Difference between revisions of "Template:PSW673NewsPaulAsadoorian"

From Security Weekly Wiki
Jump to navigationJump to search
(Added With Paul's Craptastic Python Script)
Line 27: Line 27:
 
#[https://www.zdnet.com/article/hacker-group-uses-solaris-zero-day-to-breach-corporate-networks/ Hacker group uses Solaris zero-day to breach corporate networks | ZDNet]
 
#[https://www.zdnet.com/article/hacker-group-uses-solaris-zero-day-to-breach-corporate-networks/ Hacker group uses Solaris zero-day to breach corporate networks | ZDNet]
 
#[https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/ Google patches second Chrome zero-day in two weeks | ZDNet]
 
#[https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/ Google patches second Chrome zero-day in two weeks | ZDNet]
#[https://www.helpnetsecurity.com/2020/10/01/amazon-timestream/ AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security]
+
 
#[https://threatpost.com/amazon-alexa-one-click-attack-can-divulge-personal-data/158297/ Amazon Alexa One-Click Attack Can Divulge Personal Data]
 
#[https://www.zdnet.com/article/redcurl-cybercrime-group-has-hacked-companies-for-three-years/ RedCurl cybercrime group has hacked companies for three years | ZDNet]
 
#[https://arstechnica.com/information-technology/2020/08/chinese-hackers-have-pillaged-taiwans-semiconductor-industry/ Chinese hackers have pillaged Taiwans semiconductor industry]
 
#[https://medium.com/@veeralpatel/if-your-email-is-hacked-everything-is-47544aeee699 If your email is hacked, everything is]
 
#[https://securityaffairs.co/wordpress/106978/breaking-news/teamviewer-flaw-system-password.html TeamViewer flaw can allow hackers to steal System password]
 
#[https://threatpost.com/researcher-publishes-bypass-for-patch-for-vbulletin-0-day-flaw/158232/ Researcher Publishes Patch Bypass for vBulletin 0-Day]
 
#[https://www.zdnet.com/article/adobe-tackles-critical-code-execution-vulnerabilities-in-acrobat-reader/ Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet]
 
#[https://www.securityweek.com/windows-and-ie-zero-day-vulnerabilities-chained-powerfall-attacks Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com]
 
#[https://www.darkreading.com/attacks-breaches/sans-security-training-firm-hit-with-data-breach/d/d-id/1338647 SANS Security Training Firm Hit with Data Breach]
 
#[https://securityaffairs.co/wordpress/107076/hacking/attackers-control-23-tor-exit-nodes.html Threat actors managed to control 23% of Tor Exit nodes]
 
#[https://www.helpnetsecurity.com/2020/08/13/most-security-pros-are-concerned-about-human-error-exposing-cloud-data/ Most security pros are concerned about human error exposing cloud data - Help Net Security]
 
#[https://www.securityweek.com/stick-plan-until-it-not-longer-makes-sense Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com]
 
#[https://www.darkreading.com/omdia/black-hat-usa-2020-shines-spotlight-on-the-mental-challenges-of-cybersecurity/a/d-id/1338658 Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity]
 
#[https://arstechnica.com/information-technology/2020/08/your-mobile-calls-may-be-vulnerable-to-a-new-revolting-eavesdrop-attack/ Hackers can eavesdrop on mobile calls with $7,000 worth of equipment]
 
#[https://www.techrepublic.com/article/sans-cybersecurity-training-firm-suffers-data-breach-due-to-phishing-attack/ SANS cybersecurity training firm suffers data breach due to phishing attack]
 
#[http://msrc-blog.microsoft.com/2020/07/02/solving-uninitialized-kernel-pool-memory-on-windows/ Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center]
 
#[http://msrc-blog.microsoft.com/2020/05/13/solving-uninitialized-stack-memory-on-windows/ Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center]
 
#[https://www.sans.org/blog/vulnerability-management-maturity-model/ Vulnerability Management Maturity Model | SANS Institute]
 
#[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY Cisco Small Business Smart and Managed Switches Session Management Vulnerability]
 
#[https://news.hitb.org/content/hackers-are-exploiting-5-alarm-bug-networking-equipment Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment]
 
#[https://securityaffairs.co/wordpress/105547/security/talos-chrome-firefox-flaws.html Cisco Talos discloses technicals details of Chrome, Firefox flaws]
 
#[https://www.zdnet.com/article/google-open-sources-tsunami-vulnerability-scanner/ Google open-sources Tsunami vulnerability scanner | ZDNet]
 
#[https://securityaffairs.co/wordpress/105662/hacking/f5-big-ip-flaw-mitigation-bypass.html Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw]
 
#[https://www.schneier.com/blog/archives/2020/07/half_a_million.html Half a Million IoT Passwords Leaked - Schneier on Security]
 
#[https://www.vice.com/en_us/article/qj43xq/cops-seize-blueleaks-ddosecrets-server Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says]
 
#[https://threatpost.com/notorious-hacker-fxmsp-outed/157275/ Notorious Hacker Fxmsp Outed After Widespread Access-Dealing]
 
#[https://news.hitb.org/content/trump-administration-looking-ban-tiktok-other-chinese-apps Trump administration looking into ban on TikTok, other Chinese apps]
 
#[https://www.securityweek.com/palo-alto-networks-patches-command-injection-vulnerabilities-pan-os Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com]
 
#[https://isc.sans.edu/diary.html?storyid=26330 InfoSec Handlers Diary Blog]
 
#[https://www.darkreading.com/vulnerabilities---threats/pen-testing-roi-how-to-communicate-the-value-of-security-testing/a/d-id/1338257 Pen Testing ROI: How to Communicate the Value of Security Testing]
 
#[https://www.darkreading.com/vulnerabilities---threats/6-tips-for-getting-the-most-from-nessus/d/d-id/1338310 6 Tips for Getting the Most From Nessus]
 
#[https://www.helpnetsecurity.com/2020/07/09/zoom-zero-day-windows/ Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security]
 
#[https://www.theregister.com/2020/07/09/separating_good_data_from_clutter/ How to build a cyber threat intelligence program while cutting through the noise]
 
 
===Articles===
 
===Articles===
 
===Articles===
 
===Articles===

Revision as of 21:04, 5 November 2020

Articles

  1. WordPress Pushes Out Multiple Flawed Security Updates
  2. Ryuk ransomware behind one third of all ransomware attacks in 2020 - Help Net Security
  3. 6 Cybersecurity Lessons From 2020
  4. State threat-sharing center warns of multiple PHP vulnerabilities - CyberScoop
  5. Changing Cybersecurity Culture
  6. Games in Microsoft Store Can Be Abused for Privilege Escalation on Windows | SecurityWeek.Com
  7. What Keyboard Trackers Are For - Latest Hacking News
  8. Deception Technology: No Longer Only A Fortune 2000 Solution
  9. Git LFS vulnerability allows attackers to compromise targets' Windows systems (CVE-2020-27955) - Help Net Security
  10. Cisco Zero-Day in AnyConnect Secure Mobility Client Remains Unpatched
  11. California Proposition 24 Passes - Schneier on Security
  12. GitHub denies getting hacked | ZDNet
  13. Hackers are exploiting unpatched VoIP flaws to compromise business accounts | ZDNet
  14. Customers Are Demanding Privacy
  15. Deloitte's 'Test your Hacker IQ' site fails itself after exposing database user name, password in config file
  16. Pornhub Has Been Blocked In Thailand, And People Arent Happy
  17. One Clear Message From Voters This Election? More Privacy
  18. Russian authorities make rare arrest of malware author | ZDNet
  19. Massachusetts voters pass a right-to-repair measure, giving them unprecedented access to their car data TechCrunch
  20. Back to Basics: Make Cocktails Normal Again - The Bulwark
  21. Google to GitHub: Time's up this unfixed 'high-severity' security bug affects developers | ZDNet
  22. New Chrome Zero-Day Under Active Attacks Update Your Browser
  23. Mark Cuban: The World's First Trillionaire Is Learning This Skill and Discovering How to Use It in Now Unimaginable Ways
  24. Windows 10 zero-day could allow hackers to seize control of your computer
  25. A Nameless Hiker and the Case the Internet Cant Crack
  26. Hacker group uses Solaris zero-day to breach corporate networks | ZDNet
  27. Google patches second Chrome zero-day in two weeks | ZDNet

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles

Articles