Bounty of 1,250€ from Intigriti for VoIP spoofing vulnerability. Read about it here.
Welcome to the #IWWeekly36 - the Monday newsletter that brings the best in Infosec straight to your inbox.
We’re in the last 30 days of 2022 and there’s no better time to pick up a few skills and polish your learnings before jumping in 2023.
Book your ticket for IWCON2.0 and learn from the best in the cybersec world 😍🙌
With 20+ hours of immersive learning, QnA and networking, this conference would bring a massive lift in your infosec career 😁🔥
Now, coming back to today's NL, here are our top picks for this week: 7 articles, 6 Threads, 5 videos, 2 GitHub repos and tools, 1 job alert to help you maximize the benefit from this newsletter and take a massive jump ahead in your career.
Excited? Let’s jump in👇
📝 7 Infosec Articles (5+ 2 beginner-friendly)
#1 Read this in-depth article by Kishor Balan on bypassing Android SSL pinning and intercepting Proxy unaware apps.
#2 Ltidi showed how to uncover hidden security risks in sendbird misconfigurations.
🧵6 Trending Threads (4 + 2 beginner-friendly)
#2 @Steiner254 shared a curated list of resources for learning about SQL injection vulnerabilities.
📽️ 5 Insightful Videos (3 + 2 beginner-friendly)
#1 Learn how to steal arbitrary files from LocalStorage in Android from this interview between @AseemShrey and @hax0rgb.
#2 Watch @Gregxsunday’s extremely resourceful livestream where he shares his most important security lessons of 2022.
⚒️ 2 GitHub repositories & Tools
💰1 Job Alert
#1 eSec Forte Technologies is on a hiring spree with positions open for application security, vulnerability assessment and penetration testing, cloud security, network security, etc.
💸Advertise with us💸
We are looking to partner with amazing infosec, pen testing, and ethical hacking teams, brands, and companies from all over the world.
If you'd like to advertise to our 27k+ community of cybersecurity enthusiasts, click here to partner with us.
That’s all for this week. Hope you enjoyed these incredible finds and learned something new from today’s newsletter.
Before we say bye…
If you found this newsletter interesting, and know other people who would too, we'd really appreciate if you could forward it to them 📨
If you have questions, comments, or feedback, just reply to this email or let us know on Twitter @InfoSecComm.
See you again next week.
Lots of love
This newsletter has been created in collaboration with our amazing ambassadors.