lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <45c3e8030606070723j51db92f0xfc7a2181474a1e5e@mail.gmail.com>
Date: Wed Jun  7 15:23:40 2006
From: analyzerx at gmail.com (analyzerx)
Subject: Is your security 6/6/6 ready?

as always just talk

On 6/7/06, Valdis.Kletnieks@...edu <Valdis.Kletnieks@...edu> wrote:
> On Sun, 04 Jun 2006 21:46:07 BST, you said:
>
> > Symantec is the biggest cyber non-government security 'think tank' for the
> > internet, they have regular meetings to discuss 'cyber security situations'
> > but they have overlooked 6/6/6, they don't see it as a threat, although it
> > could be the biggest day since September the 11th 2001 but they think 'if
> > theres no zero-day on fd or our honey nets then theres no threat', thats
> > funny. n3td3v group know different. We gather intelligence from the biggest
> > blackhats on the internet, we have specific intellignece on attacks planned
> > in less than 48 hours to be launched against network infrastructure.
> > Blackhat conference was last year but the aftermath of Cisco is still to
> > rain down on the internet community. SANS, SYMANTEC, CNET thought everything
> > is safe as long as FD 'chatter' is ok, think again. Theres multiple zero-day
> > for Cisco systems queued up to launch attacks on the internet for 6/6/6
>
> So how did all that turn out, anyhow?
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ