Friday, May 11
TOP STORY
Throwhammer: VU Amsterdam researchers published a report looking at how an attacker can trigger and exploit Rowhammer bit flips directly from a remote machine by only sending network packets.
TWEET OF THE DAY
It’s my last day at work.
11 years across two states. Dropped out of high school, got a GED, lied to a temp agency, and started plugging in computers at 17.
I start my new Counter-Threat role on Monday.
It’s been a long journey. I wouldn’t recommend it, but it made me who I am. - @SwiftOnSecurity
OTHER ARTICLES WE’RE READING
Dragos published a report on threat actor ALLANITE, which they say has been doing ICS recon in US and UK electrical utilities.
Why some attackers are choosing to get in, delete files, and get out, rather than go the ransomware route according to Talos’ Vitor Ventura’s report “Wiper Malware: attacking from the inside”.
Root cause analysis of the latest Internet Explorer zero day – CVE-2018-8174 by Kaspersky Labs’ researchers Vladislav Stolyarov, Boris Larin, and Anton Ivanov.
Facebook’s Certificate Transparency Monitoring tool fights phishing
A vigilante hacker has allegedly stolen ZooPark's data that they stole in their Android hacking campaign across the Middle East and provided it to Motherboard.
ZDNet’s Zack Whittaker writes about the long list of skeptics and long and meandering road to researching Breathalyzer Alcotest 9510 which is widely used by police.
Why you should make useless things like toothbrush helmets. Entertaining and smart TED talk by Simone Giertz.
ABOUT ZERO DAILY
Zero Daily is a daily newsletter that highlights application security, bug bounty, and hacker focused topics. The content is curated with love by @luketucker and brought to you by HackerOne.
Friends don’t keep good things to themselves - forward this to your homies and co-workers. BTW, want to see who runs bug bounties?
Have a news tip / story to highlight? We’d love to hear about it. Email: zerodaily@hackerone.com
Get this email forwarded to you? Click here to subscribe to the Zero Daily
[The Secure Data Act] will help ensure that in a time of heightened threats to national and digital security, users and businesses are able to rely on strong encryption without the risk of imposed vulnerabilities."
Ed Black, President and CEO of the Computer and Communications Industry Association
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be criminally exploited. As the contemporary alternative to traditional penetration testing, our bug bounty program solutions encompass vulnerability assessment, crowdsourced testing and responsible disclosure management. Discover more about our security testing solutions or Contact Us today.