So... According to the #whitehouse #Trump is starting a #WarOnScams

You can call to report cyber-scams using your Trump Phone

#whiteHatHacking
#cyberSecurity

Hinter den Kulissen: Wie White Hats legal in fremde IT-Systeme einbrechen

Legale Hacker im Einsatz: Wie White Hats IT-Systeme angreifen, um sie sicherer zu machen. Ein Videobeitrag.

heise online

Laut #Bundesverfassungsgericht ist Ethical Hacking strafbar.

Unsere Expertin @privacyDE hält das für problematisch: „Ethical Hacking (#whitehathacking) ist wünschenswert, weil es die Sicherheit für alle erhöht. Trotzdem stellt das StGB jede Form von Hacking unter Strafe. Das ist weder zeitgemäß, noch macht es das Internet sicherer.“

Mehr zum Fall unter #DatenschutzImFokus:
https://stiftungdatenschutz.org/veroeffentlichungen/datenschutz-im-fokus

#TeamDatenschutz

Datenschutz im Fokus

Die Stiftung Datenschutz wurde im Januar 2013 von der Bundesrepublik Deutschland als Stiftung privaten Rechts gegründet. Sie ist gemeinnützig und verfolgt keine gewerblichen Interessen.

Bug Bounty da Nubank é considerado Farsa, desmotivando Hunters

Hunters relata problemas graves no programa de Bug Bounty da Nubank.

13SEC NEWS
Hackaday Links: January 28, 2024

From the “No good deed goes unpunished” files, this week came news of a German programmer who probably wishes he had selected better clients. According to Heise Online (English translat…

Hackaday

I've been reading about the subject of #whiteHatHacking in the recent weeks, and the area of #bugBountyHunting really intrigued me.

There have been similar programs, but only for the #WordPress core.

I'm glad there's a new financial incentive in the WordPress ecosystem, to help fix bugs and security issues of popular plugins/themes, and make this #openSource project remain competitive.

 

https://wptavern.com/wordfence-launches-bug-bounty-program

Wordfence Launches Bug Bounty Program

Wordfence launched a bug bounty program today to provide financial incentive for security researchers reporting high risk vulnerabilities to the company’s program. After researchers disclose …

WP Tavern

🕵🏻 "Cybercrime & White-Hat-Hacking" - https://rechtsbelehrung.com/119-cybercrime-hacking - Wann Hacking erlaubt ist, warum Hacker dennoch immer auf der Hut sein müssen und wie sie sich vor Strafverfolgung schützen können, erklären wir in der @rechtsbelehrung gemeinsam mit Johanna Voget, LL.M., wissenschaftliche Mitarbeiterin und Doktorandin am Institut für Informations-, Telekommunikations- und Medienrecht (ITM) der Uni Münster. 🎧

/w @monoxyd

#podcast #Rechtsbelehrung #cybercrime #hacking #whiteHatHacking

How to #pwn an airline (#TSA no-fly list and "selectee" lists were found on a unsecured/misconfigured server of a small #airline company in the U.S.)

https://maia.crimew.gay/posts/how-to-hack-an-airline/

#pwnage #whitehathacking #datasecurity #hacked

how to completely own an airline in 3 easy steps

and grab the TSA nofly list along the way

maia :3

Found this gem on #distro watch it was free. Following the #threatintel hashtag after a dust up with the nzboi trolls

This ain't no ad I just a rank and file antifascist mofo like you.Zero financial interest in the book. If trolls tryn report me the admins here will probably just block the trolls so nazis fuck off.

Had to give a "business" eamil but they took a free one. Imma business, the business of fighint fascsim. Professional revolutionary and all that.

So if yer into #whitehathacking jump on this shit while it's still available. Writer is a Ph D candidate.

I think they are making some kind of marketing database so whatever. Looks pretty legit.

Here is the boiler plate:

#Cyber #ThreatIntelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats.

This book thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle.

You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. With the help of practical examples, this book will help you get to grips with threat data processing and analysis. And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community.

... skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions.

#HGI: Forschende, die eine IT-#Sicherheitslücke identifizieren und melden, können dafür in Deutschland gemäß den Paragraphen 202a und 202c des StGB strafrechtlich verfolgt werden.
In dem Whitepaper „White-Hat-Hacking in der Forschung“ (#WhiteHatHacking)werden die Auswirkungen dieser Paragraphen auf die IT-Sicherheitsforschung aufgezeigt.
https://hgi.rub.de/news/newsarchiv/hgi/whitepaper-white-hat-hacking-in-der-forschung
#ISMS-Blog
Whitepaper „White-Hat-Hacking in der Forschung“ erschienen

Im Fokus stehen die Auswirkungen der Paragraphen 202a und 202c StGB auf die IT-Sicherheitsforschung in Deutschland