Template:PSW674NewsPaulAsadoorian
From Security Weekly Wiki
Revision as of 20:55, 12 November 2020 by Paul Asadoorian (talk | contribs) (Added With Paul's Craptastic Python Script)
Contents
Articles
- Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events - CyberScoop
- Rapid7 Metasploit Framework msfvenom APK Template Command Injection
- The Sad State of Two-Factor Authentication in U.S. Banking
- Container Security Threats
- The Security Failures of Online Exam Proctoring - Schneier on Security
- DNS cache poisoning, the Internet attack from 2008, is back from the dead
- Google patches two more Chrome zero-days | ZDNet
- The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means. | SecurityWeek.Com
- Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks
- Yantra Manav A wormable SSH bot
- SaltStack Salt REST API Arbitrary Command Execution
- Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security
- The alleged decompiled source code of Cobalt Strike toolkit leaked online
- How to get root on Ubuntu 20.04 by pretending nobodys /home - GitHub Security Lab
- Decrypting OpenSSH sessions for fun and profit
- This new malware wants to add your Linux servers and IoT devices to its botnet | ZDNet
- Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It
- Computer Scientists Achieve Crown Jewel of Cryptography
- AWS launches Amazon Timestream, a serverless time series database for IoT and operational applications - Help Net Security
- Amazon Alexa One-Click Attack Can Divulge Personal Data
- RedCurl cybercrime group has hacked companies for three years | ZDNet
- Chinese hackers have pillaged Taiwans semiconductor industry
- If your email is hacked, everything is
- TeamViewer flaw can allow hackers to steal System password
- Researcher Publishes Patch Bypass for vBulletin 0-Day
- Adobe tackles critical code execution vulnerabilities in Acrobat, Reader | ZDNet
- Windows and IE Zero-Day Vulnerabilities Chained in 'PowerFall' Attacks | SecurityWeek.Com
- SANS Security Training Firm Hit with Data Breach
- Threat actors managed to control 23% of Tor Exit nodes
- Most security pros are concerned about human error exposing cloud data - Help Net Security
- Stick With The Plan Until It Not Longer Makes Sense | SecurityWeek.Com
- Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity
- Hackers can eavesdrop on mobile calls with $7,000 worth of equipment
- SANS cybersecurity training firm suffers data breach due to phishing attack
- Solving Uninitialized Kernel Pool Memory on Windows - Microsoft Security Response Center
- Solving Uninitialized Stack Memory on Windows - Microsoft Security Response Center
- Vulnerability Management Maturity Model | SANS Institute
- Cisco Small Business Smart and Managed Switches Session Management Vulnerability
- Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment
- Cisco Talos discloses technicals details of Chrome, Firefox flaws
- Google open-sources Tsunami vulnerability scanner | ZDNet
- Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw
- Half a Million IoT Passwords Leaked - Schneier on Security
- Cops Seize Server that Hosted BlueLeaks, DDoSecrets Says
- Notorious Hacker Fxmsp Outed After Widespread Access-Dealing
- Trump administration looking into ban on TikTok, other Chinese apps
- Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS | SecurityWeek.Com
- InfoSec Handlers Diary Blog
- Pen Testing ROI: How to Communicate the Value of Security Testing
- 6 Tips for Getting the Most From Nessus
- Zoom zero-day flaw allows code execution on victim's Windows machine - Help Net Security
- How to build a cyber threat intelligence program while cutting through the noise