Secjuice Squeeze Volume 43

Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.

Secjuice Squeeze Volume 43

Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week. This week's volume was curated by Secjuice writers Sinwindie, Thunder-Son, and Muhammad Luqman.

Articles

Spy agency ducks questions about 'back doors' in tech products

The U.S. National Security Agency is rebuffing efforts by a leading Congressional critic to determine whether it is continuing to place so-called back doors into commercial technology products, in a controversial practice that critics say damages both U.S. industry and national security.

Source & Link: reuters.com
Curator: Sinwindie

In a first, researchers extract secret key used to encrypt Intel CPU code

Hackers can now reverse-engineer updates or write their own custom firmware.

Source & Link: arstechnica.com
Curator: Thunder-Son

Ryuk Ransomware: Extensive Attack Infrastructure Revealed

In service to the general public, RiskIQ is today releasing the entirety of its unique and expansive holdings relating to the Ryuk strain of ransomware, exposing all known infrastructure upon which the threat actors behind the attacks currently rely. Organizations will be able to use this intelligence to search their networks for signs of attack, as well as to prevent malicious connections to other Ryuk command-and-control servers.

Source & Link: riskiq.com
Curator: Thunder-Son

Microsoft Warns of Ongoing Attacks Exploiting Zerologon

The vulnerability, patched in August, has been weaponized by APT groups and prompted CISA to issue a security alert.

Source & Link: darkreading.com
Curator: Muhammad Luqman

Browser Isolation Cybersecurity Startup WEBGAP Named As A Top Web Security Provider by Enterprise Security Mag

Remote browser isolation startup WEBGAP has been recognized as a top web security provider by Enterprise Security Magazine.

Source & Link: EnterpriseSecurityMag.com
Curator: Muhammad Luqman

Upcoming Events, Webcasts, Conferences, etc.


BIG List of Virtual Cybersecurity Conferences

Source & Link: https://github.com/santosomar/virtualseccons
Curator: Guise Bule

The awsome GIF used in this article is called Tricky Halloween and was created by Shhhart.