Week in review: 6 free resources for getting started in cybersecurity, Patch Tuesday forecast | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

Week in review: 6 free resources for getting started in cybersecurity, Patch Tuesday forecast | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:


The misconceptions preventing wider adoption of digital signaturesIn this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to handwritten signatures when backed by robust identity verification.


Shifting left and right, innovating product securityIn this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting regulatory requirements while ensuring compliance.


Reaper: Open-source reconnaissance and attack proxy workflow automationReaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration, and building universally distributable workflows.


Atlas VPN zero-day allows sites to discover users’ IP addressAtlas VPN has confirmed the existence of a zero-day vulnerability that may allow website owners to discover Linux users’ real IP address.


Old vulnerabilities are still a big problemA recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote code execution.


LibreOffice: Stability, security, and continued developmentLibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free.


How Chinese hackers got their hands on Microsoft’s token signing keyThe mystery of how Chinese hackers managed to steal a crucial signing key that allowed them to breach Microsoft 365’s email service and access accounts of employees of 25 ..

Support the originator by clicking the read the rest link below.