Difference between revisions of "Template:ASW115NewsMikeShema"

From Security Weekly Wiki
Jump to navigationJump to search
Line 2: Line 2:
 
* [https://techcrunch.com/2020/07/15/twitter-accounts-hacked-crypto-scam/ Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam] that attracted lots of attention, second-guessing, and even a little bit of bitcoin. There's a lot of appsec to unpack, so we start with [https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html An update on our security incident] from Twitter. For users, the NCSC has helpful guidelines for [https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish Social media: protecting what you publish].
 
* [https://techcrunch.com/2020/07/15/twitter-accounts-hacked-crypto-scam/ Apple, Biden, Musk and other high-profile Twitter accounts hacked in crypto scam] that attracted lots of attention, second-guessing, and even a little bit of bitcoin. There's a lot of appsec to unpack, so we start with [https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html An update on our security incident] from Twitter. For users, the NCSC has helpful guidelines for [https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish Social media: protecting what you publish].
 
* [https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/ SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers] shows once again the benefits of scrutinizing protocols and being clever with compression.
 
* [https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/ SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers] shows once again the benefits of scrutinizing protocols and being clever with compression.
* [https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms Introducing Google Cloud Confidential Computing with Confidential VMs] that follows [https://azure.microsoft.com/en-us/blog/dcsv2series-vm-now-generally-available-from-azure-confidential-computing/ Azure] and [https://aws.amazon.com/ec2/nitro/nitro-enclaves/ AWS] in addressing how to operate on encrypted data.
+
* [https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms Introducing Google Cloud Confidential Computing with Confidential VMs] that follows [https://azure.microsoft.com/en-us/blog/dcsv2series-vm-now-generally-available-from-azure-confidential-computing/ Azure] and [https://aws.amazon.com/ec2/nitro/nitro-enclaves/ AWS] in addressing how to operate on encrypted data. Part of Google's announcement covers their new open source project that underpins this approach, [https://github.com/google/asylo Asylo].
 
* [https://www.zdnet.com/article/internet-of-things-devices-stick-to-these-security-rules-or-you-could-face-a-ban/ Internet of Things devices: Stick to these security rules or you could face a ban] updates the progress of rules related to IoT that we last looked at in [[ASWEpisode93|episode 93]].
 
* [https://www.zdnet.com/article/internet-of-things-devices-stick-to-these-security-rules-or-you-could-face-a-ban/ Internet of Things devices: Stick to these security rules or you could face a ban] updates the progress of rules related to IoT that we last looked at in [[ASWEpisode93|episode 93]].

Revision as of 21:39, 19 July 2020

Articles