Difference between revisions of "Template:PSW672NewsPaulAsadoorian"
From Security Weekly Wiki
Jump to navigationJump to searchLine 5: | Line 5: | ||
#[http://exploit.kitploit.com/2020/10/oracle-vm-virtualbox-buffer-overflow.html Oracle VM VirtualBox Buffer Overflow] - ''A buffer overflow vulnerability in Oracle VM VirtualBox was privately reported to Oracle on September 22, 2020 and was silently patched in VM VirtualBox version 6.1.16r140961.'' Not-so-silent (though no exploit example was provided, I didn't look further). | #[http://exploit.kitploit.com/2020/10/oracle-vm-virtualbox-buffer-overflow.html Oracle VM VirtualBox Buffer Overflow] - ''A buffer overflow vulnerability in Oracle VM VirtualBox was privately reported to Oracle on September 22, 2020 and was silently patched in VM VirtualBox version 6.1.16r140961.'' Not-so-silent (though no exploit example was provided, I didn't look further). | ||
#[https://threatpost.com/ie-browser-death-march/160571/ Microsoft IE Browser Death March Hastens] - Most users are running Chrome, Chrome has plenty of vulnerabilities, do we need IE any longer? | #[https://threatpost.com/ie-browser-death-march/160571/ Microsoft IE Browser Death March Hastens] - Most users are running Chrome, Chrome has plenty of vulnerabilities, do we need IE any longer? | ||
− | #[https://www.helpnetsecurity.com/2020/10/27/activate-microsoft-365-mfa/ 78% of Microsoft 365 admins don't activate MFA - Help Net Security] | + | #[https://www.helpnetsecurity.com/2020/10/27/activate-microsoft-365-mfa/ 78% of Microsoft 365 admins don't activate MFA - Help Net Security] - 99% is a lot... ''According to SANS, 99% of data breaches can be prevented using MFA. This is a huge security risk, particularly during a time when so many employees are working remotely.'' |
#[https://www.troyhunt.com/humans-are-bad-at-urls-and-fonts-dont-matter/ Humans are Bad at URLs and Fonts Dont Matter] | #[https://www.troyhunt.com/humans-are-bad-at-urls-and-fonts-dont-matter/ Humans are Bad at URLs and Fonts Dont Matter] | ||
#[https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device Hackers Can Open Doors by Exploiting Vulnerabilities in Hrmann Device | SecurityWeek.Com] | #[https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device Hackers Can Open Doors by Exploiting Vulnerabilities in Hrmann Device | SecurityWeek.Com] |
Revision as of 18:38, 29 October 2020
Articles
- Cybercriminals Could be Coming After Your Coffee - From the article: When it comes to whether you should get an IoT device or not, the general rule is to first ask yourself this question: Do I really need my light bulb/coffee pot/washing machine/doorbell/other household items to be smart? The real question is "When will I no longer have a choice?".
- JWT Tokens: The What, How, and Why - This helped me understand things: The main difference to notice here is that with cookies, the information is stored server-side, while with JWT, since the information is stored in the actual token, the information is stored client-side. Since the server doesn’t need to remember anything, this simplifies things a lot, especially when working with multiple servers and having different sessions. Some JWT attacks rely on poor key management....
- Attackers finding new ways to exploit and bypass Office 365 defenses - Help Net Security - Oh, all we need is Zero Trust: Zero-trust email: Adhere to a zero-trust-email approach, which should serve as a baseline for an email security strategy. All email, especially ongoing interactions with external partners and suppliers, should be considered areas of compromise.
- Oracle VM VirtualBox Buffer Overflow - A buffer overflow vulnerability in Oracle VM VirtualBox was privately reported to Oracle on September 22, 2020 and was silently patched in VM VirtualBox version 6.1.16r140961. Not-so-silent (though no exploit example was provided, I didn't look further).
- Microsoft IE Browser Death March Hastens - Most users are running Chrome, Chrome has plenty of vulnerabilities, do we need IE any longer?
- 78% of Microsoft 365 admins don't activate MFA - Help Net Security - 99% is a lot... According to SANS, 99% of data breaches can be prevented using MFA. This is a huge security risk, particularly during a time when so many employees are working remotely.
- Humans are Bad at URLs and Fonts Dont Matter
- Hackers Can Open Doors by Exploiting Vulnerabilities in Hrmann Device | SecurityWeek.Com
- URL and website scanner - urlscan.io
- Over 100 irrigation systems left exposed online without protection
- Microsoft Introduces New Password Spray Detection for Azure | SecurityWeek.Com
- Anonymous Authentication: How to Secure Public APIs
- Back to the future: What the Jericho Forum taught us about modern security - Microsoft Security
- Nagios XI 5.7.3 Remote Command Injection
- StackRox Releases Open Source Tool for Finding Kubernetes Misconfigurations | SecurityWeek.Com
- Can automated penetration testing replace humans? - Help Net Security
- KashmirBlack Botnet Hijacks Thousands of Sites Running On Popular CMS Platforms
- Oracle WebLogic Server RCE Flaw Under Active Attack
- Tracking Users on Waze - Schneier on Security
- Microsoft Introduces Device Vulnerability Report in Defender for Endpoint | SecurityWeek.Com
- Redirect Detective - Discover where those redirects really go to
- Hackers may have been of its time, but it was also ahead of it