Aurora Report Mission
The original mission of Aurora Report was to monitor daily security news and report on the aspects of that news that was relevant to my current work situation. Since the begining of this effort I have attempted to proliferate the global security events that are/were occuring to as many colleagues as would listen. At times I felt quite the boy calling wolf, and yet in others very satisfied that I had brought forth timely and accurate knowledge.
One aspect of this endeavor that has not been quite what I intended is the growing volume of articles in the posts as well as the ever increasing number of sources. The last post "Around The Horn vol.2,5" had over 200 articles and the current issue if ever published has upwards of 350. This is unmanageable for the reader and has the effect of displacing the desired results of this blog.
What is to be done now?
As a result of the ever increasing number of security relevant sources of information I have decided to try and refocus on the original mission. Therefore I have published as a feature of this blog all of my currently followed blogs. Those of you that miss my aggregation can now either use Aurora Report as a jumping off point or you can use a feed reader like Google Reader or BlogLines to follow these feeds on your own.
I will try to scour through the relevant articles that either interest me or have direct impact on current situational challenges. I will build on these to publish a semi-regular post replete with my research and conclusions on the matter. After all that is really what a blog is supposed to be.
Enjoy!
Tuesday, February 9, 2010
Subscribe to:
Post Comments (Atom)
My Blog List
-
-
Researchers call out QNAP for dragging its heels on patch development - WatchTowr publishes report claiming vendor failed to issue fixes after four months Infosec boffins say they were forced to go public after QNAP failed to ...2 hours ago
-
Mushroom Coffee: How It Works, Potential Health Benefits and Things to Consider - CNET - Mushroom coffee has gained popularity in recent years and many claim it's a better alternative to regular coffee. Here's what you need to know.2 hours ago
-
Mushroom Coffee: How It Works, Potential Health Benefits and Things to Consider - CNET - Mushroom coffee has gained popularity in recent years and many claim it's a better alternative to regular coffee. Here's what you need to know.2 hours ago
-
Patch Tuesday, May 2024 Edition - Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zero-day" vulnerabilities i...5 days ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...3 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground4 months ago
-
My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...3 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...4 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...6 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...10 years ago
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment