Listen

Description

Analyzing a Compromised Wordpress Site

https://isc.sans.edu/forums/diary/A+Bunch+of+Compromized+Wordpress+Sites/23764/

Breacking Bluetooth Low Energy Smart Padlock

https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/

WIM Disk Image Vulnerability

https://blog.talosintelligence.com/2018/06/vulnerability-spotlight-talos-2018-0545.html

Extracting Timely Sign-In Data from Office 365 Logs

https://www.sans.org/reading-room/whitepapers/logging/extracting-timely-sign-in-data-office-365-logs-38435