How to catch NSO Group’s Pegasus
https://ift.tt/2UUMUu2
Submitted July 18, 2021 at 09:59PM by DonnchaOC
via reddit https://ift.tt/3ind1lp
https://ift.tt/2UUMUu2
Submitted July 18, 2021 at 09:59PM by DonnchaOC
via reddit https://ift.tt/3ind1lp
Amnesty International
Forensic Methodology Report: How to catch NSO Group’s Pegasus
NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus…
RCE vulnerability in TIBCO Data Virtualization
https://ift.tt/36HdA3Z
Submitted July 18, 2021 at 11:34PM by Nervous_Sort_2840
via reddit https://ift.tt/3ewbHLM
https://ift.tt/36HdA3Z
Submitted July 18, 2021 at 11:34PM by Nervous_Sort_2840
via reddit https://ift.tt/3ewbHLM
GitHub
PoC/tibco_tdv_rce.md at master · pedrib/PoC
Advisories, proof of concept files and exploits that have been made public by @pedrib. - PoC/tibco_tdv_rce.md at master · pedrib/PoC
Free Resources | SimplyCyber
https://ift.tt/3hKo3SO
Submitted July 19, 2021 at 01:23AM by netfortius
via reddit https://ift.tt/3wOUvaL
https://ift.tt/3hKo3SO
Submitted July 19, 2021 at 01:23AM by netfortius
via reddit https://ift.tt/3wOUvaL
SimplyCyber
Free Resources | SimplyCyber
free cyber resources from around the internet
MVT is a forensic tool to look for signs of infection in smartphone devices
https://ift.tt/3ewB9Rx
Submitted July 19, 2021 at 05:45AM by binaryfor
via reddit https://ift.tt/36MkRQ5
https://ift.tt/3ewB9Rx
Submitted July 19, 2021 at 05:45AM by binaryfor
via reddit https://ift.tt/36MkRQ5
GitHub
GitHub - mvt-project/mvt: MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find…
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise. - mvt-project/mvt
Massive data leak reveals Israeli NSO group's spyware used to target activists and journalists
https://ift.tt/36K65JL
Submitted July 19, 2021 at 09:41AM by iamsaadb
via reddit https://ift.tt/2UrDzdp
https://ift.tt/36K65JL
Submitted July 19, 2021 at 09:41AM by iamsaadb
via reddit https://ift.tt/2UrDzdp
BS+
Massive data leak reveals Israeli NSO group's spyware used to target activists and journalists
NSO Group’s spyware has been used to commit human rights violations around the world on a massive scale, according to a major investigation into the leak of 50,000 phone numbers of potential surveillance targets. These include heads of state, activists, civilians…
HelloKitty - previously patched ransomware targeting vulnerable SonicWall devices alerted by CISA | Secure Blink
https://ift.tt/3xR3Q3k
Submitted July 19, 2021 at 02:37PM by vishalthevaxus
via reddit https://ift.tt/3ze3xzE
https://ift.tt/3xR3Q3k
Submitted July 19, 2021 at 02:37PM by vishalthevaxus
via reddit https://ift.tt/3ze3xzE
Secureblink
HelloKitty - previously patched ransomware targeting vulnerable SonicWall devices alerted by CISA
HelloKitty group targeting "a known, previously patched, vulnerability" SonicWall Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products with end-of-life firmware reported by CISA...
ETS5, configuration software for KNX devices, uses a hard-coded key to encrypt project information
https://ift.tt/3io4BKv
Submitted July 19, 2021 at 05:23PM by robertguetzkow
via reddit https://ift.tt/3rifP7D
https://ift.tt/3io4BKv
Submitted July 19, 2021 at 05:23PM by robertguetzkow
via reddit https://ift.tt/3rifP7D
GitHub
GitHub - robertguetzkow/ets5-password-recovery: ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
ETS5 Password Recovery Tool is a PoC for CVE-2021-36799 - robertguetzkow/ets5-password-recovery
Spyware successfully broke into journalists' iPhones by sending iMessages that didn't even need to be read
https://ift.tt/3wJBLcQ
Submitted July 19, 2021 at 06:45PM by Akid0uu
via reddit https://ift.tt/3BfDKJk
https://ift.tt/3wJBLcQ
Submitted July 19, 2021 at 06:45PM by Akid0uu
via reddit https://ift.tt/3BfDKJk
Business Insider
Spyware successfully broke into journalists' iPhones by sending iMessages that didn't even need to be read
Amnesty International said its analysis indicates all current iPhone models and iOS versions are vulnerable to attack by NSO Group's software.
Artwork Archive in Data Breach after discovery of misconfigured AWS S3 Bucket leaked 421 GB of data, affecting 7K customers | Secure Blink
https://ift.tt/3eyyOW8
Submitted July 19, 2021 at 07:24PM by vishalthevaxus
via reddit https://ift.tt/3exHxYN
https://ift.tt/3eyyOW8
Submitted July 19, 2021 at 07:24PM by vishalthevaxus
via reddit https://ift.tt/3exHxYN
Secure Blink
Artwork Archive in Data Breach after discovery of misconfigured AWS S3 Bucket leaked 421 GB of data, affecting 7K customers | Secure…
Artwork Archives 421GB data including names, email, & sales agreements were compromised after IT security researchers from WizCase discovered a misconfigured AWS S3 Bucket affecting 7K customers...
Http request smuggling vulnerability scanner
https://ift.tt/3Bi2YGY
Submitted July 19, 2021 at 09:28PM by sh1yo_
via reddit https://ift.tt/36LzB1H
https://ift.tt/3Bi2YGY
Submitted July 19, 2021 at 09:28PM by sh1yo_
via reddit https://ift.tt/36LzB1H
GitHub
GitHub - Sh1Yo/request_smuggler: Http request smuggling vulnerability scanner
Http request smuggling vulnerability scanner. Contribute to Sh1Yo/request_smuggler development by creating an account on GitHub.
FickerStealer: A New Rust Player in the Market
https://ift.tt/3kxbT1p
Submitted July 19, 2021 at 10:38PM by jat0369
via reddit https://ift.tt/3xUH7Dp
https://ift.tt/3kxbT1p
Submitted July 19, 2021 at 10:38PM by jat0369
via reddit https://ift.tt/3xUH7Dp
Cyberark
FickerStealer: A New Rust Player in the Market
This blog introduces a new information stealer, written in Rust and interestingly named FickerStealer. In this blog post, we provide an in-depth analysis of this new threat and its obfuscation...
I’m putting a WiFi router into a wall charger (Part 2)
https://ift.tt/3BcSLeS
Submitted July 20, 2021 at 02:10AM by Machinehum
via reddit https://ift.tt/3hQ0qrP
https://ift.tt/3BcSLeS
Submitted July 20, 2021 at 02:10AM by Machinehum
via reddit https://ift.tt/3hQ0qrP
Medium
I’m putting a WiFi router into a wall charger (Part 2)
This is the third part of a blog about putting a WiFi router into a phone charger; (see part zero here, see part one here) and feel free to…
Beaconator: A beacon generator using Cobalt Strike and PEzor.
https://ift.tt/3wQZvvH
Submitted July 20, 2021 at 02:32PM by CaptMeelo
via reddit https://ift.tt/3kHiiat
https://ift.tt/3wQZvvH
Submitted July 20, 2021 at 02:32PM by CaptMeelo
via reddit https://ift.tt/3kHiiat
GitHub
GitHub - capt-meelo/Beaconator: A beacon generator using Cobalt Strike and a variety of tools.
A beacon generator using Cobalt Strike and a variety of tools. - GitHub - capt-meelo/Beaconator: A beacon generator using Cobalt Strike and a variety of tools.
Cyberdefenders.org PacketMaze Challenge: Part 2 Wireshark Pcap analysis
https://ift.tt/3wMmhVq
Submitted July 20, 2021 at 05:37PM by thatmemforensicsguy
via reddit https://ift.tt/3eytfqD
https://ift.tt/3wMmhVq
Submitted July 20, 2021 at 05:37PM by thatmemforensicsguy
via reddit https://ift.tt/3eytfqD
Pegasus: eine Kompromittierung von Android- und iOS-Geräten erkennen
https://ift.tt/3kyF7Nm
Submitted July 20, 2021 at 07:20PM by JSilverhandSamurai
via reddit https://ift.tt/3BjAgFI
https://ift.tt/3kyF7Nm
Submitted July 20, 2021 at 07:20PM by JSilverhandSamurai
via reddit https://ift.tt/3BjAgFI
Tarnkappe.info
Pegasus: eine Kompromittierung von Android- und iOS-Geräten erkennen
Pegasus auf der Spur – mit dem Mobile Verification Toolkit (MVT) von Amnesty International, kann man die Spionage-Software nachweisen.
Sequoia: A Local Privilege Escalation Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909) | Qualys Security Blog
https://ift.tt/3kyfRa1
Submitted July 20, 2021 at 07:14PM by ghost-train
via reddit https://ift.tt/3Bm3rYC
https://ift.tt/3kyfRa1
Submitted July 20, 2021 at 07:14PM by ghost-train
via reddit https://ift.tt/3Bm3rYC
Qualys Security Blog
Sequoia: A Local Privilege Escalation Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909) | Qualys Security Blog
The Qualys Research Team has discovered a size_t-to-int type conversion vulnerability in the Linux Kernel’s filesystem layer affecting most Linux operating systems. Any unprivileged user can gain root…
CVE-2021-3438: 16 Years In Hiding - Millions of Printers Worldwide Vulnerable
https://ift.tt/3wUIGQi
Submitted July 20, 2021 at 09:14PM by Cyberthere
via reddit https://ift.tt/3xXcxcu
https://ift.tt/3wUIGQi
Submitted July 20, 2021 at 09:14PM by Cyberthere
via reddit https://ift.tt/3xXcxcu
SentinelOne
CVE-2021-3438: 16 Years In Hiding - Millions of Printers Worldwide Vulnerable - SentinelLabs
A high severity flaw in HP, Samsung and Xerox printer drivers has existed since 2005 and could lead to an escalation of privilege.
Some not so common information about netcat and some nice uses
https://ift.tt/3iyJ6H9
Submitted July 20, 2021 at 10:30PM by ikuamike
via reddit https://ift.tt/2UsI7A4
https://ift.tt/3iyJ6H9
Submitted July 20, 2021 at 10:30PM by ikuamike
via reddit https://ift.tt/2UsI7A4
blog.ikuamike.io
Netcat - All you need to know
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how…
A case against security nihilism
https://ift.tt/36MN1dZ
Submitted July 21, 2021 at 12:46AM by feross
via reddit https://ift.tt/36L7H66
https://ift.tt/36MN1dZ
Submitted July 21, 2021 at 12:46AM by feross
via reddit https://ift.tt/36L7H66
A Few Thoughts on Cryptographic Engineering
A case against security nihilism
This week a group of global newspapers is running a series of articles detailing abuses of NSO Group’s Pegasus spyware. If you haven’t seen any of these articles, they’re worth re…
/r/netsec's Q3 2021 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 21, 2021 at 12:37AM by ranok
via reddit https://ift.tt/2UteUVG
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 21, 2021 at 12:37AM by ranok
via reddit https://ift.tt/2UteUVG
How to achieve enterprise-grade attack-surface monitoring with open source software
https://ift.tt/3zgq1QL
Submitted July 21, 2021 at 11:19AM by hakluke
via reddit https://ift.tt/3zkQnRK
https://ift.tt/3zgq1QL
Submitted July 21, 2021 at 11:19AM by hakluke
via reddit https://ift.tt/3zkQnRK
HΔKLUKΞ
How to achieve enterprise-grade attack-surface monitoring with open source software
How to achieve enterprise-grade attack-surface monitoring with open source software: SpiderFoot, bash, curl and cronjobs can go a long way.