June 17, 2022, 2 a.m. | Dr. Johannes B. Ullrich

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast isc.sans.edu

Houdini is Back Delivered Through a JavaScript Dropper

https://isc.sans.edu/forums/diary/Houdini+is+Back+Delivered+Through+a+JavaScript+Dropper/28746/

Drifting Cloud: Zero-Day Sophos Firewall Exploitation

https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/

Exploiting a Heap Overflow in the FreeBSD Wi-Fi Stack

https://www.zerodayinitiative.com/blog/2022/6/15/cve-2022-23088-exploiting-a-heap-overflow-in-the-freebsd-wi-fi-stack

Cisco Email Security Appliance and Cisco Secure Email and Web Manager

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-esa-auth-bypass-66kEcxQD

Analyzing the Fastjson "Auto Type Bypass" RCE vulnerability

https://jfrog.com/blog/cve-2022-25845-analyzing-the-fastjson-auto-type-bypass-rce-vulnerability/

business cisco computer cyber cybersecurity daily email exploit fastjson firewall freebsd hacking houdini infosec internet isc network rce security sophos wifi

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Intermediate Security Engineer, (Incident Response, Trust & Safety)

@ GitLab | Remote, US

Journeyman Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Project Manager II - Compliance

@ Critical Path Institute | Tucson, AZ, USA

Junior System Engineer (m/w/d) Cyber Security 1

@ Deutsche Telekom | Leipzig, Deutschland