Difference between revisions of "Template:PSW674NewsPaulAsadoorian"
From Security Weekly Wiki
Jump to navigationJump to searchLine 18: | Line 18: | ||
#[https://www.vice.com/en/article/xgzxmk/google-project-zero-bugs-used-to-hack-iphones-and-android-phones Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It] | #[https://www.vice.com/en/article/xgzxmk/google-project-zero-bugs-used-to-hack-iphones-and-android-phones Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It] | ||
#[https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/ Computer Scientists Achieve Crown Jewel of Cryptography] | #[https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/ Computer Scientists Achieve Crown Jewel of Cryptography] | ||
− |
Revision as of 20:56, 12 November 2020
Articles
- Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events - CyberScoop
- Rapid7 Metasploit Framework msfvenom APK Template Command Injection
- The Sad State of Two-Factor Authentication in U.S. Banking
- Container Security Threats
- The Security Failures of Online Exam Proctoring - Schneier on Security
- DNS cache poisoning, the Internet attack from 2008, is back from the dead
- Google patches two more Chrome zero-days | ZDNet
- The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means. | SecurityWeek.Com
- Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks
- Yantra Manav A wormable SSH bot
- SaltStack Salt REST API Arbitrary Command Execution
- Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security
- The alleged decompiled source code of Cobalt Strike toolkit leaked online
- How to get root on Ubuntu 20.04 by pretending nobodys /home - GitHub Security Lab
- Decrypting OpenSSH sessions for fun and profit
- This new malware wants to add your Linux servers and IoT devices to its botnet | ZDNet
- Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It
- Computer Scientists Achieve Crown Jewel of Cryptography