Talk With an Expert

Internet Storm Center Tech Corner

Playing with xzbot: Some things you can learn from SSH traffic

https://isc.sans.edu/diary/Some+things+you+can+learn+from+SSH+traffic/30808

Slicing up DoNex with Binary Ninja

https://isc.sans.edu/diary/Slicing+up+DoNex+with+Binary+Ninja/30812

Wait Just an Infosec Episode with Bojan Zdrnja

https://isc.sans.edu/j/xzutils

Dan Mazzella: Infostealers in Automotive Headunits

https://www.sans.edu/cyber-research/exploring-infostealer-malware-techniques-automotive-head-units/

HTTP/2 Continuation Flood

https://nowotarski.info/http2-continuation-flood-technical-details/

Dangers of CSS in HTML Email

https://lutrasecurity.com/en/articles/kobold-letters/

Google Proposes Device Bound Session Credentials (DBSC)

https://blog.chromium.org/2024/04/fighting-cookie-theft-using-device.html

Four More Ivanti Vulnerabilities

https://forums.ivanti.com/s/article/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

Google Pixel Zero Day

https://source.android.com/docs/security/bulletin/pixel/2024-04-01

Chrome Incognito Mode Settlement

https://www.wired.com/story/google-chrome-incognito-mode-data-deletion-settlement/

Google E-Mail Sender Guidelines FAQ

https://support.google.com/a/answer/14229414?hl=en&fl=1&sjid=2270464422796374445-NC

Cisco Updates and VPN Best Practices

https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-threat-defense/221806-password-spray-attacks-impacting-custome.html

https://sec.cloudapps.cisco.com/security/center/publicationListing.x

Apache Pulsar Vulnerability

https://pulsar.apache.org/security/CVE-2024-29834/

Progress Flowmon Network Monitoring Tool Vulnerability CVE-2024-2389

https://support.kemptechnologies.com/hc/en-us/articles/24878235038733-CVE-2024-2389-Flowmon-critical-security-vulnerability

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive