May, 2015

article thumbnail

Official Kali Linux Docker Images Released

Kali Linux

For the latest information, please see our documentation on Docker Last week we received an email from a fellow penetration tester, requesting official Kali Linux Docker images that he could use for his work. We bootstrapped a minimal Kali Linux 1.1.0a base and registered it under our Kali Linux Docker account. A few minutes later, said fellow pentester was up and running with Metasploit and the Top 10 Kali Linux tools on his Macbook Pro.

article thumbnail

Threat Intelligence: one size does not fit all

NopSec

Literally a flood of lines have already been written about Security Threat Intelligence and its uses, so I would not bother the readers with more rhetoric. Just wanted to inform our NopSec interpret and uses threat intelligence as part of the Unified VRM platform. As part of my job I need to read a lot. And usually I don’t miss any article. As part of this reading task, lately I came across a lot of threat intelligence articles and commentaries.

Malware 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Driver’s Licence Information and Test Drives: Guidance from the Alberta Office of the Information Privacy Commissioner

Privacy and Cybersecurity Law

What personal information is reasonable for a motor vehicle dealer to collect from individuals participating in test drives? It has been […].

40
article thumbnail

Pixiewps, Reaver & Aircrack-ng Wireless Penetration Testing Tool Updates

Kali Linux

A short while ago, we packaged and pushed out a few important wireless penetration testing tool updates for aircrack-ng, pixiewps and reaver into Kali’s repository. These new additions and updates are fairly significant, and may even change your wireless attack workflows. Here’s a short run-down of the updates and the changes they bring.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Privacy law and anti-spam: Guidance from the Office of the Privacy Commissioner of Canada

Privacy and Cybersecurity Law

Recent enforcement under Canada’s anti-spam legislation (CASL) by the Canadian Radio-Television and Telecommunications Commission (CRTC) is keeping the spotlight on […].

article thumbnail

Consent to Disclose Information in Response to a Consumer Complaint – Guidance from Canada

Privacy and Cybersecurity Law

Not infrequently, customers may resort to consumer affairs columnists and other third parties, such as consumer advocacy groups, in order […].

40