Proprietary Software and Security Leftovers
-
Pen Testing AWS
Thirteen pages later, I realized I didn’t write a blog post but a white paper. I was going to post it over at PrimeHarbor, along with a post on how to get an AWS PenTest, but then Nick Jones penned an excellent blog post On AWS Penetration Testing.
-
Cyber gang blackmails Cypriot university to pay $100K [iophk: Windows TCO]
According to experts, the Medusa ransomware terminates crucial services and processes for Windows operating programs and penetrates file backup systems while targeting mail servers, database servers, and security software.
-
Update available for Chromium 112 to address zero-day exploit
Chromium, regular and un-googled. Two days ago on friday, Google released an out-of-cycle stable update. This 112.0.5615.121 update addresses and fixes a zero-day exploit (CVE-2023-2033) which is already actively abused.
-
Walkthrough: Bitwarden’s New Secrets Manager
It was only a matter of time before a popular password manager, such as Bitwarden, would create a secrets manager...
-
Some thoughts on OpenSSH versus SSH
When I started to write yesterday's entry on how OpenSSH certificates aren't X.509 certificates, I initially titled it as being about 'SSH certificates'. This wouldn't be unusual; Matthew Garrett's article We need better support for SSH host certificates also uses 'SSH' here. I changed my entry's title out of a sense of pickyness, because although OpenSSH is the dominant SSH implementation, it's not the only one. Or maybe it is, depending on your perspective, or at least the only SSH that matters and so we might as well talk about 'SSH certificates'.