Difference between revisions of "Template:ASW115NewsMikeShema"

From Security Weekly Wiki
Jump to navigationJump to search
Line 1: Line 1:
 
===Articles===
 
===Articles===
* [https://techcrunch.com/2020/07/15/twitter-accounts-hacked-crypto-scam/ Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam] that attracted lots of attention, second-guessing, and even a little bit of bitcoin. There's a lot of appsec to unpack, so we start with [https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html An update on our security incident] from Twitter.
+
* [https://techcrunch.com/2020/07/15/twitter-accounts-hacked-crypto-scam/ Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam] that attracted lots of attention, second-guessing, and even a little bit of bitcoin. There's a lot of appsec to unpack, so we start with [https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html An update on our security incident] from Twitter. For users, the NCSC has helpful guidelines for [https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish Social media: protecting what you publish].
 
[https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/ SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers] shows once again the benefits of scrutinizing protocols and being clever with compression.
 
[https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/ SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers] shows once again the benefits of scrutinizing protocols and being clever with compression.
 
* [https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms Introducing Google Cloud Confidential Computing with Confidential VMs] that follows [https://azure.microsoft.com/en-us/blog/dcsv2series-vm-now-generally-available-from-azure-confidential-computing/ Azure] and [https://aws.amazon.com/ec2/nitro/nitro-enclaves/ AWS] in addressing how to operate on encrypted data.
 
* [https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms Introducing Google Cloud Confidential Computing with Confidential VMs] that follows [https://azure.microsoft.com/en-us/blog/dcsv2series-vm-now-generally-available-from-azure-confidential-computing/ Azure] and [https://aws.amazon.com/ec2/nitro/nitro-enclaves/ AWS] in addressing how to operate on encrypted data.

Revision as of 20:51, 19 July 2020

Articles

SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers shows once again the benefits of scrutinizing protocols and being clever with compression.