Hi guys, we found a critical vulnerability (use after free in GPU) in Google Chrome. Google rewarded us $6K for it. We shared the story on how we found it from the blog post. Also, you can find the github repository if you want to check that out. Let me know your thoughts under here please!
https://ift.tt/3B2clcA
Submitted October 23, 2021 at 06:58PM by bige-b
via reddit https://ift.tt/3BjQjSV
https://ift.tt/3B2clcA
Submitted October 23, 2021 at 06:58PM by bige-b
via reddit https://ift.tt/3BjQjSV
SecurityForEveryone.com
Google Chrome Vulnerability Worth for $6K: Use After Free (CVE-2021-30573)
As the S4E team, we found the use after free vulnerability that we detected in the latest version of Google Chrome. Although we focus on customer feedback on our products in the early stage of our startup, we conduct various vulnerability studies and challenging…
ua-parser-js package compromised in supply chain attack
https://ift.tt/3prpARZ
Submitted October 24, 2021 at 12:00AM by tombob51
via reddit https://ift.tt/3GjuIh8
https://ift.tt/3prpARZ
Submitted October 24, 2021 at 12:00AM by tombob51
via reddit https://ift.tt/3GjuIh8
Hackaday
Supply Chain Attack: NPM Library Used By Facebook And Others Was Compromised
Here at Hackaday we love the good kinds of hacks, but now and then we need to bring up a less good kind. Today it was learned that the NPM package ua-parser-js was compromised, and any software usi…
Microsoft no longer signs Windows drivers for Process Hacker
https://ift.tt/3pu7Yoo
Submitted October 24, 2021 at 02:13PM by Titokhan
via reddit https://ift.tt/2Zm7rdu
https://ift.tt/3pu7Yoo
Submitted October 24, 2021 at 02:13PM by Titokhan
via reddit https://ift.tt/2Zm7rdu
EFF's Short Wordlist #2, but it's reformatted to be easier to print and use!
https://ift.tt/3mkVHhe
Submitted October 25, 2021 at 01:30AM by saeky
via reddit https://ift.tt/2XGdXuZ
https://ift.tt/3mkVHhe
Submitted October 25, 2021 at 01:30AM by saeky
via reddit https://ift.tt/2XGdXuZ
Google Docs
printable EFF's short wordlist #2.pdf
Abusing Public Infrastructure to Build Your Own VirusTotal for Email: An Open-Source Secure Email Gateway Evaluation Toolkit
https://ift.tt/3EgMTCd
Submitted October 25, 2021 at 07:18AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GhPddV
https://ift.tt/3EgMTCd
Submitted October 25, 2021 at 07:18AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GhPddV
GitHub
GitHub - Rices/Phishious: An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers. - GitHub - Rices/Phishious: An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-team...
GitLab CE CVE-2021-22205 in the wild
https://ift.tt/3jygrDv
Submitted October 25, 2021 at 12:56PM by 0xdea
via reddit https://ift.tt/3GiCY0J
https://ift.tt/3jygrDv
Submitted October 25, 2021 at 12:56PM by 0xdea
via reddit https://ift.tt/3GiCY0J
HN Security
GitLab CE CVE-2021-22205 in the wild - HN Security
A few months ago one of our customers found two suspicious user accounts with admin rights on its Internet-exposed GitLab […]
Digital banking fraud: how the Gozi malware works
https://ift.tt/3juTNvp
Submitted October 25, 2021 at 02:11PM by f3d_0x0
via reddit https://ift.tt/3B9SFDB
https://ift.tt/3juTNvp
Submitted October 25, 2021 at 02:11PM by f3d_0x0
via reddit https://ift.tt/3B9SFDB
Cleafy
Digital banking fraud: how the Gozi malware works
Read the Technical Analysis of the Gozi malware family, and discover how is used on digital banking fraud.
Microsoft no Longer Signs Windows Drivers for Process Hacker
https://ift.tt/3pu7Yoo
Submitted October 25, 2021 at 05:12PM by hotway521
via reddit https://ift.tt/3pA8NMz
https://ift.tt/3pu7Yoo
Submitted October 25, 2021 at 05:12PM by hotway521
via reddit https://ift.tt/3pA8NMz
PHP-FPM (PHP's FastCGI server) local root vulnerability (NGINX, Apache)
https://ift.tt/3ChTJXq
Submitted October 25, 2021 at 06:17PM by cfambionics
via reddit https://ift.tt/3jA47Cy
https://ift.tt/3ChTJXq
Submitted October 25, 2021 at 06:17PM by cfambionics
via reddit https://ift.tt/3jA47Cy
Ambionics
PHP-FPM local root vulnerability (CVE-2021-21703)
This article reveals a privilege escalation vulnerability affecting PHP-FPM.
A Primer for Testing the Security of GraphQL APIs
https://ift.tt/3EftHoc
Submitted October 25, 2021 at 08:39PM by alxjsn
via reddit https://ift.tt/3CcCTcA
https://ift.tt/3EftHoc
Submitted October 25, 2021 at 08:39PM by alxjsn
via reddit https://ift.tt/3CcCTcA
Forces Unseen Blog
A Primer for Testing the Security of GraphQL APIs — Forces Unseen Blog
Whether you're a penetration tester, security engineer, or bug bounty hunter, it can be incredibly helpful to know how to find vulnerabil...
I put a WiFi router into a phone charger (Final Post)
https://ift.tt/3mfhxFM
Submitted October 26, 2021 at 06:12AM by Machinehum
via reddit https://ift.tt/3EfleRZ
https://ift.tt/3mfhxFM
Submitted October 26, 2021 at 06:12AM by Machinehum
via reddit https://ift.tt/3EfleRZ
Medium
I put a WiFi router into a phone charger (Final Post)
This is the fifth and final installment about designing a WiFi router into a phone charger for security, pentesting and red teaming; (part…
Double spending bug in Polygon’s Plasma bridge
https://ift.tt/3b9e1qf
Submitted October 26, 2021 at 11:02AM by Gallus
via reddit https://ift.tt/3bd8y1r
https://ift.tt/3b9e1qf
Submitted October 26, 2021 at 11:02AM by Gallus
via reddit https://ift.tt/3bd8y1r
Medium
Double spending bug in Polygon’s Plasma bridge
I thought I was out of the security game for a while now and that my interests have moved on to other fields. Last week I came back from an…
Chrome Ad-Heavy detection mechanism: How it can be bypassed and allow ads that are breaching the restrictions imposed by Chrome to still run
https://ift.tt/3GmznyH
Submitted October 26, 2021 at 01:37PM by SSDisclosure
via reddit https://ift.tt/3Ba4Sbz
https://ift.tt/3GmznyH
Submitted October 26, 2021 at 01:37PM by SSDisclosure
via reddit https://ift.tt/3Ba4Sbz
SSD Secure Disclosure
SSD Advisory – Chrome Ad Heavy Bypass (via SharedWorker) - SSD Secure Disclosure
Find out how a vulnerability in macOS Finder system allows remote attackers to trick users into running arbitrary commands.
Advanced HTTP(/2) Request Smuggling
https://ift.tt/3Eje7Ic
Submitted October 26, 2021 at 07:25PM by albinowax
via reddit https://ift.tt/3jDhthu
https://ift.tt/3Eje7Ic
Submitted October 26, 2021 at 07:25PM by albinowax
via reddit https://ift.tt/3jDhthu
portswigger.net
Advanced request smuggling | Web Security Academy
In this section, we'll build on the concepts you've learned so far and teach you some more advanced HTTP request smuggling techniques. We'll also cover a ...
How I Cracked 70% of Tel Aviv’s Wifi Networks (from a Sample of 5,000 Gathered WiFi).
https://ift.tt/3nzQBAd
Submitted October 27, 2021 at 12:03AM by jat0369
via reddit https://ift.tt/3bemrwo
https://ift.tt/3nzQBAd
Submitted October 27, 2021 at 12:03AM by jat0369
via reddit https://ift.tt/3bemrwo
Cyberark
Cracking WiFi at Scale with One Simple Trick
How I Cracked 70% of Tel Aviv’s Wifi Networks (from a Sample of 5,000 Gathered WiFi). In the past seven years that I’ve lived in Tel Aviv, I’ve changed apartments four times. Every time I...
The Top 13 Ethical Hacking Courses on Udemy (2021)
https://ift.tt/3fFqPY7
Submitted October 27, 2021 at 01:09AM by Jan_Prince
via reddit https://ift.tt/3jGT5vr
https://ift.tt/3fFqPY7
Submitted October 27, 2021 at 01:09AM by Jan_Prince
via reddit https://ift.tt/3jGT5vr
Pythonstacks
The Top 13 Ethical Hacking Courses on Udemy (2022)
Gain robust hacking skills with these courses.
A reverse engineering challenge I created, who can solve it? I'll list you in the hall of fame
https://ift.tt/3md7wJg
Submitted October 27, 2021 at 01:01AM by vowie92
via reddit https://ift.tt/3BfOMgA
https://ift.tt/3md7wJg
Submitted October 27, 2021 at 01:01AM by vowie92
via reddit https://ift.tt/3BfOMgA
Reverse Engineering Challenge MMXI | CYTRES
This reverse engineering challenge is about obtaining the password of the targetapplication.Download the the bundle (Windows / Linux / MacOS): https://cytres.com/re_mmxi.zipIf you solved the challenge, apply your solution to info@cytres.comHall of fame:1.…
On code isolation in Python!
https://ift.tt/3kyZzec
Submitted October 27, 2021 at 04:58AM by montanababy62
via reddit https://ift.tt/3Ciq4NH
https://ift.tt/3kyZzec
Submitted October 27, 2021 at 04:58AM by montanababy62
via reddit https://ift.tt/3Ciq4NH
Artem Golubin
On code isolation in Python
On why It's not possible to isolate Python code when running it in the same interpreter
Cisco Cert Giveaway
https://ift.tt/3BhJwsL
Submitted October 27, 2021 at 05:31AM by rockintrix
via reddit https://ift.tt/3nu8ekU
https://ift.tt/3BhJwsL
Submitted October 27, 2021 at 05:31AM by rockintrix
via reddit https://ift.tt/3nu8ekU
Cisco
Cybersecurity Giveaway
Calling all Cyber Defenders. Enter our Cybersecurity Giveaway now for your chance to win a training and exam bundle to get you ready for either Cisco Certified CyberOps Associate, CyberOps Professional or CCNP Security certifications.
How to exploit a double free vulnerability in 2021
https://ift.tt/3GoU9hh
Submitted October 27, 2021 at 03:03PM by vonadz
via reddit https://ift.tt/3Bgqpzb
https://ift.tt/3GoU9hh
Submitted October 27, 2021 at 03:03PM by vonadz
via reddit https://ift.tt/3Bgqpzb
GitHub
GitHub - stong/how-to-exploit-a-double-free: How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies'
How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies' - GitHub - stong/how-to-exploit-a-double-free: How to exploit a double free vulnerability in 2021. &...
Container security best practices: Comprehensive guide
https://ift.tt/3mQV5Sq
Submitted October 27, 2021 at 07:57PM by MiguelHzBz
via reddit https://ift.tt/3BmOGDP
https://ift.tt/3mQV5Sq
Submitted October 27, 2021 at 07:57PM by MiguelHzBz
via reddit https://ift.tt/3BmOGDP
Sysdig
Container security best practices: Comprehensive guide – Sysdig
Container security best practices include the full component stack used for building, distributing, and specifically executing the container.