In this week's episode, Bill and Gavin discuss Cult of the Dead Cow, top ten vulnerabilities, supply chain attacks and leaky geolocation apps.
Episode 5 story list:
Microsoft Office Dominates Most Exploited List
- https://www.darkreading.com/vulnerabilities---threats/microsoft-office-dominates-most-exploited-list/d/d-id/1334198
For more on the Top Ten Vulns of 2018: https://www.tenable.com/cyber-exposure/vulnerability-intelligence
Beto O'Rourke Was Part of an Infamous '90s Hacker Group
- https://www.wired.com/story/beto-orourke-cult-of-the-dead-cow-hacking-group/
A family tracking app was leaking real-time location data
- https://techcrunch.com/2019/03/23/family-tracking-location-leak/?guccounter=1
Two serious WordPress plugin vulnerabilities are being exploited in the wild — Ars Technica
- https://apple.news/AWdmyqmhrSxWRIeKFWWp5ow
Hackers took over Asus auto update to deliver malware
- https://www.cnet.com/news/hackers-took-over-asus-updates-to-send-malware-researchers-found/
Apple patches 51 bugs with iOS 12.2 release
- https://www.bleepingcomputer.com/news/security/ios-122-patches-over-50-security-vulnerabilities/