From Security Weekly Wiki
Jump to navigationJump to search
Added With Paul's Craptastic Python Script
#[ Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events - CyberScoop]
#[ Rapid7 Metasploit Framework msfvenom APK Template Command Injection]
#[ The Sad State of Two-Factor Authentication in U.S. Banking]
#[ Container Security Threats]
#[ The Security Failures of Online Exam Proctoring - Schneier on Security]
#[ DNS cache poisoning, the Internet attack from 2008, is back from the dead]
#[ Google patches two more Chrome zero-days | ZDNet]
#[ The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means. | SecurityWeek.Com]
#[ Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks]
#[ Yantra Manav A wormable SSH bot]
#[ SaltStack Salt REST API Arbitrary Command Execution]
#[ Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security]
#[ The alleged decompiled source code of Cobalt Strike toolkit leaked online]
#[ How to get root on Ubuntu 20.04 by pretending nobodys /home - GitHub Security Lab]
#[ Decrypting OpenSSH sessions for fun and profit]
#[ This new malware wants to add your Linux servers and IoT devices to its botnet | ZDNet]
#[ Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It]
#[ Computer Scientists Achieve Crown Jewel of Cryptography]
#[ AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security]
#[ Amazon Alexa One-Click Attack Can Divulge Personal Data]
#[ RedCurl cybercrime group has hacked companies for three years | ZDNet]
#[ Chinese hackers have pillaged Taiwans semiconductor industry]
#[ If your email is hacked, everything is]
#[ TeamViewer flaw can allow hackers to steal System password]
#[ Researcher Publishes Patch Bypass for vBulletin 0-Day]
#[ Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet]
#[ Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com]
#[ SANS Security Training Firm Hit with Data Breach]
#[ Threat actors managed to control 23% of Tor Exit nodes]
#[ Most security pros are concerned about human error exposing cloud data - Help Net Security]
#[ Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com]
#[ Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity]
#[ Hackers can eavesdrop on mobile calls with $7,000 worth of equipment]
#[ SANS cybersecurity training firm suffers data breach due to phishing attack]
#[ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center]
#[ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center]
#[ Vulnerability Management Maturity Model | SANS Institute]
#[ Cisco Small Business Smart and Managed Switches Session Management Vulnerability]
#[ Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment]
#[ Cisco Talos discloses technicals details of Chrome, Firefox flaws]
#[ Google open-sources Tsunami vulnerability scanner | ZDNet]
#[ Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw]
#[ Half a Million IoT Passwords Leaked - Schneier on Security]
#[ Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says]
#[ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing]
#[ Trump administration looking into ban on TikTok, other Chinese apps]
#[ Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com]
#[ InfoSec Handlers Diary Blog]
#[ Pen Testing ROI: How to Communicate the Value of Security Testing]
#[ 6 Tips for Getting the Most From Nessus]
#[ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security]
#[ How to build a cyber threat intelligence program while cutting through the noise]


Navigation menu