Techlinks Roundup may 2019 (Computersecurity)

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@nerdz0ne·
0.000 HBD
Techlinks Roundup may 2019 (Computersecurity)
![Hacker_computer_cyber_security.jpg](https://cdn.steemitimages.com/DQmSFgyF9KAgHsSGy1j4BUxY7W1sJUQKBpcBxYLpmZVXgpJ/Hacker_computer_cyber_security.jpg)

Abusing the COM Registry Structure
https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/

RIT cyber fighters go deep on Tor security
https://www.rit.edu/news/rit-cyber-fighters-go-deep-tor-security

Certexfil
https://medium.com/@jeanmichel.amblat/abusing-certificates-for-data-exfiltration-d6bff2533cd0

Project Zero blog
https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/htmlview?sle=true#

Linksys Smart Wi-Fi Routers Leak Info of Connected Devices
https://www.bleepingcomputer.com/news/security/linksys-smart-wi-fi-routers-leak-info-of-connected-devices/

CPU related
https://mdsattacks.com/
https://cpu.fail/


have fun and dont panic
👍 ,