lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Jun  7 08:09:50 2006
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Is your security 6/6/6 ready?

On Sun, 04 Jun 2006 21:46:07 BST, you said:

> Symantec is the biggest cyber non-government security 'think tank' for the
> internet, they have regular meetings to discuss 'cyber security situations'
> but they have overlooked 6/6/6, they don't see it as a threat, although it
> could be the biggest day since September the 11th 2001 but they think 'if
> theres no zero-day on fd or our honey nets then theres no threat', thats
> funny. n3td3v group know different. We gather intelligence from the biggest
> blackhats on the internet, we have specific intellignece on attacks planned
> in less than 48 hours to be launched against network infrastructure.
> Blackhat conference was last year but the aftermath of Cisco is still to
> rain down on the internet community. SANS, SYMANTEC, CNET thought everything
> is safe as long as FD 'chatter' is ok, think again. Theres multiple zero-day
> for Cisco systems queued up to launch attacks on the internet for 6/6/6

So how did all that turn out, anyhow?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060607/8bac8282/attachment.bin

Powered by blists - more mailing lists