Should Amazon be blamed for the capital one data breach? Adobe Creative Cloud Users Data was Exposed, And a remote code execution attack is being used in the wild! All that coming up now on ThreatWire.
#threatwire #hak5

Links:
Support me on alternative platforms! https://snubsie.com/support

https://www.youtube.com/shannonmorse -- subscribe to my new channel!

ThreatWire is only possible because of our Patreon patrons! https://www.patreon.com/threatwire

Links:
Chosen by patrons AWS Capital One Breach:
https://www.cyberscoop.com/warren-wyden-aws-capital-one-breach/
https://www.cnet.com/news/warren-and-wyden-call-for-ftc-investigation-on-amazon-over-capital-one-breach/

Adobe:
https://www.comparitech.com/blog/information-security/7-million-adobe-creative-cloud-accounts-exposed-to-the-public/
https://theblog.adobe.com/security-update/
https://threatpost.com/adobe-creative-cloud-users-exposed-hackers/149563/
https://thehackernews.com/2019/10/adobe-database-leaked.html

PHP Flaw:
https://thehackernews.com/2019/10/nginx-php-fpm-hacking.html
https://github.com/neex/phuip-fpizdam
https://www.zdnet.com/article/nasty-php7-remote-code-execution-bug-exploited-in-the-wild/


Photo credit:
https://blogs.adobe.com/creativecloud/files/2012/05/CC-image.jpeg


-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → https://www.hakshop.com
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Twitter Mentions