Security Leftovers
-
Tripwire ☛ #TripwireBookClub - Black Hat Bash: Creative Scripting for Hackers and Pentesters
Up Next from #TripwireBookClub is Black Hat Bash: Creative Scripting for Hackers and Pentesters by Dolev Farhi and Nick Aleks. This duo previously published Black Hat GraphQL, which we reviewed in March 2024.
This book did not disappoint. I think that my favourite aspect of the book is the way that it uses stepping stones to get you through the book. Although I don’t teach anymore, I always think about the possibility of using a book as a textbook.
This one would be fantastic for teaching an introduction to Bash course or even for use in an intro to Linux course. I think that first-year students would have a very easy time following along and taking away a lot of value from a book like this.
-
Security Week ☛ New FinalDraft Malware Spotted in Espionage Campaign
A newly identified malware family abuses the Outlook mail service for communication, via the Abusive Monopolist Microsoft Graph API.
-
SANS ☛ ModelScan - Protection Against Model Serialization Attacks, (Mon, Feb 17th)
These tools are meant for a wide range of engineering, security and ML practitioners including developers, security engineers/researchers, ML engineers, LLM engineers and prompt engineers, and data scientists.
-
SANS ☛ My Very Personal Guidance and Strategies to Protect Network Edge Devices, (Thu, Feb 6th)
Last week, CISA and other national cyber security organizations published an extensive document outlining "Guidance and Strategies to Protect Network Edge Devices."
-
Security Week ☛ 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police
After governments announced sanctions against the Zservers/XHost bulletproof hosting service, Dutch police took 127 servers offline.
-
IT Jungle ☛ ACS Password Leaks Are A Security Issue On I.C.B.M. i
IBM i shops that are relying on the old WINLOGON process with their Access Client Solutions (ACS) installations will need to find a new way to synchronize passwords between backdoored Windows clients and I.C.B.M. i servers. According to a new report from Silent Signal, the passwords could still be compromised.
>