Seclog - #43
Spotlight: KeepnetLabs's Partnership with Pentesters, The novel HTTP/2 ‘Rapid Reset’ DDoS attack, CURL (CVE-2023-38545), New PyPI Malware Campaign, ZAP 2.14.0, etc.
seclinks
Partnership with Pentesters
9 Ways You’re Doing MFA All Wrong
Python 3.12.0 from a supply chain security perspective
25 Hard-Hitting Lessons from 17 Years in Cybersecurity
Yet More Unauth Remote Command Execution Vulns in Firewalls
How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack | Google Cloud Blog
curl - SOCKS5 heap buffer overflow - CVE-2023-38545
AI Engineer Summit - Building Blocks for LLM Systems & Products
Cloud Provider Credentials Targeted in New PyPI Malware Campaign
ZAP – ZAP 2.14.0
Exploiting the Looney Tunables vulnerability on HTB (CVE-2023-4911)
The sky has not yet fallen - Curl (CVE-2023-38545)
Following attackers’ (Cloud)trail in AWS: Methodology and findings in the wild | Datadog Security Labs
Enhancing Security and Developer Productivity: LinkedIn's Journey with Implementing Content Security Policy | LinkedIn Engineering
Much ado about Curl
secgits
risinek/esp32-wifi-penetration-tool: Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.
secvideos
Attacking Secondary Contexts in Web Applications - Sam Curry
← All Seclogs