Difference between revisions of "Template:PSWPaul638"

From Paul's Security Weekly
Jump to: navigation, search
(Added With Paul's Craptastic Python Script)
 
 
Line 1: Line 1:
 
#[https://www.microsoft.com/security/blog/2020/02/04/ghost-in-the-shell-investigating-web-shell-attacks/ Ghost in the shell: Investigating web shell attacks - Microsoft Security]
 
#[https://www.microsoft.com/security/blog/2020/02/04/ghost-in-the-shell-investigating-web-shell-attacks/ Ghost in the shell: Investigating web shell attacks - Microsoft Security]
#[https://www.bloomberg.com/features/2020-dark-web-ransomware/ I Sabotaged My Boss With Ransomware From the Dark Web]
+
#[https://www.bloomberg.com/features/2020-dark-web-ransomware/ I Sabotaged My Boss With Ransomware From the Dark Web] - I hope this person knew what they were doing. First concern is permission. Second concern is, even with permission, what if something bad happens? Also, how did you verify and validate the malicious code you got on the dark web? Much of the software has backdoors...
 
#[https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html Expert released PoC exploit code for unpatched backdoor in HiSilicon chips]
 
#[https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html Expert released PoC exploit code for unpatched backdoor in HiSilicon chips]
 
#[https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/ Tesla, Mobileye Autopilots Duped By Phantom Images]
 
#[https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/ Tesla, Mobileye Autopilots Duped By Phantom Images]

Latest revision as of 21:45, 6 February 2020

  1. Ghost in the shell: Investigating web shell attacks - Microsoft Security
  2. I Sabotaged My Boss With Ransomware From the Dark Web - I hope this person knew what they were doing. First concern is permission. Second concern is, even with permission, what if something bad happens? Also, how did you verify and validate the malicious code you got on the dark web? Much of the software has backdoors...
  3. Expert released PoC exploit code for unpatched backdoor in HiSilicon chips
  4. Tesla, Mobileye Autopilots Duped By Phantom Images
  5. Google Shared Private Videos With Wrong Users | SecurityWeek.Com
  6. Department of Energy Adds Attivo Decoys for Critical Infrastructure Security
  7. LCD pwn System: How to modulate screen brightness to covertly transmit data from an air-gapped computer... slowly
  8. Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs
  9. cdpwn Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP)
  10. How your network could be hacked through a Philips Hue smart bulb
  11. DLL Hijacking Vulnerability Found in Realtek HD Audio Driver | SecurityWeek.Com
  12. Buggy Iowa Caucus App Is Buggy, Security Experts Say
  13. Russian disinformation 'ongoing problem' says FBI chief
  14. Iranian Hackers Target Journalists in New Phishing Campaign | SecurityWeek.Com