Resources
- Probable-Wordlists – github.com
Wordlists sorted by probability originally created for password generation and testing
- VM escape – QEMU Case Study – www.phrack.org
Virtual machines are nowadays heavily deployed for personal use or within the enterprise segment. Network security vendors use for instance different VMs to analyze malwares in a controlled and confined environment.
Vulnerabilities
- Russian-controlled telecom hijacks financial services’ Internet traffic – arstechnica.com
On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the most sensitive Internet communications.
Other News
- Create Good Security CFP Responses – hexsec.blogspot.com
I decided to write this post up to share some of my observations / mistakes from submitting my own CFP responses as well as observations from reviewing them for the Black Hat conferences. Hopefully it is helpful to you. The overall goal is to raise the quality level of submissions and help you get your talks accepted. This is important for people who speak regularly as well, we all have a tendency to get complacent.
- Trump’s first 100 days: The good, the bad, and the ugly for tech and science – arstechnica.com
The first 100 days of President Donald Trump’s administration come to a close Saturday. By any account, this presidential honeymoon of sorts was a mixed bag. The 45th president’s biggest achievement was the confirmation to the Supreme Court of Neil Gorsuch.
Leave A Comment