HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

Weekly Update 142

by / Friday, 14 June 2019 / Published in Hacking
Share
Tweet
Pin
0 Shares

Presently sponsored by: Twilio: Learn what regulations like PSD2 mean for your business, and how Twilio can help you achieve secure, compliant transactions

Weekly Update 142

I made it to the Infosecurity hall of fame! Yesterday was an absolutely unreal experience that was enormously exciting:

It was an absolute honour to induct the fantastic @troyhunt into the @Infosecurity @InfosecurityMag Hall of Fame today at #Infosec19. Troy is a credit to our industry and also a really great guy. Congrats Troy, so well deserved ?? pic.twitter.com/grN4aALypV

— Eleanor Dallaway (@InfosecEditor) June 6, 2019

But that wasn’t all, there was also the European Security Blogger awards a couple of days earlier:

Thanks folks ? pic.twitter.com/GvCnvOL7X3

— Troy Hunt (@troyhunt) June 4, 2019

And just a general absolutely jam-packed, non-stop week for both Scott and I. We talk about what we’ve been up to in London, Scott’s weird cert adventures and a couple of massive data breaches back home in Australia. I’m publishing this just before I head off to Oslo so I’ll come from there next week solo, then with Scott again the week after from the NDC conference. Until then, here’s this week’s update:

Weekly Update 142
Weekly Update 142
Weekly Update 142

References

  1. Scott had a cert unexpectedly issued for one of his domains (interesting series of events that led to it, documented in that Twitter thread)
  2. Scott tweeted about a weird security decision by Emirate… and got into “Twitter trouble” (we only ever – ever – see this sort of behaviour online, never in person)
  3. Westpac’s PayID was the target of a mass enumeration attack (apparently 100k Aussies had personal data exposed by this “feature”)
  4. The Australian National University got seriously pwned (19 years worth of historical data – how much of that did they actually still need?)
  5. I’m sponsored by Varonis this week – watch their DFIR team investigate a cyberattack using their data-centric security stack


Troy Hunt’s Blog

Share
Tweet
Pin
0 Shares
Tagged under: Update, Weekly

Search on the site

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

Latest posts

  • How to tell if someone is stealing your wifi

  • How to check saved passwords on Chrome

  • The Computer Security Day

  • What is digital forensics

  • How to install Metasploit in Termux?

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP
New Order