Difference between revisions of "Template:PSW660NewsPaulAsadoorian"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
 
(Added With Paul's Craptastic Python Script)
Line 1: Line 1:
 
===Articles===
 
===Articles===
 +
#[https://www.cyberark.com/resources/threat-research-blog/diy-hunting-azure-shadow-admins-like-never-before-2 DIY: Hunting Azure Shadow Admins Like Never Before]
 +
#[https://businessinsights.bitdefender.com/bitdefender-releases-landmark-open-source-software-project-hypervisor-based-memory-introspection Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection]
 +
#[https://github.com/sh286/CVE-2020-8163 CVE-2020-8163]
 +
#[https://www.securityweek.com/companies-respond-boothole-vulnerability Companies Respond to 'BootHole' Vulnerability | SecurityWeek.Com]
 +
#[https://www.helpnetsecurity.com/2020/07/30/cve-2020-10713/ Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security]
 +
#[https://www.securityweek.com/vulnerability-allowed-brute-forcing-passwords-private-zoom-meetings Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings | SecurityWeek.Com]
 +
#[https://us-cert.cisa.gov/ncas/current-activity/2020/07/30/gnu-grub2-vulnerability GNU GRUB2 Vulnerability | CISA]
 +
#[https://isc.sans.edu/diary.html?storyid=26408 InfoSec Handlers Diary Blog]
 +
#[https://www.securityweek.com/offensive-security-acquires-cybersecurity-training-project-vulnhub Offensive Security Acquires Cybersecurity Training Project VulnHub | SecurityWeek.Com]
 +
#[https://dev.to/python_engineer/11-tips-and-tricks-to-write-better-python-code-5fck 11 Tips And Tricks To Write Better Python Code]
 +
#[https://siliconangle.com/2020/07/27/source-code-dozens-companies-including-nintendo-microsoft-adobe-published-online/ Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - SiliconANGLE]
 +
#[https://www.wired.com/story/the-age-of-mass-surveillance-will-not-last-forever/ The Age of Mass Surveillance Will Not Last Forever]
 +
#[https://www.forbes.com/sites/daveywinder/2020/07/29/boothole-secure-boot-threat-confirmed-in-most-every-linux-distro-windows-8-and-10-microsoft-ubuntu-redhat-suse-debian-citrix-oracle-vmware/ BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10]
 +
#[https://www.wired.com/story/hackers-broke-into-real-news-sites-to-plant-fake-stories-anti-nato/ Hackers Broke Into Real News Sites to Plant Fake Stories]
 +
#[https://www.zdnet.com/article/new-tool-detects-shadow-admin-accounts-in-aws-and-azure-environments/ New tool detects shadow admin accounts in AWS and Azure environments | ZDNet]
 +
#[https://www.vice.com/en_in/article/5dzkd5/the-garmin-ransomware-hack-is-horrifying The Garmin Ransomware Hack Is Horrifying]
 +
#[https://towardsdatascience.com/new-features-in-python39-2529765429fe New Features in Python 3.9]
 +
#[http://msrc-blog.microsoft.com/2020/07/02/solving-uninitialized-kernel-pool-memory-on-windows/ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center]
 +
#[http://msrc-blog.microsoft.com/2020/05/13/solving-uninitialized-stack-memory-on-windows/ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center]
 +
#[https://www.sans.org/blog/vulnerability-management-maturity-model/ Vulnerability Management Maturity Model | SANS Institute]
 +
#[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY Cisco Small Business Smart and Managed Switches Session Management Vulnerability]
 +
#[https://news.hitb.org/content/hackers-are-exploiting-5-alarm-bug-networking-equipment Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment]
 +
#[https://securityaffairs.co/wordpress/105547/security/talos-chrome-firefox-flaws.html Cisco Talos discloses technicals details of Chrome, Firefox flaws]
 +
#[https://www.zdnet.com/article/google-open-sources-tsunami-vulnerability-scanner/ Google open-sources Tsunami vulnerability scanner | ZDNet]
 +
#[https://securityaffairs.co/wordpress/105662/hacking/f5-big-ip-flaw-mitigation-bypass.html Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw]
 +
#[https://www.schneier.com/blog/archives/2020/07/half_a_million.html Half a Million IoT Passwords Leaked - Schneier on Security]
 +
#[https://www.vice.com/en_us/article/qj43xq/cops-seize-blueleaks-ddosecrets-server Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says]
 +
#[https://threatpost.com/notorious-hacker-fxmsp-outed/157275/ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing]
 +
#[https://news.hitb.org/content/trump-administration-looking-ban-tiktok-other-chinese-apps Trump administration looking into ban on TikTok, other Chinese apps]
 +
#[https://www.securityweek.com/palo-alto-networks-patches-command-injection-vulnerabilities-pan-os Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com]
 +
#[https://isc.sans.edu/diary.html?storyid=26330 InfoSec Handlers Diary Blog]
 +
#[https://www.darkreading.com/vulnerabilities---threats/pen-testing-roi-how-to-communicate-the-value-of-security-testing/a/d-id/1338257 Pen Testing ROI: How to Communicate the Value of Security Testing]
 +
#[https://www.darkreading.com/vulnerabilities---threats/6-tips-for-getting-the-most-from-nessus/d/d-id/1338310 6 Tips for Getting the Most From Nessus]
 +
#[https://www.helpnetsecurity.com/2020/07/09/zoom-zero-day-windows/ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security]
 +
#[https://www.theregister.com/2020/07/09/separating_good_data_from_clutter/ How to build a cyber threat intelligence program while cutting through the noise]

Revision as of 20:15, 30 July 2020

Articles

  1. DIY: Hunting Azure Shadow Admins Like Never Before
  2. Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection
  3. CVE-2020-8163
  4. Companies Respond to 'BootHole' Vulnerability | SecurityWeek.Com
  5. Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security
  6. Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings | SecurityWeek.Com
  7. GNU GRUB2 Vulnerability | CISA
  8. InfoSec Handlers Diary Blog
  9. Offensive Security Acquires Cybersecurity Training Project VulnHub | SecurityWeek.Com
  10. 11 Tips And Tricks To Write Better Python Code
  11. Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - SiliconANGLE
  12. The Age of Mass Surveillance Will Not Last Forever
  13. BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
  14. Hackers Broke Into Real News Sites to Plant Fake Stories
  15. New tool detects shadow admin accounts in AWS and Azure environments | ZDNet
  16. The Garmin Ransomware Hack Is Horrifying
  17. New Features in Python 3.9
  18. Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center
  19. Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center
  20. Vulnerability Management Maturity Model | SANS Institute
  21. Cisco Small Business Smart and Managed Switches Session Management Vulnerability
  22. Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment
  23. Cisco Talos discloses technicals details of Chrome, Firefox flaws
  24. Google open-sources Tsunami vulnerability scanner | ZDNet
  25. Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw
  26. Half a Million IoT Passwords Leaked - Schneier on Security
  27. Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says
  28. Notorious Hacker Fxmsp Outed After Widespread Access-Dealing
  29. Trump administration looking into ban on TikTok, other Chinese apps
  30. Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com
  31. InfoSec Handlers Diary Blog
  32. Pen Testing ROI: How to Communicate the Value of Security Testing
  33. 6 Tips for Getting the Most From Nessus
  34. Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security
  35. How to build a cyber threat intelligence program while cutting through the noise