxiliary(dir_scanner) > set path /dvwa<br>msf auxiliary(dir_scanner) >exploit </pre>



<h4> <strong>Dirsearch</strong></h4>



<p>Dirsearch is a simple command line tool designed to brute force directories and files in websites. This tool is available at GitHub you can download it from <strong><a href="https://github.com/maurosoria/dirsearch">here</a></strong> and after installation in your Kali Linux type following to start dirsearch.</p>



<pre class="wp-block-preformatted"> ./dirsearch.py –u http://192.18.1.1/ -e php -f -x 400,403,404 </pre>



<h3>Conclusions</h3>



<p>Based on this article, we can come to the conclusion that nowadays there are a lot of tools that can help in finding hidden directories and sensitive files. </p>



<p>Despite the fact that the process of searching for such security problems at first glance seems simple, it is not uncommon to find backup files, source files with logins and passwords, git files, and many other interesting things. </p>



<p>A noteworthy point is that most of the tools use the method of sending HEAD requests and with the help of this method the process is accelerated, since part of the body in the answer is completely excluded.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/directory-bruteforce-and-sensitive-files-discovery.html">Directory bruteforce and sensitive files discovery</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Unknowns attack WordPress sites using the Epsilon Framework</title>
		<link>https://www.scanforsecurity.com/reporting-templates/unknowns-attack-wordpress-sites-using-the-epsilon-framework.html</link>
		<pubDate>Wed, 18 Nov 2020 09:21:46 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1112</guid>
		<description><![CDATA[<p>Wordfence has discovered a massive attack on WordPress sites. Attackers are actively looking for resources that use themes with the Epsilon Framework, which can be vulnerable to a number of function injection problems, which can ultimately lead to a complete compromise of the resource. According to the company, unknown hackers have already launched about 7,500,000 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/unknowns-attack-wordpress-sites-using-the-epsilon-framework.html">Unknowns attack WordPress sites using the Epsilon Framework</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>Wordfence has <a href="https://www.wordfence.com/blog/2020/11/large-scale-attacks-target-epsilon-framework-themes/" target="_blank" rel="noreferrer noopener nofollow" aria-label="discovered  (opens in a new tab)">discovered </a>a massive attack on WordPress sites. Attackers are actively looking for resources that use themes with the Epsilon Framework, which can be vulnerable to a number of function injection problems, which can ultimately lead to a complete compromise of the resource.</p>



<p>According to the company, unknown hackers have already launched about 7,500,000 attacks on more than 1,500,000 sites in an effort to find potentially vulnerable resources. These attacks are reported to originate from 18,000 different IP addresses.</p>



<p>While vulnerabilities in themes using the Epsilon Framework can lead to a complete takeover of a site, and exploit chaining results in Remote Arbitrary Code Execution (RCE), the current attacks are just probing the ground.</p>



<p>Many WordPress themes using the Epsilon Framework are vulnerable to these attacks. The researchers provide the following list of themes and versions:</p>



<h4>Below you can see the list of vulnerable WordPress themes:</h4>



<p>Shapely (1.2.7);<br>NewsMag (2.4.1);<br>Activello (1.4.0);<br>Illdy (2.1.4);<br>Allegiant (1.2.2);<br>Newspaper X (1.3.1);<br>Pixova Lite (2.0.5);<br>Brilliance (1.2.7);<br>MedZone Lite (1.2.4);<br>Regina Lite (2.0.4);<br>Transcend (1.1.8);<br>Affluent (1.1.0);<br>Bonkers (1.0.4);<br>Antreas (1.0.2);<br>NatureMag Lite (1.0.5).</p>



<p>Owners and administrators of sites running vulnerable versions of the listed themes are advised to immediately update them to a fixed version, if available. If there is no patch, you should switch to a different theme as soon as possible.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/unknowns-attack-wordpress-sites-using-the-epsilon-framework.html">Unknowns attack WordPress sites using the Epsilon Framework</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Top online courses to improve Python skills</title>
		<link>https://www.scanforsecurity.com/reporting-templates/top-online-courses-to-improve-python-skills.html</link>
		<pubDate>Thu, 12 Nov 2020 07:30:27 +0000</pubDate>
		<dc:creator><![CDATA[Uladzislau Murashka]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1109</guid>
		<description><![CDATA[<p>Python is one of the most popular general-purpose high-level programming languages. Due to its fairly simple syntax, flexibility, and scalability, as well as an active global community, it is of great interest to novice coders. A rich set of tools and libraries cover a wide range of tasks from web development and data analysis to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/top-online-courses-to-improve-python-skills.html">Top online courses to improve Python skills</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>Python is one of the most popular general-purpose high-level programming languages. Due to its fairly simple syntax, flexibility, and scalability, as well as an active global community, it is of great interest to novice coders. A rich set of tools and libraries cover a wide range of tasks from web development and data analysis to AI and scientific computing. </p>



<p>This makes Python one of the most sought-after languages among employers and is used by almost all the leading IT companies in the world.</p>



<h3>SkillShare</h3>



<ul><li>For beginners</li><li>A great introduction to the language</li><li>Very informative</li></ul>



<p>There are several Python courses for beginners at Skillshare, but the most comprehensive one is Programming in Python for Beginners. It is designed for those who are still a complete zero in programming. A tutor will help you set up a Python development environment on Windows, and then tell you about the basic language constructs and when to use them.</p>



<p>The course includes over 70 lessons, which will take 11 hours in total. They cover arithmetic, logical and comparison operators, as well as the use of lists, collections, tuples, dictionaries, there is useful material on functions &#8211; it analyzes common mistakes and how to avoid them. </p>



<p>There are more advanced topics like evaluating code performance. Every few lessons, exercises are given to consolidating theoretical knowledge in practice. The tutor actively communicates with the students, answers questions, and gives feedback on assignments. <a rel="noreferrer noopener nofollow" aria-label="Start at SkillShare (opens in a new tab)" href="https://www.skillshare.com/classes/Python-3-Programming-in-Python-for-Beginners/1885709497" target="_blank">Start at SkillShare</a></p>



<h3>Udemy</h3>



<ul><li>For continuing</li><li>Suitable for programmers</li><li>More than 250 videos</li><li>Application development</li></ul>



<p>Udemy also offers a large selection of very smart courses. For those who already speak the language a little, The Python Mega Course: Build 10 Real World Applications is perfect. </p>



<p>This is a course on developing 10 mobile, desktop, and web applications in Python that are really applicable in practice &#8211; from applications for recognizing moving objects through a webcam and working with databases to a dashboard for data visualization.</p>



<p>The course contains 33 sections, which include more than 250 videos. The first 8 sections are devoted to the basics of Python, 4 more &#8211; more advanced topics, and then the material begins directly on creating 10 applications.</p>



<p>Before some of them, one or two sections are set aside for consideration of the important components of the subsequent appendix. Exercises and small tests are attached to the video lessons, you can also ask the lecturer questions. The Visual Studio Code editor is used.</p>



<p>On Udemy, you can pay for a course once and get lifetime access to it. The authors are constantly updating the content, so when buying a subscription, all updates will be available to the user for free. </p>



<p>Udemy has a great player: you can not only change the speed of videos but also bookmark them. The player also shows places that are often bookmarked by other students. You can include subtitles (more than 10 languages), there are auto-scrolling scripts for video lessons, and a mobile application through which you can download lectures. <a rel="noreferrer noopener nofollow" aria-label="Start with Udemy (opens in a new tab)" href="https://www.udemy.com/course/the-python-mega-course/" target="_blank">Start with Udemy</a>.</p>



<h3>LinkedIn Learning</h3>



<ul><li>For busy</li><li>Quick</li><li>Good explanations</li><li>Introduction to programming</li></ul>



<p>There are a lot of professional development courses on this site, one of them is Advance your career with Python. It is aimed at those who are limited in time and want to quickly learn the basics of Python. </p>



<p>For work, its distribution kit Anaconda and Jupyter Notebook are used. The author dwells on all the key components of the language, the lessons are held at a comfortable pace and are well illustrated.</p>



<p>Another plus of the course is that unlike many introductory &#8220;express courses&#8221;, in each lesson, the lecturer first explains the construction and how it is used, and only then proceeds to write the code. The course ends with a short introduction to object-oriented programming.</p>



<p>In the player, you can turn on subtitles and watch video tutorial scripts. A LinkedIn Learning subscription costs $ 29.99 / month or $ 19.99 / month. If you buy for a year, the first month is free. <a rel="noreferrer noopener nofollow" aria-label="Begin with LinkedIn (opens in a new tab)" href="https://www.linkedin.com/learning/python-quick-start/advance-your-career-with-python" target="_blank">Begin with LinkedIn</a>.</p>



<h3 id="title3">Coursera</h3>



<ul><li>For students studying computer science</li><li>To improve your Python skills</li><li>Studying computer science</li><li>Scripts and subtitles</li></ul>



<p>Coursera is another well-known online platform. There is a good Principles of Computing course (in two parts) to further develop your Python programming skills from Rice University. </p>



<p>The course is part of a set of 7 courses Fundamentals of Computing Specialization to study the basics of computer computing. Lessons last several weeks, each with several video lectures, readings, practice exercises, homework assignments, and quizzes.</p>



<p>The program is led by three CS teachers who write TechRadar, which will help students improve their skills in Python and teach them to think like professionals in this field. The course gives the basics of the principles of computing processes, programming, mathematical principles that you need to know and apply to solve complex problems, as well as write quality code.</p>



<p>A video player with subtitles and scripts is at the disposal of users. While watching lectures, you can make notes, and you can also download them in mp4 format along with scripts and subtitles. </p>



<p>Courses can be taken free of charge, those wishing to receive a certificate will need a subscription, prices for which range from $ 39 to $ 89 per month. <a rel="noreferrer noopener nofollow" aria-label="Go to Coursera (opens in a new tab)" href="https://www.coursera.org/learn/principles-of-computing-1" target="_blank">Go to Coursera</a> and try.</p>



<h2>Conclusion</h2>



<p>Now, at the time of the massive introduction of online learning, the active development of courses on different platforms, and the popularization of programming, it is becoming more relevant to spend less time on trips to educational institutions and using auxiliary online platforms for self-study. </p>



<p>In addition, the number of courses for beginners is growing every day, and, accordingly, the entry threshold is decreasing. So, choose an appropriate training platform and take your time to become a professional python developer.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/top-online-courses-to-improve-python-skills.html">Top online courses to improve Python skills</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>VBulletin fixed a dangerous vulnerability</title>
		<link>https://www.scanforsecurity.com/reporting-templates/vbulletin-fixed-a-dangerous-vulnerability.html</link>
		<pubDate>Thu, 14 May 2020 12:20:30 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1105</guid>
		<description><![CDATA[<p>VBulletin developers encouraged everyone to update their installations as quickly as possible. The fact is that a critical vulnerability has been fixed in the forum engine. Let me remind you that vBulletin still use more than 100,000 sites, and many Fortune 500 company forums work on this engine. A fresh problem has received the identifier [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/vbulletin-fixed-a-dangerous-vulnerability.html">VBulletin fixed a dangerous vulnerability</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>VBulletin developers encouraged everyone to update their installations as quickly as possible. The fact is that a critical vulnerability has been fixed in the forum engine. Let me remind you that vBulletin still use more than 100,000 sites, and many Fortune 500 company forums work on this engine.</p>



<p>A fresh problem has received the identifier <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12720" target="_blank" rel="noreferrer noopener" aria-label="CVE-2020-12720 (opens in a new tab)">CVE-2020-12720</a> and so far almost nothing is known about it. It is reported that while the bug is still being analyzed by experts, and it is critical.</p>



<p>According to the National Vulnerability Database, the vulnerability is related to access control management and affects vBulletin versions up to 5.5.6pl1, 5.6.0 to 5.6.0pl1 and 5.6.1 to 5.6.1pl1. Thus, everyone who uses vBulletin 5 Connect “under” version 5.5.2 needs to upgrade as quickly as possible. The fact is that, according to the researchers, the attackers will quickly fix the patch and start exploiting the bug.</p>



<p>It is known that the vulnerability was discovered by Ambulics specialist <a href="https://twitter.com/cfreal_/status/1258752351160209409" target="_blank" rel="noreferrer noopener" aria-label="Charles Foul (opens in a new tab)">Charles Foul</a>. He plans to unveil the details of the bug at the SSTIC conference, which will be held next month.</p>



<p>Vulnerability fixed in vBulletin 5.6.1 Patch Level 1, 5.6.0 Patch Level 1, as well as 5.5.6 Patch Level 1.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/vbulletin-fixed-a-dangerous-vulnerability.html">VBulletin fixed a dangerous vulnerability</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>How to use torrents safely and legally</title>
		<link>https://www.scanforsecurity.com/reporting-templates/how-to-use-torrents-safely-and-legally.html</link>
		<pubDate>Tue, 12 May 2020 09:53:59 +0000</pubDate>
		<dc:creator><![CDATA[Markus Vendetta]]></dc:creator>
		
		<guid isPermaLink="false">https://www.scanforsecurity.com/?p=1100</guid>
		<description><![CDATA[<p>Torrents work on P2P technology, when there is no central server or repository, all network participants have the same rights and can download files from dozens (or hundreds) of other computers. With the growing popularity of broadband Internet, the speed of downloading and downloading files, torrents also rapidly began to gain momentum. On the other [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/how-to-use-torrents-safely-and-legally.html">How to use torrents safely and legally</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[
<p>Torrents work on <a rel="noreferrer noopener" aria-label="P2P technology (opens in a new tab)" href="https://en.wikipedia.org/wiki/Peer-to-peer" target="_blank">P2P technology</a>, when there is no central server or repository, all network participants have the same rights and can download files from dozens (or hundreds) of other computers.</p>



<p>With the growing popularity of broadband Internet, the speed of downloading and downloading files, torrents also rapidly began to gain momentum. On the other hand, torrents are often associated with piracy and illegal content. Internet service providers and copyright owners are trying to track IP addresses and hold torrent users accountable for illegal content distribution.</p>



<p>If you want to use sites with torrents (or trackers), but worry about your safety, this article is for you.</p>



<h3>Are torrents legal?</h3>



<p>Torrents are built on file sharing technology and in many cases can be used legally. For example, to distribute and download open source applications that can take from a few megabytes to several gigabytes. Storing installation files can be too expensive, and in order to save on file storage services, open source developers can use torrents to distribute their products. Accordingly, if you download open source software, then in this case torrents are completely legal.</p>



<p>However, most torrented content is pirated. In many countries, distributing such content is illegal because it infringes copyrights. Thus, P2P technology itself does not violate any laws, but downloading illegal content from the tracker violates.</p>



<p>One of the reasons copyright owners succeed in suing tracker users lies in how BitTorrent works. Downloading files from torrents occurs in small portions from other users called siders. Already downloaded parts of the file are immediately available for download by other network participants. That is, technically you download and at the same time make available already downloaded.</p>



<p>Copyright owners are not particularly concerned about the users who download the content, but they care about the users who allow them to download files from their computer. When using trackers, you become the hoster of the downloaded files and, as a result, fall into the pencil of the legitimate owners of this content.</p>



<p>It is not difficult for an Internet service provider and copyright holder to find users of trackers, as certain ports and protocols are used in this technology, and traffic can be easily detected with the help of appropriate signs.</p>



<p>To make downloading content easier and faster, torrent users make it possible to download from their IP address. If you do not hide your IP address and use a normal Internet connection, your ISP can see which files you download and share. </p>



<p>If the provider discovers that you are using torrents and your IP address to access copyrighted content, you can inform the copyright owner or contact you directly. As a result, you may be fined or even file a lawsuit.</p>



<p>Not only your provider can see your activity. Organizations themselves or copyright fighters acting on behalf of companies can also connect to trackers to monitor activity. In addition, anyone who knows your IP address can use the <a href="https://github.com/c3ph3i/iknowwhatyoudownload" target="_blank" rel="noreferrer noopener" aria-label="IKnowWhatYouDownload (opens in a new tab)">IKnowWhatYouDownload</a><strong> </strong>website to view the files that you have downloaded and distributed from your IP address.</p>



<p>The following are tips on how to use torrents reliably and safely.</p>



<h3>How to use torrents legally</h3>



<p>The first piece of advice you should learn is to download only legal content in order to be safe. For example, it’s quite risky to download movies recently released on Blu-ray or DVD.</p>



<p>If you do not want problems with the law, use only legal torrents. There are many different legal contents. For example, films produced by small studios, outdated content, and open source applications are often available for free. </p>



<p>Below are some good sites where you can find legal torrents:</p>



<ul><li>Public domain torrents</li><li> Internet archive</li><li> Vuze studioHD</li><li> Use a torrent client with privacy features</li></ul>



<h3>Use a torrent client with privacy features</h3>



<p>In addition to <strong>uTorrent</strong>, there are other torrent clients with specific options and functions. Some clients are focused on ensuring privacy and security and can encrypt your torrents and mask traffic. </p>



<p>On the other hand, these functions may not be enough, and additional protection measures are needed.</p>



<h3>Use proxies</h3>



<p>To increase the level of anonymity, you can configure a proxy server through which all traffic related to torrents will subsequently be redirected using the tunnel. </p>



<p>In this case, your real IP address will be replaced by another. In addition, you should check that your IP address is securely hidden. </p>



<p>For example, using the What’sMyIP service to make sure that there is no leakage of the real IP address during torrent downloads.</p>



<h3>Use VPN</h3>



<p>Today it is believed that VPN (Virtual Private Network; Virtual Private Network) is the most reliable tool for the safe use of torrents. VPN disguises the connection to torrent sites and hides your real IP address. </p>



<p>In addition, all traffic coming from your computer and sent through the secondary server is encrypted. Thus, the provider will not be able to find out which sites you visit and what content you download.</p>



<p>Please note that not every <strong><a href="https://www.scanforsecurity.com/articles/15-tips-to-protect-against-spying-on-your-smartphone.html" target="_blank" rel="noreferrer noopener" aria-label="VPN  (opens in a new tab)">VPN </a></strong>is good for torrents. For example, some services of this kind do not really care about your security and save all the information, including your real IP address. </p>



<p>Some free VPNs do not encrypt P2P traffic and, in fact, are useless from a security point of view. Before choosing, read user reviews and choose only a reliable service that has proved itself to be the best when using torrents.</p>



<h3>Use trackers in good standing</h3>



<p>Legal issues are not the only issues you may encounter while using torrents. For example, inside the contents downloaded from torrents, it may turn out to be malicious, and after the download is completed and the installation file is launched, a virus will appear on your computer.</p>



<p>To minimize these risks, it is better to use trackers with a good reputation. In addition, before downloading, it will be useful to familiarize yourself with the comments on the description of the torrent, where active users and administrators often inform about any problems regarding certain files and recommend ways to resolve these problems.</p>
<p>The post <a rel="nofollow" href="https://www.scanforsecurity.com/reporting-templates/how-to-use-torrents-safely-and-legally.html">How to use torrents safely and legally</a> appeared first on <a rel="nofollow" href="https://www.scanforsecurity.com">Scan For Security</a>.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 68/85 objects using memcached
Page Caching using memcached (Page is feed) 
Minified using memcached
Database Caching 15/21 queries in 0.078 seconds using memcached

Served from: scanforsecurity.com @ 2026-03-05 09:53:24 by W3 Total Cache
-->