Difference between revisions of "Template:PSW660NewsPaulAsadoorian"
From Security Weekly Wiki
Jump to navigationJump to search (Added By Paul's Craptastic PPWorks Code) |
(Added With Paul's Craptastic Python Script) |
||
Line 1: | Line 1: | ||
===Articles=== | ===Articles=== | ||
+ | #[https://www.cyberark.com/resources/threat-research-blog/diy-hunting-azure-shadow-admins-like-never-before-2 DIY: Hunting Azure Shadow Admins Like Never Before] | ||
+ | #[https://businessinsights.bitdefender.com/bitdefender-releases-landmark-open-source-software-project-hypervisor-based-memory-introspection Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection] | ||
+ | #[https://github.com/sh286/CVE-2020-8163 CVE-2020-8163] | ||
+ | #[https://www.securityweek.com/companies-respond-boothole-vulnerability Companies Respond to 'BootHole' Vulnerability | SecurityWeek.Com] | ||
+ | #[https://www.helpnetsecurity.com/2020/07/30/cve-2020-10713/ Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security] | ||
+ | #[https://www.securityweek.com/vulnerability-allowed-brute-forcing-passwords-private-zoom-meetings Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings | SecurityWeek.Com] | ||
+ | #[https://us-cert.cisa.gov/ncas/current-activity/2020/07/30/gnu-grub2-vulnerability GNU GRUB2 Vulnerability | CISA] | ||
+ | #[https://isc.sans.edu/diary.html?storyid=26408 InfoSec Handlers Diary Blog] | ||
+ | #[https://www.securityweek.com/offensive-security-acquires-cybersecurity-training-project-vulnhub Offensive Security Acquires Cybersecurity Training Project VulnHub | SecurityWeek.Com] | ||
+ | #[https://dev.to/python_engineer/11-tips-and-tricks-to-write-better-python-code-5fck 11 Tips And Tricks To Write Better Python Code] | ||
+ | #[https://siliconangle.com/2020/07/27/source-code-dozens-companies-including-nintendo-microsoft-adobe-published-online/ Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - SiliconANGLE] | ||
+ | #[https://www.wired.com/story/the-age-of-mass-surveillance-will-not-last-forever/ The Age of Mass Surveillance Will Not Last Forever] | ||
+ | #[https://www.forbes.com/sites/daveywinder/2020/07/29/boothole-secure-boot-threat-confirmed-in-most-every-linux-distro-windows-8-and-10-microsoft-ubuntu-redhat-suse-debian-citrix-oracle-vmware/ BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10] | ||
+ | #[https://www.wired.com/story/hackers-broke-into-real-news-sites-to-plant-fake-stories-anti-nato/ Hackers Broke Into Real News Sites to Plant Fake Stories] | ||
+ | #[https://www.zdnet.com/article/new-tool-detects-shadow-admin-accounts-in-aws-and-azure-environments/ New tool detects shadow admin accounts in AWS and Azure environments | ZDNet] | ||
+ | #[https://www.vice.com/en_in/article/5dzkd5/the-garmin-ransomware-hack-is-horrifying The Garmin Ransomware Hack Is Horrifying] | ||
+ | #[https://towardsdatascience.com/new-features-in-python39-2529765429fe New Features in Python 3.9] | ||
+ | #[http://msrc-blog.microsoft.com/2020/07/02/solving-uninitialized-kernel-pool-memory-on-windows/ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center] | ||
+ | #[http://msrc-blog.microsoft.com/2020/05/13/solving-uninitialized-stack-memory-on-windows/ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center] | ||
+ | #[https://www.sans.org/blog/vulnerability-management-maturity-model/ Vulnerability Management Maturity Model | SANS Institute] | ||
+ | #[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY Cisco Small Business Smart and Managed Switches Session Management Vulnerability] | ||
+ | #[https://news.hitb.org/content/hackers-are-exploiting-5-alarm-bug-networking-equipment Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment] | ||
+ | #[https://securityaffairs.co/wordpress/105547/security/talos-chrome-firefox-flaws.html Cisco Talos discloses technicals details of Chrome, Firefox flaws] | ||
+ | #[https://www.zdnet.com/article/google-open-sources-tsunami-vulnerability-scanner/ Google open-sources Tsunami vulnerability scanner | ZDNet] | ||
+ | #[https://securityaffairs.co/wordpress/105662/hacking/f5-big-ip-flaw-mitigation-bypass.html Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw] | ||
+ | #[https://www.schneier.com/blog/archives/2020/07/half_a_million.html Half a Million IoT Passwords Leaked - Schneier on Security] | ||
+ | #[https://www.vice.com/en_us/article/qj43xq/cops-seize-blueleaks-ddosecrets-server Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says] | ||
+ | #[https://threatpost.com/notorious-hacker-fxmsp-outed/157275/ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing] | ||
+ | #[https://news.hitb.org/content/trump-administration-looking-ban-tiktok-other-chinese-apps Trump administration looking into ban on TikTok, other Chinese apps] | ||
+ | #[https://www.securityweek.com/palo-alto-networks-patches-command-injection-vulnerabilities-pan-os Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com] | ||
+ | #[https://isc.sans.edu/diary.html?storyid=26330 InfoSec Handlers Diary Blog] | ||
+ | #[https://www.darkreading.com/vulnerabilities---threats/pen-testing-roi-how-to-communicate-the-value-of-security-testing/a/d-id/1338257 Pen Testing ROI: How to Communicate the Value of Security Testing] | ||
+ | #[https://www.darkreading.com/vulnerabilities---threats/6-tips-for-getting-the-most-from-nessus/d/d-id/1338310 6 Tips for Getting the Most From Nessus] | ||
+ | #[https://www.helpnetsecurity.com/2020/07/09/zoom-zero-day-windows/ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security] | ||
+ | #[https://www.theregister.com/2020/07/09/separating_good_data_from_clutter/ How to build a cyber threat intelligence program while cutting through the noise] |
Revision as of 20:15, 30 July 2020
Articles
- DIY: Hunting Azure Shadow Admins Like Never Before
- Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection
- CVE-2020-8163
- Companies Respond to 'BootHole' Vulnerability | SecurityWeek.Com
- Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security
- Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings | SecurityWeek.Com
- GNU GRUB2 Vulnerability | CISA
- InfoSec Handlers Diary Blog
- Offensive Security Acquires Cybersecurity Training Project VulnHub | SecurityWeek.Com
- 11 Tips And Tricks To Write Better Python Code
- Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - SiliconANGLE
- The Age of Mass Surveillance Will Not Last Forever
- BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
- Hackers Broke Into Real News Sites to Plant Fake Stories
- New tool detects shadow admin accounts in AWS and Azure environments | ZDNet
- The Garmin Ransomware Hack Is Horrifying
- New Features in Python 3.9
- Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center
- Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center
- Vulnerability Management Maturity Model | SANS Institute
- Cisco Small Business Smart and Managed Switches Session Management Vulnerability
- Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment
- Cisco Talos discloses technicals details of Chrome, Firefox flaws
- Google open-sources Tsunami vulnerability scanner | ZDNet
- Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw
- Half a Million IoT Passwords Leaked - Schneier on Security
- Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says
- Notorious Hacker Fxmsp Outed After Widespread Access-Dealing
- Trump administration looking into ban on TikTok, other Chinese apps
- Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com
- InfoSec Handlers Diary Blog
- Pen Testing ROI: How to Communicate the Value of Security Testing
- 6 Tips for Getting the Most From Nessus
- Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security
- How to build a cyber threat intelligence program while cutting through the noise