From Security Weekly Wiki
Jump to navigationJump to search
Added With Paul's Craptastic Python Script
#[ Cybercriminals Could be Coming After Your Coffee]
#[ JWT Tokens: The What, How, and Why]
#[ Attackers finding new ways to exploit and bypass Office 365 defenses - Help Net Security]
#[ Oracle VM VirtualBox Buffer Overflow]
#[ Microsoft IE Browser Death March Hastens]
#[ 78% of Microsoft 365 admins don't activate MFA - Help Net Security]
#[ Humans are Bad at URLs and Fonts Dont Matter]
#[ Hackers Can Open Doors by Exploiting Vulnerabilities in Hrmann Device | SecurityWeek.Com]
#[ URL and website scanner -]
#[ Over 100 irrigation systems left exposed online without protection]
#[ Microsoft Introduces New Password Spray Detection for Azure | SecurityWeek.Com]
#[ Anonymous Authentication: How to Secure Public APIs]
#[ Back to the future: What the Jericho Forum taught us about modern security - Microsoft Security]
#[ Nagios XI 5.7.3 Remote Command Injection]
#[ StackRox Releases Open Source Tool for Finding Kubernetes Misconfigurations | SecurityWeek.Com]
#[ Can automated penetration testing replace humans? - Help Net Security]
#[ KashmirBlack Botnet Hijacks Thousands of Sites Running On Popular CMS Platforms]
#[ Oracle WebLogic Server RCE Flaw Under Active Attack]
#[ Tracking Users on Waze - Schneier on Security]
#[ Microsoft Introduces Device Vulnerability Report in Defender for Endpoint | SecurityWeek.Com]
#[ Redirect Detective - Discover where those redirects really go to]
#[ Hackers may have been of its time, but it was also ahead of it]
#[ AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security]
#[ Amazon Alexa One-Click Attack Can Divulge Personal Data]
#[ RedCurl cybercrime group has hacked companies for three years | ZDNet]
#[ Chinese hackers have pillaged Taiwans semiconductor industry]
#[ If your email is hacked, everything is]
#[ TeamViewer flaw can allow hackers to steal System password]
#[ Researcher Publishes Patch Bypass for vBulletin 0-Day]
#[ Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet]
#[ Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com]
#[ SANS Security Training Firm Hit with Data Breach]
#[ Threat actors managed to control 23% of Tor Exit nodes]
#[ Most security pros are concerned about human error exposing cloud data - Help Net Security]
#[ Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com]
#[ Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity]
#[ Hackers can eavesdrop on mobile calls with $7,000 worth of equipment]
#[ SANS cybersecurity training firm suffers data breach due to phishing attack]
#[ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center]
#[ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center]
#[ Vulnerability Management Maturity Model | SANS Institute]
#[ Cisco Small Business Smart and Managed Switches Session Management Vulnerability]
#[ Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment]
#[ Cisco Talos discloses technicals details of Chrome, Firefox flaws]
#[ Google open-sources Tsunami vulnerability scanner | ZDNet]
#[ Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw]
#[ Half a Million IoT Passwords Leaked - Schneier on Security]
#[ Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says]
#[ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing]
#[ Trump administration looking into ban on TikTok, other Chinese apps]
#[ Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com]
#[ InfoSec Handlers Diary Blog]
#[ Pen Testing ROI: How to Communicate the Value of Security Testing]
#[ 6 Tips for Getting the Most From Nessus]
#[ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security]
#[ How to build a cyber threat intelligence program while cutting through the noise]


Navigation menu