Listen

Description

How to Write Yara Rules

https://isc.sans.edu/forums/diary/Developing+YARA+Rules+a+Practical+Example/24158/

GhostDNS DNS Changer Malware

https://blog.netlab.360.com/70-different-types-of-home-routers-all-together-100000-are-being-hijacked-by-ghostdns-en/

Foxit PDF Reader Vulnerabilities

https://www.foxitsoftware.com/support/security-bulletins.php

Apple Laptops Shipped With CPU in Manufacturing Mode

http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html