Hacker Newsnew | past | comments | ask | show | jobs | submit | myover's submissionslogin
1.Bypassing Google's Santa Application Whitelisting on macOS (#hacking) (praetorian.com)
1 point by myover on June 12, 2019 | past
2.Cloud Data Exfiltration via GCP Storage Buckets and How to Prevent It (praetorian.com)
1 point by myover on June 6, 2019 | past
3.What we learned from 100 Pen Tests, 75 Organizations, 450 Attack Vectors [pdf] (praetorian.com)
1 point by myover on Sept 2, 2016 | past
4.Insider Interview about Internet of Things (IoT) Hacking for Big Business (iot-inc.com)
1 point by myover on June 17, 2016 | past
5.Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) (praetorian.com)
2 points by myover on June 2, 2016 | past
6.Great Example of an Engineering Culture at Work in Security Services (praetorian.com)
1 point by myover on April 26, 2016 | past
7.JTAGulator vs. JTAGenum, Hardware Hacking Tools for IoT Devices (praetorian.com)
2 points by myover on April 20, 2016 | past
8.SPAM Filters: A Reliable Protection Against Phishing Attacks? (praetorian.com)
4 points by myover on April 12, 2016 | past
9.End-To-End WhatsApp Encryption: Why Signal Protocol Is So Well-Designed (praetorian.com)
6 points by myover on April 7, 2016 | past
10.Pentestly: When Pentesting Meets Python and Powershell (github.com/praetorian-inc)
4 points by myover on Feb 18, 2016 | past
11.Machine Learning Tutorial (praetorian.com)
4 points by myover on Feb 15, 2016 | past | 2 comments
12.Statistics Based Password Cracking Rules Released (praetorian.com)
4 points by myover on Feb 11, 2016 | past
13.Ruby Unsafe Reflection Vulnerabilities (praetorian.com)
1 point by myover on Feb 9, 2016 | past
14.Introducing Gladius: Automatic Responder Cracking for Internal Pentests (praetorian.com)
5 points by myover on Feb 4, 2016 | past
15.Introducing MitM-VM and Trudy… a Dead Simple TCP Intercepting Proxy Tool Set (praetorian.com)
4 points by myover on Feb 2, 2016 | past
16.IPv6 Has Arrived – Is Your Security Infrastructure Prepared? (praetorian.com)
2 points by myover on Jan 28, 2016 | past
17.The Reason My Lamp Is Insecure (praetorian.com)
3 points by myover on Jan 26, 2016 | past
18.Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1 (praetorian.com)
3 points by myover on Jan 23, 2016 | past
19.JavaScript Sensor API and New Browser Features Raise Privacy Concerns (praetorian.com)
6 points by myover on Jan 19, 2016 | past
20.Pwning Gnomes: Where CTF Meets 2015 SANS Holiday Hack (Write-Up) (praetorian.com)
6 points by myover on Jan 5, 2016 | past
21.I've Now Been Working with the Same Company for 5-years and I Still Love It (linkedin.com)
1 point by myover on Dec 18, 2015 | past
22.How Researchers Are Using a Drone to Discover Connected Devices in Austin (fortune.com)
3 points by myover on Aug 6, 2015 | past
23.IoT Project Maps 1,586 Unique Devices and Fingerprints 956 Manufacturer Names (praetorian.com)
5 points by myover on Aug 4, 2015 | past
24.ZigBee sniffing drone discovered 726 unique IoT devices over 18min flight (twitter.com/praetorianlabs)
6 points by myover on July 29, 2015 | past
25.PWNABLE: New Praetorian Tech Challenge Released (praetorian.com)
2 points by myover on July 8, 2015 | past
26.Life at Praetorian, an Information Security Company [Internal Magazine Release] (praetorian.com)
5 points by myover on May 28, 2015 | past
27.Security Game Changer? Microsoft's Local Administrator Password Solution (LAPS) (praetorian.com)
4 points by myover on May 6, 2015 | past | 1 comment
28.Statistics Will Crack Your Password (praetorian.com)
17 points by myover on April 14, 2015 | past | 5 comments
29.[AWS Cloud] Know the Shared Security Responsibility Model (praetorian.com)
1 point by myover on March 24, 2015 | past
30.Cloud Security Best Practices for Amazon Web Services (AWS) (praetorian.com)
4 points by myover on Oct 2, 2014 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: