CyberSecNews Weekly - 0x13-W0422
News
Tools
-
threat-matrix-cicd
Threat matrix for CI/CD Pipeline. -
crowdsec
CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior and provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network. -
TREVORproxy & TREVORspray 2.0
Increasing the Speed and Effectiveness of Password Sprays -
PinataHub: Explore the world of leaked secrets in GitHub.
A walk-through of PinataHub, the largest archive of leaked credentials and secrets in public GitHub repositories.
Articles
-
Infosec Skill Sets
Soft skills are hard, and everybody's career path different. Some skill sets tend to intersect, however. Here's my simplified breakdown of skills need for a career in Infosec, using, what else, Venn diagrams. -
Private Network Access: introducing preflights
Chrome is deprecating access to private network endpoints from non-secure public websites as part of the Private Network Access specification.
Tutorial
-
Top 10 security best practices for securing backups in AWS | Amazon Web Services
Security is a shared responsibility between AWS and the customer. This post will guide you through a curated list of the top ten security best practices to secure your backup data and operations in AWS. -
Modern Techniques to Prevent Malware instead of Detecting It
-
opsdisk/the_cyber_plumbers_handbook: Free copy of The Cyber Plumber's Handbook
Get a free copy of The Cyber Plumber's Handbook. This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. -
Understanding Insecure Direct Object References (IDOR)
Despite being one of the simplest vulnerabilities to detect, IDOR is one of the most common vulnerabilities found in applications. Here's how to prevent it.
IR & Reversing
-
Windows Drivers Reverse Engineering Methodology
Methodology for reverse engineering Windows drivers, finding vulnerabilities and understanding their exploitability.