Resources 

  • Probable-Wordlists – github.com
    Wordlists sorted by probability originally created for password generation and testing
  • VM escape – QEMU Case Study – www.phrack.org
    Virtual machines are nowadays heavily deployed for personal use or within the enterprise segment. Network security vendors use for instance different VMs to analyze malwares in a controlled and confined environment.

Vulnerabilities

  • Russian-controlled telecom hijacks financial services’ Internet traffic – arstechnica.com
    On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the most sensitive Internet communications.

Other News

  • Create Good Security CFP Responses – hexsec.blogspot.com
    I decided to write this post up to share some of my observations / mistakes from submitting my own CFP responses as well as observations from reviewing them for the Black Hat conferences. Hopefully it is helpful to you. The overall goal is to raise the quality level of submissions and help you get your talks accepted. This is important for people who speak regularly as well, we all have a tendency to get complacent.