Press

So here are some links I’ve found mentioning GainSec or myself.

Note: I’m actively searching for the News Segment video I was in while I was at Leet Cyber Security, if you have a recording please send it my way!

IMG_4977
This is the video I’m looking for

Know of one I didn’t find?

Please send it to info@gainsec.com!

Multiple Links relating to my first two CVEs I discovered, CVE-2017-16744 and CVE-2017-16748 – US-CERT AdvisorySecurityFocusNIST 1NIST 2VulDB 1VulDB 2 Blog Post 

Post I made via my previous day Job about my CVEs – Link

Albany NY Magazine Article – Link

Archive of New Segment I was in during my time at Leet (Looking for the video that went along with this segment!!) – Preview LinkFull Article (Minus the Video)

Alumni Story from Herkimer Community College (HCC) – Link

Full spread from Herkimer Alumni Connections Magazine – MirrorLink

Featured under the Cyber Security Degree Listing of HCC – Link

Quoted and mentioned on the SUNY Online Cyber Security Program Listing – Link

Archive of IronGeek Links from ANYCon – Link

Interview with Security Weekly – LinkGainSec Reupload

Lecture posted on IronGeek.com – Link –  GainSec Reupload

Lecture from ANYCon posted by Leet Cyber Security – LinkGainSec Reupload

Lecture From CyBEER posted by Leet Cyber Security – LinkGainSec Reupload

Link-Base Listings – Link

STOK – YouTube – GainSec GoldenNuggets Shoutout – Link

InfoSec Pat – YouTube – Nerd Talk week 10 – Link

InfoSec Pat – YouTube – Nerd Talk week 12 – Link

Swiping Sunday Podcast – Featuring GainSec – Link

Execs Need Less Talk, More Action on Software Security – Link

Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports – MirrorLink

NTFS Support in new Linux kernel promises to make new release more cryptographically sound – Link

Report highlights cybersecurity dangers of Elastic Stack implementation mistakes  –MirrorMirror Mirror MirrorLink

Widespread Elastic stack API security vulnerability – Link

Easily exploited Elastic Stack API security flaw exposes data – Link 

‘Trojan Source’ a Threat to All Source Code, Languages – Link

Industry Reactions to New ‘Trojan Source’ Attack: Feedback Friday – Link

3 Ways to Deal With the Trojan Source Attack – Link

‘Trojan Source’ technique can inject malware into source code without detection – Link

‘Trojan Source’ Hides Invisible Bugs in Source Code – Link

Why VMware Horizon became a ‘top choice’ for Log4j attacks – Link MirrorMirror Mirror

Threat actors target MFA token via man-in-the-middle attacks – Link

Increasing Adoption of Phishing Kits Puts MFA at Risk – LinkMirror

How to Find a Data Leak in 50 Easy Steps (Blog post from my day job) – Link

Microsoft: Key Office apps will block macros by default – Link

Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol – Link

Nearly 50% of all SaaS-to-SaaS integrations sit unused following a failed POC effort – Link

Messaging Apps That Are Secure: Signal vs.  WhatsApp – Link

CVE-2022-34613 – Blog Post

CVE-2022-34618 Blog Post

CVE-2022-34619 Blog Post

CVE-2022-34625 – Blog Post

CVE-2022-34009 – Blog Post

CVE-2022-35142 – Blog Post

CVE-2022-35143  Blog Post

CVE-2022-35144 Blog Post

CVE-2022-34108 – Blog Post Coming Soon!

CVE-2022-34615 – Blog Post Coming Soon!

CVE-2022-34621 – Blog Post Coming Soon!

CVE-2022-34623 – Blog Post Coming Soon!

CVE-2022-34624 – Blog Post Coming Soon!

CVE-2022-34109 – Blog Post Coming Soon!

CVE-2022-34110 – Blog Post Coming Soon!