From Security Weekly Wiki
Revision as of 20:15, 30 July 2020 by Paul Asadoorian (talk | contribs) (Added With Paul's Craptastic Python Script)
Jump to navigationJump to search


  1. DIY: Hunting Azure Shadow Admins Like Never Before
  2. Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection
  3. CVE-2020-8163
  4. Companies Respond to 'BootHole' Vulnerability | SecurityWeek.Com
  5. Bug in widely used bootloader opens Windows, Linux devices to persistent compromise - Help Net Security
  6. Vulnerability Allowed Brute-Forcing Passwords of Private Zoom Meetings | SecurityWeek.Com
  7. GNU GRUB2 Vulnerability | CISA
  8. InfoSec Handlers Diary Blog
  9. Offensive Security Acquires Cybersecurity Training Project VulnHub | SecurityWeek.Com
  10. 11 Tips And Tricks To Write Better Python Code
  11. Source code from 50+ companies, including Nintendo, Microsoft and Adobe, published online - SiliconANGLE
  12. The Age of Mass Surveillance Will Not Last Forever
  13. BootHole Secure Boot Threat Found In Most Every Linux Distro, Windows 8 And 10
  14. Hackers Broke Into Real News Sites to Plant Fake Stories
  15. New tool detects shadow admin accounts in AWS and Azure environments | ZDNet
  16. The Garmin Ransomware Hack Is Horrifying
  17. New Features in Python 3.9
  18. Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center
  19. Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center
  20. Vulnerability Management Maturity Model | SANS Institute
  21. Cisco Small Business Smart and Managed Switches Session Management Vulnerability
  22. Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment
  23. Cisco Talos discloses technicals details of Chrome, Firefox flaws
  24. Google open-sources Tsunami vulnerability scanner | ZDNet
  25. Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw
  26. Half a Million IoT Passwords Leaked - Schneier on Security
  27. Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says
  28. Notorious Hacker Fxmsp Outed After Widespread Access-Dealing
  29. Trump administration looking into ban on TikTok, other Chinese apps
  30. Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com
  31. InfoSec Handlers Diary Blog
  32. Pen Testing ROI: How to Communicate the Value of Security Testing
  33. 6 Tips for Getting the Most From Nessus
  34. Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security
  35. How to build a cyber threat intelligence program while cutting through the noise