AMD Information Security is #hiring! I have two positions open on my team. Both are mid-senior level analyst roles with some leadership potential:
DLP investigations lead, US https://careers.amd.com/careers-home/jobs/24631
SOC Senior Analyst, India https://careers.amd.com/careers-home/jobs/24474
O'Reilly published a book a while back, on software engineering at Google; that book is now available free online. Lots of good content - on #change #management, building scalable and supportable systems, and managing people and teams - lots that is applicable far beyond traditional software engineering. Sticking this in the #infosec #toolbox for my own future reference.
I am having a hard time comprehending how a "security feature bypass vulnerability" in SharePoint Server (CVE-2023-21743) can affect #integrity without also affecting #confidentiality. What am I missing? What on earth does "The attacker is able to bypass the expected user access as an unauthenticated user" mean? Has anyone seen further details on this #vulnerability?
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21743
Interesting. This may be old news to folks that deal with telephony, but it's new to me. There is a "Class 0" SMS - a form of SMS that is by design displayed as a full screen overlay, as might be appropriate for an emergency notification (...or abused for SMS spam).
Lovely news for the Thursday before Christmas: password vault provider LastPass disclosed that customer vaults were stolen by intruders in an incident earlier this year.
Password vaults make it practical to use unique and strong passwords for every account - but the vault itself becomes a target.
Using a unique, long, and unguessable password as the encryption key for that vault is precisely the right defense against the risk that the vault itself is stolen.
Be wary of phishing attempts impersonating lastpass now. The vault may be encrypted, but that's not much help if an attacker can phish for the key.
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/amp/