Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] Understanding denial of service attacks: https://www.cisa.gov/news-events/news/understanding-denial-service-attacks
- [2] Log4j vulnerabilities: https://logging.apache.org/log4j/2.x/security.html
- [3] CVE-2021-44228: https://nvd.nist.gov/vuln/detail/CVE-2021-44228
- [4] Equifax data breach: https://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html
- [5] CVE-2017-5638: https://nvd.nist.gov/vuln/detail/cve-2017-5638
- [6] Pretexting: https://en.wikipedia.org/wiki/Pretexting
- [7] Twitter hack update: https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident
- [8] DEFCON Social Engineering Community: https://www.se.community/
- [9] Coverup of Uber data breach: https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-convicted-federal...