Difference between revisions of "Template:PSW672NewsPaulAsadoorian"

From Security Weekly Wiki
Jump to navigationJump to search
Line 1: Line 1:
 
===Articles===
 
===Articles===
#[https://www.darkreading.com/edge/theedge/cybercriminals-could-be-coming-after-your-coffee/b/d-id/1339263 Cybercriminals Could be Coming After Your Coffee]
+
#[https://www.darkreading.com/edge/theedge/cybercriminals-could-be-coming-after-your-coffee/b/d-id/1339263 Cybercriminals Could be Coming After Your Coffee] - From the article: ''When it comes to whether you should get an IoT device or not, the general rule is to first ask yourself this question: Do I really need my light bulb/coffee pot/washing machine/doorbell/other household items to be smart?'' The real question is "When will I no longer have a choice?".
 
#[https://medium.com/better-programming/jwt-tokens-the-what-how-and-why-6ae3bad26661 JWT Tokens: The What, How, and Why]
 
#[https://medium.com/better-programming/jwt-tokens-the-what-how-and-why-6ae3bad26661 JWT Tokens: The What, How, and Why]
 
#[https://10.51.0.153/2020/10/26/exploit-and-bypass-office-365-defenses/ Attackers finding new ways to exploit and bypass Office 365 defenses - Help Net Security]
 
#[https://10.51.0.153/2020/10/26/exploit-and-bypass-office-365-defenses/ Attackers finding new ways to exploit and bypass Office 365 defenses - Help Net Security]

Revision as of 18:28, 29 October 2020

Articles

  1. Cybercriminals Could be Coming After Your Coffee - From the article: When it comes to whether you should get an IoT device or not, the general rule is to first ask yourself this question: Do I really need my light bulb/coffee pot/washing machine/doorbell/other household items to be smart? The real question is "When will I no longer have a choice?".
  2. JWT Tokens: The What, How, and Why
  3. Attackers finding new ways to exploit and bypass Office 365 defenses - Help Net Security
  4. Oracle VM VirtualBox Buffer Overflow
  5. Microsoft IE Browser Death March Hastens
  6. 78% of Microsoft 365 admins don't activate MFA - Help Net Security
  7. Humans are Bad at URLs and Fonts Dont Matter
  8. Hackers Can Open Doors by Exploiting Vulnerabilities in Hrmann Device | SecurityWeek.Com
  9. URL and website scanner - urlscan.io
  10. Over 100 irrigation systems left exposed online without protection
  11. Microsoft Introduces New Password Spray Detection for Azure | SecurityWeek.Com
  12. Anonymous Authentication: How to Secure Public APIs
  13. Back to the future: What the Jericho Forum taught us about modern security - Microsoft Security
  14. Nagios XI 5.7.3 Remote Command Injection
  15. StackRox Releases Open Source Tool for Finding Kubernetes Misconfigurations | SecurityWeek.Com
  16. Can automated penetration testing replace humans? - Help Net Security
  17. KashmirBlack Botnet Hijacks Thousands of Sites Running On Popular CMS Platforms
  18. Oracle WebLogic Server RCE Flaw Under Active Attack
  19. Tracking Users on Waze - Schneier on Security
  20. Microsoft Introduces Device Vulnerability Report in Defender for Endpoint | SecurityWeek.Com
  21. Redirect Detective - Discover where those redirects really go to
  22. Hackers may have been of its time, but it was also ahead of it