skip to main |
skip to sidebar
A Change In Tactics
Aurora Report Mission
The original mission of Aurora Report was to monitor daily security news and report on the aspects of that news that was relevant to my current work situation. Since the begining of this effort I have attempted to proliferate the global security events that are/were occuring to as many colleagues as would listen. At times I felt quite the boy calling wolf, and yet in others very satisfied that I had brought forth timely and accurate knowledge.
One aspect of this endeavor that has not been quite what I intended is the growing volume of articles in the posts as well as the ever increasing number of sources. The last post "Around The Horn vol.2,5" had over 200 articles and the current issue if ever published has upwards of 350. This is unmanageable for the reader and has the effect of displacing the desired results of this blog.
What is to be done now?
As a result of the ever increasing number of security relevant sources of information I have decided to try and refocus on the original mission. Therefore I have published as a feature of this blog all of my currently followed blogs. Those of you that miss my aggregation can now either use Aurora Report as a jumping off point or you can use a feed reader like Google Reader or BlogLines to follow these feeds on your own.
I will try to scour through the relevant articles that either interest me or have direct impact on current situational challenges. I will build on these to publish a semi-regular post replete with my research and conclusions on the matter. After all that is really what a blog is supposed to be.
Enjoy!
My Blog List
-
-
-
The workplace has become a surveillance state
-
Cracked Labs report explores the use of motion sensors and wireless
networking kit to monitor offices
Office buildings have become like web browsers – the...
3 hours ago
-
-
Hacker in Snowflake Extortions May Be a U.S. Soldier
-
Two men have been arrested for allegedly stealing data from and extorting
dozens of companies that used the cloud data storage company Snowflake, but
a thi...
11 hours ago
-
What Are Normal Users Supposed to Do with IDS Alerts from Network Gear?
-
Probably once a week, I see posts like this in the r/Ubiquiti subreddit.
Ubiquiti makes network gear that includes an "IDS/IPS" feature. I own some
older U...
1 month ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb
7th)
-
Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But
I have no idea what this URL may be associated with. Based on some
googleing, I ...
9 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing
Tool
-
BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and
Response) tool designed to serve as a testing ground
10 months ago
-
Comic for March 12, 2023
-
Dilbert readers - Please visit Dilbert.com to read this feature. Due to
changes with our feeds, we are now making this RSS feed a link to
Dilbert.com.
1 year ago
-
87% of Container Images in Production Have Critical or High-Severity
Vulnerabilities
-
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed
how to shore up the software supply chain.
1 year ago
-
Vulnerability Summary for the Week of November 29, 2021
-
Original release date: December 6, 2021
High Vulnerabilities
Primary
Vendor -- Product Description Published CVSS Score Source & Patch Info
abb -- rtu50...
2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine
ServiceDesk Plus
-
Original release date: December 2, 2021
Summary
*This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics,
Techniques, and Common Knowledge (AT...
2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000
-
Just realized that 20 years have passed since I started this site to learn
more about web security threats. What 'appsec' looked like in 2000 OWASP
didn't ...
4 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim
-
Posted by InfoSec News on Aug 12
https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/
By Danny Palmer
Z...
4 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security
-
There are reasons to embrace it. There are reasons to be wary of it. Here's
the breakdown.
5 years ago
-
Privacy and Mobile Device Apps
-
Original release date: July 9, 2019 | Last revised: November 15, 2019
What are the risks associated with mobile device apps?
Applications (apps) on your sm...
5 years ago
-
44CON 2018 - 12th-14th September, London (UK)
-
Posted by Steve on Feb 28
44CON 2018 is the UK's best annual Security Conference and Training event.
The conference spans 2.5 days with training
on the 1...
6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability
-
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1
BER decoding routine. The library will allocate a memory block based on the
leng...
7 years ago
-
V2V Communications security considerations
-
The future of vehicles, road infrastructure and driving are changing. We
are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure
(V2I) ...
7 years ago
-
vTech – ignorance is no defence (and neither are weasel words)
-
This morning, Troy Hunt published a blog post alerting to a recent change
in the Terms & Conditions published by children’s toy manufacturer vTech.
The cha...
8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence
-
The U.S. Justice Dept. said it was "looking into the issues" raised by an
Reuters story, that one of its law enforcement agencies collaborated with
the NSA...
11 years ago
-
News: Change in Focus
-
Change in Focus
14 years ago
-
-
-
-
-
-
-
-
No comments:
Post a Comment