Suggested Reads

Suggested Reads

54874 bookmarks
Newest
I was just able to make a commit as this person, in my own repository
I was just able to make a commit as this person, in my own repository
BTW, I am not saying that this is what happened in the #xz backdoor case, but what does not help is, github makes it quite trivial to spoof user accounts... I was just able to make a commit as this person, in my own repository: https://t.co/h7TgTsT5J9 pic.twitter.com/EgoIdGzYKB— hasherezade (@hasherezade) March 31, 2024
·x.com·
I was just able to make a commit as this person, in my own repository
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs

Grand Finale - End to End Demo of the Choosen Tech (You Choose!, Ch. 3, Ep. 11)

Choose Your Own Adventure: The Treacherous Trek to Security - Grand Finale. In this episode, we'll go through all the choices ...

via YouTube https://www.youtube.com/watch?v=7-3dVxmG9qs

·youtube.com·
DevOps Toolkit - Grand Finale - End to End Demo of the Choosen Tech (You Choose! Ch. 3 Ep. 11) - https://www.youtube.com/watch?v=7-3dVxmG9qs
All about the xz-utils backdoor | Kali Linux Blog
All about the xz-utils backdoor | Kali Linux Blog
As of 5:00 pm ET on March 29, 2024 the following information is accurate. Should there be updates to this situation, they will be edited onto this blog post. The xz-utils package, starting from versions 5.6.0 to 5.6.1, was found to contain a backdoor (CVE-2024-3094). This backdoor could potentially allow a malicious actor to compromise sshd authentication, granting unauthorized access to the entire system remotely.
·kali.org·
All about the xz-utils backdoor | Kali Linux Blog
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early
Poisoned Easter eggs for all: Apparent supply chain attack caught mercifully early…
·thestack.technology·
This is something I've always feared. A psyop on an overworked maintainer has proven to be an attack vector. Who else is doing this??? Because where there's one nation, there's usually another. | Malicious Linux backdoor inserted upstream, caught early
Why Isn’t Your Strategy Sticking?
Why Isn’t Your Strategy Sticking?
It’s insufficient to just share the goals and objectives of your strategy and hope implementation will succeed. In this article, the author explains how to shift from an operational to a contextual mindset so that you can better identify the hidden obstacles that may be thwarting your strategy’s implementation so you can address them before they take root.
·hbr.org·
Why Isn’t Your Strategy Sticking?
How to Write SQL Queries
How to Write SQL Queries
Learn how to use SELECT, FROM, JOIN, WHERE, GROUP BY, HAVING, ORDER BY, OFFSET and FETCH to retrieve data with SQL.
·thenewstack.io·
How to Write SQL Queries
DevOps Toolkit - Crossplane Composition Functions | Tutorial (Part 5) - https://www.youtube.com/watch?v=XSzKs97Ls4g
DevOps Toolkit - Crossplane Composition Functions | Tutorial (Part 5) - https://www.youtube.com/watch?v=XSzKs97Ls4g

Crossplane Composition Functions | Tutorial (Part 5)

In this fifth installment of our Crossplane tutorial series, we are exploring Composition Functions. They allow us infinite flexibility to ...

via YouTube https://www.youtube.com/watch?v=XSzKs97Ls4g

·youtube.com·
DevOps Toolkit - Crossplane Composition Functions | Tutorial (Part 5) - https://www.youtube.com/watch?v=XSzKs97Ls4g
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even having to recompile the exploit for different kernel targets once.
·pwning.tech·
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques