04/02

Welcome to the Jungle: Pentesting AWS

https://www.slideshare.net/MichaelFelch/welcome-to-the-jungle-pentesting-aws
Welcome to the Jungle: Pentesting AWS

Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts | CNN Business

https://www.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html
Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts | CNN Business

Fake ransomware gang targets U.S. orgs with empty data leak threats

https://www.bleepingcomputer.com/news/security/fake-ransomware-gang-targets-us-orgs-with-empty-data-leak-threats/
Fake ransomware gang targets U.S. orgs with empty data leak threats

Hackers Use Password-Protected OneNote Files to Spread Malware | Perception Point

https://perception-point.io/blog/hackers-use-password-protected-onenote-files-to-spread-malware/
Hackers Use Password-Protected OneNote Files to Spread Malware | Perception Point

SANS 2023 | Cyber Security Training

https://www.sans.org/u/1o2c
SANS 2023 | Cyber Security Training

Flangvik - Twitch

https://www.twitch.tv/flangvik
Flangvik - Twitch

Fake ransomware gang targets U.S. orgs with empty data leak threats

https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/fake-ransomware-gang-targets-us-orgs-with-empty-data-leak-threats/amp/
Fake ransomware gang targets U.S. orgs with empty data leak threats

Report: Chinese state-sponsored hacking group highly active | AP News

https://apnews.com/article/china-hacking-report-redgolf-insikt-88a76977ce50d6d28d7a1be5130a1aa7
Report: Chinese state-sponsored hacking group highly active | AP News

Analysis of Twitter algorithm code reveals social medium down-ranks tweets about Ukraine

https://news.yahoo.com/analysis-twitter-algorithm-code-reveals-072800540.html
Analysis of Twitter algorithm code reveals social medium down-ranks tweets about Ukraine

3CX users under DLL-sideloading attack: What you need to know – Sophos News

https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/
3CX users under DLL-sideloading attack: What you need to know – Sophos News

DJI Mavic 3 Drone Firmware Analysis

https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis/
DJI Mavic 3 Drone Firmware Analysis

pr0xylife (pr0xylife) · GitHub

https://github.com/pr0xylife
pr0xylife (pr0xylife) · GitHub

Cybersecurity in Medical Devices: Refuse to Accept Policy for Cyber Devices and Related Systems Under Section 524B of the FD&C Act | FDA

https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-refuse-accept-policy-cyber-devices-and-related-systems-under-section
Cybersecurity in Medical Devices: Refuse to Accept Policy for Cyber Devices and Related Systems Under Section 524B of the FD&C Act | FDA

MalwareBazaar | @pr0xylife

https://bazaar.abuse.ch/user/1413258196500815881/
MalwareBazaar | @pr0xylife

1746245 - (webgpu-in-nightly) Enable WebGPU in Nightly by default

https://bugzilla.mozilla.org/show_bug.cgi?id=1746245
1746245 - (webgpu-in-nightly) Enable WebGPU in Nightly by default

New Money Message ransomware demands million dollar ransoms

https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
New Money Message ransomware demands million dollar ransoms