Difference between revisions of "Template:PSW673NewsPaulAsadoorian"

From Security Weekly Wiki
Jump to navigationJump to search
(Created page with "===Articles===")
 
(Added With Paul's Craptastic Python Script)
Line 1: Line 1:
 +
===Articles===
 +
#[https://threatpost.com/wordpress-flawed-security-updates/160849/ WordPress Pushes Out Multiple Flawed Security Updates]
 +
#[https://www.helpnetsecurity.com/2020/11/03/ryuk-ransomware-2020/ Ryuk ransomware behind one third of all ransomware attacks in 2020 - Help Net Security]
 +
#[https://www.darkreading.com/attacks-breaches/6-cybersecurity-lessons-from-2020/d/d-id/1339333 6 Cybersecurity Lessons From 2020]
 +
#[https://www.cyberscoop.com/php-vulnerabilities-ms-isac/ State threat-sharing center warns of multiple PHP vulnerabilities - CyberScoop]
 +
#[https://pupuweb.medium.com/changing-cybersecurity-culture-65ccbae42ebd Changing Cybersecurity Culture]
 +
#[https://www.securityweek.com/games-microsoft-store-can-be-abused-privilege-escalation-windows Games in Microsoft Store Can Be Abused for Privilege Escalation on Windows | SecurityWeek.Com]
 +
#[https://latesthackingnews.com/2020/11/05/what-keyboard-trackers-are-for/ What Keyboard Trackers Are For - Latest Hacking News]
 +
#[https://thehackernews.com/2020/11/deception-technology-no-longer-only.html Deception Technology: No Longer Only A Fortune 2000 Solution]
 +
#[https://www.helpnetsecurity.com/2020/11/05/cve-2020-27955/ Git LFS vulnerability allows attackers to compromise targets' Windows systems (CVE-2020-27955) - Help Net Security]
 +
#[https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/ Cisco Zero-Day in AnyConnect Secure Mobility Client Remains Unpatched]
 +
#[https://www.schneier.com/blog/archives/2020/11/california-proposition-24-passes.html California Proposition 24 Passes - Schneier on Security]
 +
#[https://www.zdnet.com/article/github-denies-getting-hacked/ GitHub denies getting hacked | ZDNet]
 +
#[https://www.zdnet.com/article/hackers-are-exploiting-unpatched-voip-flaws-to-compromise-business-accounts/ Hackers are exploiting unpatched VoIP flaws to compromise business accounts | ZDNet]
 +
#[https://privateai.medium.com/customers-are-demanding-privacy-523471998277 Customers Are Demanding Privacy]
 +
#[https://www.theregister.com/2020/11/05/deloitte_hacker_test/ Deloitte's 'Test your Hacker IQ' site fails itself after exposing database user name, password in config file]
 +
#[https://www.cinemablend.com/news/2558239/pornhub-has-been-blocked-in-thailand-and-people-arent-happy Pornhub Has Been Blocked In Thailand, And People Arent Happy]
 +
#[https://www.wired.com/story/one-clear-message-voters-election-more-privacy/ One Clear Message From Voters This Election? More Privacy]
 +
#[https://www.zdnet.com/article/russian-authorities-make-rare-arrest-of-malware-author/ Russian authorities make rare arrest of malware author | ZDNet]
 +
#[https://social.techcrunch.com/2020/11/04/massachusetts-voters-pass-a-right-to-repair-measure-giving-them-unprecedented-access-to-their-car-data/ Massachusetts voters pass a right-to-repair measure, giving them unprecedented access to their car data  TechCrunch]
 +
#[https://thebulwark.com/back-to-basics-make-cocktails-normal-again/ Back to Basics: Make Cocktails Normal Again - The Bulwark]
 +
#[https://www.zdnet.com/article/google-to-github-times-up-this-unfixed-high-severity-security-bug-affects-developers/ Google to GitHub: Time's up  this unfixed 'high-severity' security bug affects developers | ZDNet]
 +
#[https://thehackernews.com/2020/11/new-chrome-zero-day-under-active.html New Chrome Zero-Day Under Active Attacks  Update Your Browser]
 +
#[https://www.inc.com/jeff-haden/mark-cuban-worlds-first-trillionaire-is-learning-1-skill-discovering-how-to-use-it-in-now-unimaginable-ways.html Mark Cuban: The World's First Trillionaire Is Learning This Skill and Discovering How to Use It in Now Unimaginable Ways]
 +
#[https://www.techradar.com/news/windows-10-zero-day-could-allow-hackers-to-seize-control-of-your-computer Windows 10 zero-day could allow hackers to seize control of your computer]
 +
#[https://www.wired.com/story/nameless-hiker-mostly-harmless-internet-mystery/ A Nameless Hiker and the Case the Internet Cant Crack]
 +
#[https://www.zdnet.com/article/hacker-group-uses-solaris-zero-day-to-breach-corporate-networks/ Hacker group uses Solaris zero-day to breach corporate networks | ZDNet]
 +
#[https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/ Google patches second Chrome zero-day in two weeks | ZDNet]
 +
#[https://www.helpnetsecurity.com/2020/10/01/amazon-timestream/ AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security]
 +
#[https://threatpost.com/amazon-alexa-one-click-attack-can-divulge-personal-data/158297/ Amazon Alexa One-Click Attack Can Divulge Personal Data]
 +
#[https://www.zdnet.com/article/redcurl-cybercrime-group-has-hacked-companies-for-three-years/ RedCurl cybercrime group has hacked companies for three years | ZDNet]
 +
#[https://arstechnica.com/information-technology/2020/08/chinese-hackers-have-pillaged-taiwans-semiconductor-industry/ Chinese hackers have pillaged Taiwans semiconductor industry]
 +
#[https://medium.com/@veeralpatel/if-your-email-is-hacked-everything-is-47544aeee699 If your email is hacked, everything is]
 +
#[https://securityaffairs.co/wordpress/106978/breaking-news/teamviewer-flaw-system-password.html TeamViewer flaw can allow hackers to steal System password]
 +
#[https://threatpost.com/researcher-publishes-bypass-for-patch-for-vbulletin-0-day-flaw/158232/ Researcher Publishes Patch Bypass for vBulletin 0-Day]
 +
#[https://www.zdnet.com/article/adobe-tackles-critical-code-execution-vulnerabilities-in-acrobat-reader/ Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet]
 +
#[https://www.securityweek.com/windows-and-ie-zero-day-vulnerabilities-chained-powerfall-attacks Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com]
 +
#[https://www.darkreading.com/attacks-breaches/sans-security-training-firm-hit-with-data-breach/d/d-id/1338647 SANS Security Training Firm Hit with Data Breach]
 +
#[https://securityaffairs.co/wordpress/107076/hacking/attackers-control-23-tor-exit-nodes.html Threat actors managed to control 23% of Tor Exit nodes]
 +
#[https://www.helpnetsecurity.com/2020/08/13/most-security-pros-are-concerned-about-human-error-exposing-cloud-data/ Most security pros are concerned about human error exposing cloud data - Help Net Security]
 +
#[https://www.securityweek.com/stick-plan-until-it-not-longer-makes-sense Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com]
 +
#[https://www.darkreading.com/omdia/black-hat-usa-2020-shines-spotlight-on-the-mental-challenges-of-cybersecurity/a/d-id/1338658 Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity]
 +
#[https://arstechnica.com/information-technology/2020/08/your-mobile-calls-may-be-vulnerable-to-a-new-revolting-eavesdrop-attack/ Hackers can eavesdrop on mobile calls with $7,000 worth of equipment]
 +
#[https://www.techrepublic.com/article/sans-cybersecurity-training-firm-suffers-data-breach-due-to-phishing-attack/ SANS cybersecurity training firm suffers data breach due to phishing attack]
 +
#[http://msrc-blog.microsoft.com/2020/07/02/solving-uninitialized-kernel-pool-memory-on-windows/ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center]
 +
#[http://msrc-blog.microsoft.com/2020/05/13/solving-uninitialized-stack-memory-on-windows/ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center]
 +
#[https://www.sans.org/blog/vulnerability-management-maturity-model/ Vulnerability Management Maturity Model | SANS Institute]
 +
#[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY Cisco Small Business Smart and Managed Switches Session Management Vulnerability]
 +
#[https://news.hitb.org/content/hackers-are-exploiting-5-alarm-bug-networking-equipment Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment]
 +
#[https://securityaffairs.co/wordpress/105547/security/talos-chrome-firefox-flaws.html Cisco Talos discloses technicals details of Chrome, Firefox flaws]
 +
#[https://www.zdnet.com/article/google-open-sources-tsunami-vulnerability-scanner/ Google open-sources Tsunami vulnerability scanner | ZDNet]
 +
#[https://securityaffairs.co/wordpress/105662/hacking/f5-big-ip-flaw-mitigation-bypass.html Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw]
 +
#[https://www.schneier.com/blog/archives/2020/07/half_a_million.html Half a Million IoT Passwords Leaked - Schneier on Security]
 +
#[https://www.vice.com/en_us/article/qj43xq/cops-seize-blueleaks-ddosecrets-server Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says]
 +
#[https://threatpost.com/notorious-hacker-fxmsp-outed/157275/ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing]
 +
#[https://news.hitb.org/content/trump-administration-looking-ban-tiktok-other-chinese-apps Trump administration looking into ban on TikTok, other Chinese apps]
 +
#[https://www.securityweek.com/palo-alto-networks-patches-command-injection-vulnerabilities-pan-os Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com]
 +
#[https://isc.sans.edu/diary.html?storyid=26330 InfoSec Handlers Diary Blog]
 +
#[https://www.darkreading.com/vulnerabilities---threats/pen-testing-roi-how-to-communicate-the-value-of-security-testing/a/d-id/1338257 Pen Testing ROI: How to Communicate the Value of Security Testing]
 +
#[https://www.darkreading.com/vulnerabilities---threats/6-tips-for-getting-the-most-from-nessus/d/d-id/1338310 6 Tips for Getting the Most From Nessus]
 +
#[https://www.helpnetsecurity.com/2020/07/09/zoom-zero-day-windows/ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security]
 +
#[https://www.theregister.com/2020/07/09/separating_good_data_from_clutter/ How to build a cyber threat intelligence program while cutting through the noise]
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 +
===Articles===
 
===Articles===
 
===Articles===

Revision as of 21:04, 5 November 2020

Articles

  1. WordPress Pushes Out Multiple Flawed Security Updates
  2. Ryuk ransomware behind one third of all ransomware attacks in 2020 - Help Net Security
  3. 6 Cybersecurity Lessons From 2020
  4. State threat-sharing center warns of multiple PHP vulnerabilities - CyberScoop
  5. Changing Cybersecurity Culture
  6. Games in Microsoft Store Can Be Abused for Privilege Escalation on Windows | SecurityWeek.Com
  7. What Keyboard Trackers Are For - Latest Hacking News
  8. Deception Technology: No Longer Only A Fortune 2000 Solution
  9. Git LFS vulnerability allows attackers to compromise targets' Windows systems (CVE-2020-27955) - Help Net Security
  10. Cisco Zero-Day in AnyConnect Secure Mobility Client Remains Unpatched
  11. California Proposition 24 Passes - Schneier on Security
  12. GitHub denies getting hacked | ZDNet
  13. Hackers are exploiting unpatched VoIP flaws to compromise business accounts | ZDNet
  14. Customers Are Demanding Privacy
  15. Deloitte's 'Test your Hacker IQ' site fails itself after exposing database user name, password in config file
  16. Pornhub Has Been Blocked In Thailand, And People Arent Happy
  17. One Clear Message From Voters This Election? More Privacy
  18. Russian authorities make rare arrest of malware author | ZDNet
  19. Massachusetts voters pass a right-to-repair measure, giving them unprecedented access to their car data TechCrunch
  20. Back to Basics: Make Cocktails Normal Again - The Bulwark
  21. Google to GitHub: Time's up this unfixed 'high-severity' security bug affects developers | ZDNet
  22. New Chrome Zero-Day Under Active Attacks Update Your Browser
  23. Mark Cuban: The World's First Trillionaire Is Learning This Skill and Discovering How to Use It in Now Unimaginable Ways
  24. Windows 10 zero-day could allow hackers to seize control of your computer
  25. A Nameless Hiker and the Case the Internet Cant Crack
  26. Hacker group uses Solaris zero-day to breach corporate networks | ZDNet
  27. Google patches second Chrome zero-day in two weeks | ZDNet
  28. AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security
  29. Amazon Alexa One-Click Attack Can Divulge Personal Data
  30. RedCurl cybercrime group has hacked companies for three years | ZDNet
  31. Chinese hackers have pillaged Taiwans semiconductor industry
  32. If your email is hacked, everything is
  33. TeamViewer flaw can allow hackers to steal System password
  34. Researcher Publishes Patch Bypass for vBulletin 0-Day
  35. Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet
  36. Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com
  37. SANS Security Training Firm Hit with Data Breach
  38. Threat actors managed to control 23% of Tor Exit nodes
  39. Most security pros are concerned about human error exposing cloud data - Help Net Security
  40. Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com
  41. Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity
  42. Hackers can eavesdrop on mobile calls with $7,000 worth of equipment
  43. SANS cybersecurity training firm suffers data breach due to phishing attack
  44. Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center
  45. Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center
  46. Vulnerability Management Maturity Model | SANS Institute
  47. Cisco Small Business Smart and Managed Switches Session Management Vulnerability
  48. Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment
  49. Cisco Talos discloses technicals details of Chrome, Firefox flaws
  50. Google open-sources Tsunami vulnerability scanner | ZDNet
  51. Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw
  52. Half a Million IoT Passwords Leaked - Schneier on Security
  53. Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says
  54. Notorious Hacker Fxmsp Outed After Widespread Access-Dealing
  55. Trump administration looking into ban on TikTok, other Chinese apps
  56. Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com
  57. InfoSec Handlers Diary Blog
  58. Pen Testing ROI: How to Communicate the Value of Security Testing
  59. 6 Tips for Getting the Most From Nessus
  60. Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security
  61. How to build a cyber threat intelligence program while cutting through the noise

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles