https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20video%20and%20slides/DEF%20CON%2031%20-%20Living%20Next%20Door%20to%20Russia%20-%20Mikko%20Hypponen.mp4
https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20video%20and%20slides/DEF%20CON%2031%20-%20Living%20Next%20Door%20to%20Russia%20-%20Mikko%20Hypponen.mp4
sagouc86idiapdb8f29w41yaupqv6fwv.pdf
https://offzone.moscow/upload/iblock/11a/sagouc86idiapdb8f29w41yaupqv6fwv.pdf
Microsoft Teams phishing attack pushes DarkGate malware
https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-attack-pushes-darkgate-malware/
Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play
https://thehackernews.com/2023/09/millions-infected-by-spyware-hidden-in.html
Notepad++ 8.5.7 released with fixes for four security vulnerabilities
https://www.bleepingcomputer.com/news/security/notepad-plus-plus-857-released-with-fixes-for-four-security-vulnerabilities/
Lolbins for connoisseurs… Part 2 | Hexacorn
https://www.hexacorn.com/blog/2023/09/09/lolbins-for-connoisseurs-part-2/
Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining Attacks
https://thehackernews.com/2023/09/cybercriminals-weaponizing-legitimate.html
psbook.pdf - Google ドライブ
https://drive.google.com/file/d/1TlDb1H5bRnZZdswmdr07m-58yxs4Es7-/edit
Information Security Engineer, Offensive Security, Red Team — Google Careers
https://www.google.com/about/careers/applications/jobs/results/83995413121508038-information-security-engineer-offensive-security-red-team
Call for Proposals — CYBERWARCON
https://www.cyberwarcon.com/call-for-proposals
Blind exploits to rule WatchGuard firewalls
https://web.archive.org/web/20230628130110/https://www.ambionics.io/blog/hacking-watchguard-firewalls
CVE-2023-36844 And Friends: RCE In Juniper Devices
https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/
Ragnar Locker gang leaks data stolen from the Israel's Mayanei Hayeshua hospital
https://securityaffairs.com/150540/hacking/mayanei-hayeshua-hospital.html
https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20video%20and%20slides/DEF%20CON%2031%20-%20Physical%20Attacks%20Against%20Smartphones%20-%20Christopher%20Wade.mp4
https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20video%20and%20slides/DEF%20CON%2031%20-%20Physical%20Attacks%20Against%20Smartphones%20-%20Christopher%20Wade.mp4
Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks - SecurityWeek
https://www.securityweek.com/cisco-asa-zero-day-exploited-in-akira-ransomware-attacks/
Women in tech: Asuka Nakajima aspired to be a hacker. Now she’s a security research engineer. | Elastic Blog
https://www.elastic.co/jp/blog/culture-asuka-nakajima-hacker-security-research-engineer
Active North Korean campaign targeting security researchers
https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/
Google rolls out Privacy Sandbox to use Chrome browsing history for ads
https://www.bleepingcomputer.com/news/google/google-rolls-out-privacy-sandbox-to-use-chrome-browsing-history-for-ads/
Technical Details of CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service - Silent Signal Techblog
https://blog.silentsignal.eu/2023/07/03/ibm-i-dde-vulnerability-cve-2023-30990/
Release v6.4.1 · dnSpyEx/dnSpy · GitHub
https://github.com/dnSpyEx/dnSpy/releases/tag/v6.4.1