Difference between revisions of "Template:PSWPaul638"

From Security Weekly Wiki
Jump to navigationJump to search
(Added With Paul's Craptastic Python Script)
 
 
Line 1: Line 1:
 
#[https://www.microsoft.com/security/blog/2020/02/04/ghost-in-the-shell-investigating-web-shell-attacks/ Ghost in the shell: Investigating web shell attacks - Microsoft Security]
 
#[https://www.microsoft.com/security/blog/2020/02/04/ghost-in-the-shell-investigating-web-shell-attacks/ Ghost in the shell: Investigating web shell attacks - Microsoft Security]
#[https://www.bloomberg.com/features/2020-dark-web-ransomware/ I Sabotaged My Boss With Ransomware From the Dark Web]
+
#[https://www.bloomberg.com/features/2020-dark-web-ransomware/ I Sabotaged My Boss With Ransomware From the Dark Web] - I hope this person knew what they were doing. First concern is permission. Second concern is, even with permission, what if something bad happens? Also, how did you verify and validate the malicious code you got on the dark web? Much of the software has backdoors...
 
#[https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html Expert released PoC exploit code for unpatched backdoor in HiSilicon chips]
 
#[https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html Expert released PoC exploit code for unpatched backdoor in HiSilicon chips]
 
#[https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/ Tesla, Mobileye Autopilots Duped By Phantom Images]
 
#[https://threatpost.com/tesla-autopilot-duped-by-phantom-images/152491/ Tesla, Mobileye Autopilots Duped By Phantom Images]

Latest revision as of 21:45, 6 February 2020