What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here:


Security Tool to Look For Interesting Files in S3 Buckets
–> AWSBucketDump - github <–

Talks & Knowledge

Google Chrome will warn users of ‘man in the middle’ attack
–> Chrome Canary - Hack Read <–

Ethical hackers have turned this robot into a stabbing machine
–> Hacking Robots - WIRED <–

Security.txt Standard Proposed, Similar to Robots.txt
–> Security.txt - BleepingComputer <–

Open-Source-Spende: CCC schließt größte Schwachstelle in PC-Wahl
–> PC-Wahl - CCC <–

Spy Files Russia
–> Spy Files Russia - Wikileaks <–

Exploit Kit Landscape Map
–> Exploit Kit Landscape Map - Execute Malware Blog <–

Browser Security Whitepaper
–> Browser Security Whitepaper - SkyLined <–


Apache Struts 2 Flaws Affect Multiple Cisco Products
–> Apache Struts 2 on Cisco - The Hacker News <–

Warning: CCleaner Hacked to Distribute Malware; Over 2.3 Million Users Infected
–> CCleaner delivers Malware - The Hacker News <–

Red Alert 2.0: New Android Banking Trojan for Sale on Hacking Forums
–> Android Banking Trojan - he Hacker News <–

Risks Limited With Latest Apache Bug, Optionsbleed
–> Apache Optionsbleed - threat post <–

Please disable ‘Perform DNS lookups to check if URLs are valid?’ by default
–> iTerm2 Security Issue - GitLab <–