Listen

Description

Exim Flaw Exploited

https://www.cybereason.com/blog/new-pervasive-worm-exploiting-linux-exim-server-vulnerability

Yubico Recalling FIPS Certified Yubikeys

https://www.yubico.com/support/security-advisories/ysa-2019-02/

Vulnerable Infusion Pumps

https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/alaris-gateway-workstation-unauthorized-firmware

Telegram DDoS Attack

https://twitter.com/telegram/status/1138768124914929664

Ghidra Tips for IDA Users: Function Call Graphs

https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+4+function+call+graphs/25032/

Joel Chapman: Security Consideration for Voice over Wifi (VoWifi) Systems

https://www.sans.org/reading-room/whitepapers/telephone/paper/38945