August 4, 2017

G's Reading List for August 4, 2017

Security Concerns Lead to a Conference Boom
by Beth Thomas Hertz @ CrainsCleveland.com

Link to article: http://www.crainscleveland.com/article/20170729/NEWS/170729795/security-concerns-lead-to-a-conference-boom

Greg conference - I highly recommend it!  It's a week long event that's coming to Cleveland area the week of October 30, 2017.  Details can be found here (https://www.informationsecuritysummit.org/ssw-2017/).

_____________________________________________
Forget about the malware, go after attackers’ tactics, techniques and procedures
by Zelkja Zors, Managing Editor HelpNetSecurity.com

Link to article: https://www.helpnetsecurity.com/2017/06/22/attacker-tactics-techniques-procedures/

_____________________________________________


March 19, 2017

G's Reading List for March 19, 2017

Virtual machine escape fetches $105,000 at Pwn2Own hacking contest [updated]
by Dan Goodin @ Arstechnica.com

Using 3 different exploits in Microsoft Edge browser, Windows 10, and then VMWare contestants were able to escape a virtual machine to compromise the host the VM was running on. Impressive.
Linkhttps://arstechnica.com/security/2017/03/hack-that-escapes-vm-by-exploiting-edge-browser-fetches-105000-at-pwn2own/
_____________________________________________

Malwarebytes teams up with Cybersecurity Factory
by Malwarebytes Labs
Malwarebytes is proud to support Cybersecurity Factory, a 10-week summer program for early-stage cybersecurity companies. This program runs in collaboration with Highland Capital Partners provides teams with a $35,000 convertible note investment, office space, and dedicated security mentorship from industry leaders at leading companies throughout the United States...
Linkhttps://blog.malwarebytes.com/malwarebytes-news/2017/02/malwarebytes-teams-up-with-cybersecurity-factory/
_____________________________________________

WikiLeaks to Share CIA Hacking Data with Tech Companies
by Marissa Lang, San Francisco Chronicle
WikiLeaks will release the code showing how the CIA managed to break into phones, work around encrypted messaging apps and avoid detection by software designed to defend against cyberattacks.
_____________________________________________

Google Points to Another POS Vendor Breach
by Brian Krebs @ Krebs on Security

Another good thing about Google's site warnings.