AMD Information Security is #hiring! I have two positions open on my team. Both are mid-senior level analyst roles with some leadership potential:
DLP investigations lead, US https://careers.amd.com/careers-home/jobs/24631
SOC Senior Analyst, India https://careers.amd.com/careers-home/jobs/24474
O'Reilly published a book a while back, on software engineering at Google; that book is now available free online. Lots of good content - on #change #management, building scalable and supportable systems, and managing people and teams - lots that is applicable far beyond traditional software engineering. Sticking this in the #infosec #toolbox for my own future reference.
I am having a hard time comprehending how a "security feature bypass vulnerability" in SharePoint Server (CVE-2023-21743) can affect #integrity without also affecting #confidentiality. What am I missing? What on earth does "The attacker is able to bypass the expected user access as an unauthenticated user" mean? Has anyone seen further details on this #vulnerability?
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21743
Interesting. This may be old news to folks that deal with telephony, but it's new to me. There is a "Class 0" SMS - a form of SMS that is by design displayed as a full screen overlay, as might be appropriate for an emergency notification (...or abused for SMS spam).