CybersecNews Weekly logo

CybersecNews Weekly

Subscribe
Archives
March 13, 2022

CyberSecNews Weekly - 0x20-W1222

News

  • The Dirty Pipe Vulnerability
    A new Linux kernel vulnerability that can drive to root priviledge escalation

  • Put an io_uring on it: Exploiting the Linux Kernel
    Another vulnerability discovered in the Linux kernel, using the new system call io_uring

  • SATCOM terminals under attack in Europe: a plausible analysis.
    At the same time Russia initiated a full-scale attack on Ukraine, tens of thousands of KA-SAT SATCOM terminals suddenly stopped working in several European countries

Tools

  • Scoreboard
    A CTF focused on AWS S3.

  • prowler
    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness.

  • apk-mitm
    A CLI application that automatically prepares Android APK files for HTTPS inspection

Articles

  • Attackers can force Amazon Echos to hack themselves with self-issued commands
    Popular “smart” device follows commands issued by its own speaker. What could go wrong?

  • Not All MFA is Equal, and the Differences Matter a Lot
    An analysis of the several MFA techniques

  • DevSecOps-Playbook

  • Branch History Injection
    BHI (or Spectre-BHB) is a revival of cross-privilege Spectre-v2 attacks on modern systems deploying in-hardware defenses.

  • NIST Special Publication (SP) 800-204C, Implementation of DevSecOps for a Microservices-based Application with Service Mesh

  • 2021 Year In Review
    A detailed look at some of the top tactics, techniques and procedures (TTP's) that was observed in 2021.

  • Tcp middlebox reflection
    A new DDoS vector discovered by Akamai, exploiting network middleboxes.

Tutorial

  • AWS Security Reference Architecture

  • Getting Started with iOS Penetration Testing

  • OWASP/Go-SCP: Go programming language secure coding practices guide
    Go programming language secure coding practices guide. This is quite useful to understand security best pratice programming in other languages.

IR & Reversing

  • An update on the threat landscape
    A report from Google about the threat landscape linked to Russia-Ukraine war.
Don't miss what's next. Subscribe to CybersecNews Weekly:
This email brought to you by Buttondown, the easiest way to start and grow your newsletter.