CybersecNews Weekly logo

CybersecNews Weekly

Subscribe
Archives
January 23, 2022

CyberSecNews Weekly - 0x13-W0422

News

  • Linux kernel heap buffer overflow in fs_context.c since version 5.1

Tools

  • threat-matrix-cicd
    Threat matrix for CI/CD Pipeline.

  • crowdsec
    CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior and provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.

  • TREVORproxy & TREVORspray 2.0
    Increasing the Speed and Effectiveness of Password Sprays

  • PinataHub: Explore the world of leaked secrets in GitHub.
    A walk-through of PinataHub, the largest archive of leaked credentials and secrets in public GitHub repositories.

Articles

  • Infosec Skill Sets
    Soft skills are hard, and everybody's career path different. Some skill sets tend to intersect, however. Here's my simplified breakdown of skills need for a career in Infosec, using, what else, Venn diagrams.

  • Private Network Access: introducing preflights
    Chrome is deprecating access to private network endpoints from non-secure public websites as part of the Private Network Access specification.

Tutorial

  • Top 10 security best practices for securing backups in AWS | Amazon Web Services
    Security is a shared responsibility between AWS and the customer. This post will guide you through a curated list of the top ten security best practices to secure your backup data and operations in AWS.

  • Modern Techniques to Prevent Malware instead of Detecting It

  • Reverse Engineering 101

  • opsdisk/the_cyber_plumbers_handbook: Free copy of The Cyber Plumber's Handbook
    Get a free copy of The Cyber Plumber's Handbook. This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios.

  • Understanding Insecure Direct Object References (IDOR)
    Despite being one of the simplest vulnerabilities to detect, IDOR is one of the most common vulnerabilities found in applications. Here's how to prevent it.

IR & Reversing

  • Log4Shell Attacks Getting "Smarter"

  • Windows Drivers Reverse Engineering Methodology
    Methodology for reverse engineering Windows drivers, finding vulnerabilities and understanding their exploitability.

  • Zooming in on Zero-click Exploits

Don't miss what's next. Subscribe to CybersecNews Weekly:
Powered by Buttondown, the easiest way to start and grow your newsletter.