Reverse Engineering with Ghidra course offer
https://ift.tt/39mT2gB
Submitted June 13, 2021 at 09:51PM by srivaditya22
via reddit https://ift.tt/3wn5VDc
https://ift.tt/39mT2gB
Submitted June 13, 2021 at 09:51PM by srivaditya22
via reddit https://ift.tt/3wn5VDc
Hakin9 - IT Security Magazine
Reverse Engineering with Ghidra (W50)
Enter a short denoscription of the course.
(Technical) Infosec Core Competencies
https://ift.tt/3v8CiEd
Submitted June 14, 2021 at 10:58AM by xaocuc
via reddit https://ift.tt/3iEFRiU
https://ift.tt/3v8CiEd
Submitted June 14, 2021 at 10:58AM by xaocuc
via reddit https://ift.tt/3iEFRiU
www.netmeister.org
(Technical) Infosec Core Competencies
An
incomplete list of (technical) things just about anybody working
in Information Security would benefit from knowing.
incomplete list of (technical) things just about anybody working
in Information Security would benefit from knowing.
Mistune — iOS Remote code execution vulnerabilities that have been hiding for a decade
https://ift.tt/2U3WDOl
Submitted June 14, 2021 at 11:20AM by 0xdea
via reddit https://ift.tt/35i5fTQ
https://ift.tt/2U3WDOl
Submitted June 14, 2021 at 11:20AM by 0xdea
via reddit https://ift.tt/35i5fTQ
Mistune Bug
Mistune is a remote exploit demostrated at TianfuCup 2020. It consists of two bugs that were introduced by iOS 3 and iOS 6 respectively
Detecting Proxies and VPN's with Latency Measurements
https://ift.tt/3vqPOmJ
Submitted June 14, 2021 at 02:26PM by incolumitas
via reddit https://ift.tt/3cF9LQd
https://ift.tt/3vqPOmJ
Submitted June 14, 2021 at 02:26PM by incolumitas
via reddit https://ift.tt/3cF9LQd
incolumitas.com
Detecting Proxies and VPN's with Latency Measurements
VPN's and Proxy Servers can be detected by comparing latencies measured with JavaScript in the browser with the corresponding latency of the TCP/IP handshake on the server.
Stealing tokens, emails, files and more in Microsoft Teams through malicious tabs
https://ift.tt/3cF2AI0
Submitted June 14, 2021 at 06:39PM by stargravy
via reddit https://ift.tt/3pPxi6B
https://ift.tt/3cF2AI0
Submitted June 14, 2021 at 06:39PM by stargravy
via reddit https://ift.tt/3pPxi6B
Medium
Stealing tokens, emails, files and more in Microsoft Teams through malicious tabs
Trading up a small bug for a big impact
Bulletproof SSL and TLS
https://ift.tt/3wjf8MV
Submitted June 14, 2021 at 10:26PM by girl_from_japan
via reddit https://ift.tt/3wq1QOO
https://ift.tt/3wjf8MV
Submitted June 14, 2021 at 10:26PM by girl_from_japan
via reddit https://ift.tt/3wq1QOO
Achieving QSEE, Qualcomm's TEE, code execution on Qualcomm IPQ40xx-based devices using a restricted write vulnerability (i.e. CVE-2020-11256).
https://ift.tt/3pOR8Pm
Submitted June 14, 2021 at 10:20PM by tieknimmers
via reddit https://ift.tt/3zqlhsM
https://ift.tt/3pOR8Pm
Submitted June 14, 2021 at 10:20PM by tieknimmers
via reddit https://ift.tt/3zqlhsM
Raelize
Qualcomm IPQ40xx: Achieving QSEE Code Execution
Raelize company website!
[Blog] Instant VirusTotal checks from an air-gapped computer
https://ift.tt/3glcLDB
Submitted June 14, 2021 at 10:40PM by RXCR2
via reddit https://ift.tt/3cIuqTL
https://ift.tt/3glcLDB
Submitted June 14, 2021 at 10:40PM by RXCR2
via reddit https://ift.tt/3cIuqTL
hexatomium.github.io
Instant VirusTotal checks from an air-gapped or offline computer
Grab a copy of Mscan, and launch it on the air-gapped Windows machine. Mscan is a simple VirusTotal lookup tool,
with a pretty unusual feature: it supports malware checks on air-gapped computers, through the use of high-density QR codes.
It requires no…
with a pretty unusual feature: it supports malware checks on air-gapped computers, through the use of high-density QR codes.
It requires no…
Incremental Machine Leaning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
https://ift.tt/3vsaZEZ
Submitted June 14, 2021 at 11:46PM by digicat
via reddit https://ift.tt/3xizyFW
https://ift.tt/3vsaZEZ
Submitted June 14, 2021 at 11:46PM by digicat
via reddit https://ift.tt/3xizyFW
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Celeborn: API Unhooker
https://ift.tt/2RZhwJW
Submitted June 15, 2021 at 12:35AM by DarkGrejuva
via reddit https://ift.tt/2RRPW0W
https://ift.tt/2RZhwJW
Submitted June 15, 2021 at 12:35AM by DarkGrejuva
via reddit https://ift.tt/2RRPW0W
GitHub
frkngksl/Celeborn
Userland API Unhooker Project. Contribute to frkngksl/Celeborn development by creating an account on GitHub.
Intel CET In Action | Offensive Security
https://ift.tt/2PCDsJE
Submitted June 14, 2021 at 08:12PM by vyngvangzoomba
via reddit https://ift.tt/35irx7W
https://ift.tt/2PCDsJE
Submitted June 14, 2021 at 08:12PM by vyngvangzoomba
via reddit https://ift.tt/35irx7W
Offensive-Security
Intel CET In Action | Offensive Security
In this article, we'll examine how effective CET is at mitigating real-world exploits that make use of ROP or stack based buffer overflow vulnerabilities.
Technical denoscriptions of 0days found - EC-CUBE, SoyCMS, BaserCMS
https://ift.tt/3ws0RO7
Submitted June 15, 2021 at 08:53AM by toyojuni
via reddit https://ift.tt/2SCKMGt
https://ift.tt/3ws0RO7
Submitted June 15, 2021 at 08:53AM by toyojuni
via reddit https://ift.tt/2SCKMGt
Flatt Security Blog
Technical denoscriptions of 0days found - EC-CUBE, SoyCMS, BaserCMS - Flatt Security Blog
Hi, I’m stypr (@stereotype32) from Flatt Security Inc. As I mentioned earlier in the previous article「Flatt Securityは“自分のやりたいことが実現できる”場所/セキュリティエンジニア stypr - Fla…
Open-source libraries and tools to perform fully homomorphic encryption (FHE)
https://ift.tt/3toHnY6
Submitted June 15, 2021 at 10:49AM by 0xdea
via reddit https://ift.tt/3vumeNb
https://ift.tt/3toHnY6
Submitted June 15, 2021 at 10:49AM by 0xdea
via reddit https://ift.tt/3vumeNb
GitHub
GitHub - google/fully-homomorphic-encryption: Libraries and tools to perform fully homomorphic encryption operations on an encrypted…
Libraries and tools to perform fully homomorphic encryption operations on an encrypted data set. - GitHub - google/fully-homomorphic-encryption: Libraries and tools to perform fully homomorphic enc...
CVE-2019-17240 - Bludit 3.2.9 Auth Bruteforce Bypass in Go lang
https://ift.tt/3gtpDqg
Submitted June 15, 2021 at 12:22PM by spajky_yt
via reddit https://ift.tt/3vknoeg
https://ift.tt/3gtpDqg
Submitted June 15, 2021 at 12:22PM by spajky_yt
via reddit https://ift.tt/3vknoeg
Amit Merchant - Software Engineer
Bludit 3.9.2 - Auth Bruteforce Bypass CVE-2019-17240
When self study for OSCP certification,I stumble upon HTB machine that have CVE-2019-17420 vulnerability. I look for public exploit and there was one written in python. As challenge for me self was to recreate this exploit in golang. So lets get started.
Rediscovering N Days: PAM360 information disclosure
https://ift.tt/3iH5yiR
Submitted June 13, 2021 at 09:06PM by Natural_Decision_446
via reddit https://ift.tt/3cIlWvN
https://ift.tt/3iH5yiR
Submitted June 13, 2021 at 09:06PM by Natural_Decision_446
via reddit https://ift.tt/3cIlWvN
Medium
Rediscovering N Days: PAM360 information disclosure
Penetration testing, one of the great aspects of cybersecurity, working in different projects will increase your contact with large and…
Exploiting outdated Apache Airflow instances
https://ian.sh/airflow
Submitted June 15, 2021 at 02:06PM by albinowax
via reddit https://ift.tt/3gq3OJf
https://ian.sh/airflow
Submitted June 15, 2021 at 02:06PM by albinowax
via reddit https://ift.tt/3gq3OJf
[crypto] Critical Bug Identified in 88mph Awarded with $42,069 Bounty | iosiro
https://ift.tt/3xoEBEU
Submitted June 15, 2021 at 03:07PM by syncikin
via reddit https://ift.tt/3gvJFln
https://ift.tt/3xoEBEU
Submitted June 15, 2021 at 03:07PM by syncikin
via reddit https://ift.tt/3gvJFln
Iosiro
Critical Bug Identified in 88mph Awarded with $42,069 Bounty | iosiro
iosiro identified a critical bug in the fixed-interest-rate lending protocol 88mph. The bug was reported to 88mph through Immunefi for a bounty of $42,069. This blog post details the bug and the disclosure process.
Three investigation Workflows to reduce FALSE POSITIVE ALERTS - AWS; OKTA; CYREN
https://ift.tt/2U8Awq3
Submitted June 15, 2021 at 05:35PM by Sayag_Security
via reddit https://ift.tt/3gEa4MF
https://ift.tt/2U8Awq3
Submitted June 15, 2021 at 05:35PM by Sayag_Security
via reddit https://ift.tt/3gEa4MF
www.hunters.ai
Three Investigation Flows to Reduce Your False-Positive Alerts
Threat investigation methods the SOC can use to deal with stolen AWS credential, Okta SuperHuman activity, phishing attempts and malicious email alerts.
Adversary emulation with Prelude Operator and Elastic Security
https://ift.tt/3xlzZPP
Submitted June 15, 2021 at 06:12PM by sthompsonline
via reddit https://ift.tt/2TvABnh
https://ift.tt/3xlzZPP
Submitted June 15, 2021 at 06:12PM by sthompsonline
via reddit https://ift.tt/2TvABnh
Elastic Blog
Adversary emulation with Prelude Operator and Elastic Security
At Elastic, we’ve been working closely with the team at Prelude to help security teams of all skill levels, arming all analysts and red teams alike. Learn how teams can use Prelude Operator in conjunc...
Finding Privilege Escalation Vulnerabilities in Windows using Process Monitor
https://ift.tt/2SoWYKP
Submitted June 15, 2021 at 10:45PM by sanitybit
via reddit https://ift.tt/3zvR5ME
https://ift.tt/2SoWYKP
Submitted June 15, 2021 at 10:45PM by sanitybit
via reddit https://ift.tt/3zvR5ME
RetroArch for Windows - Versions 1.9.0 - 1.9.4 (High-Risk Vuln)
https://ift.tt/3gF7fuN
Submitted June 15, 2021 at 11:03PM by breach_house
via reddit https://ift.tt/2S1Etw2
https://ift.tt/3gF7fuN
Submitted June 15, 2021 at 11:03PM by breach_house
via reddit https://ift.tt/2S1Etw2