How Windows Processes Work - CreateProcess Workflow (Part 2)
https://ift.tt/alR9jeQ
Submitted July 16, 2022 at 10:49PM by sciencestudent99
via reddit https://ift.tt/fXCzL0y
https://ift.tt/alR9jeQ
Submitted July 16, 2022 at 10:49PM by sciencestudent99
via reddit https://ift.tt/fXCzL0y
FourCore
Genesis - The Birth of a Windows Process (Part 2) - FourCore
What happens when you run an executable on your Windows machine? In this second and final part of the series, we will go through the exact flow CreateProcess carries out to launch a process on Windows.
Build your first LLVM Obfuscator
https://ift.tt/zoBuEWT
Submitted July 17, 2022 at 03:59PM by CyberMasterV
via reddit https://ift.tt/a8Ev3Hj
https://ift.tt/zoBuEWT
Submitted July 17, 2022 at 03:59PM by CyberMasterV
via reddit https://ift.tt/a8Ev3Hj
Medium
Build your first LLVM Obfuscator
Welcome to a tutorial on building your first LLVM based obfuscator. In this post we will list the advantages of using LLVM tools, briefly…
GitHub - karimhabush/cyberowl: A daily updated summary of the most frequent types of security incidents currently being reported from different sources.
https://ift.tt/dDkHIQL
Submitted July 17, 2022 at 07:32PM by karimhabush
via reddit https://ift.tt/GY1iNV7
https://ift.tt/dDkHIQL
Submitted July 17, 2022 at 07:32PM by karimhabush
via reddit https://ift.tt/GY1iNV7
GitHub
GitHub - karimhabush/cyberowl: A daily updated summary of the most frequent types of security incidents currently being reported…
A daily updated summary of the most frequent types of security incidents currently being reported from different sources. - GitHub - karimhabush/cyberowl: A daily updated summary of the most freque...
A Deep Dive Into ALPHV/BlackCat Ransomware
https://ift.tt/fiwKnVb
Submitted July 18, 2022 at 07:39PM by CyberMasterV
via reddit https://ift.tt/eIYw1dB
https://ift.tt/fiwKnVb
Submitted July 18, 2022 at 07:39PM by CyberMasterV
via reddit https://ift.tt/eIYw1dB
SecurityScorecard
A Deep Dive Into ALPHV/BlackCat Ransomware
ALPHV/BlackCat is the first widely known ransomware written in Rust. The malware must run with an access token consisting of a 32-byte value (--access-token parameter), and other parameters can be specified. Learn about its particular behaviors.
Research: Auditing WordPress Plugins (35 CVEs in 3 months)
https://ift.tt/K9Zj2ym
Submitted July 18, 2022 at 06:52PM by andersonmvd
via reddit https://ift.tt/hXg9CWc
https://ift.tt/K9Zj2ym
Submitted July 18, 2022 at 06:52PM by andersonmvd
via reddit https://ift.tt/hXg9CWc
cyllective Blog
Research: Auditing WordPress Plugins
A summarized post about security research of WordPress plugins and the explorational audit spree which followed.
unRAR CVE-2022-30333 deep dive (including full exploit for Zimbra)
https://ift.tt/Ywy1q3L
Submitted July 18, 2022 at 10:30PM by iagox86
via reddit https://ift.tt/4rWzVGy
https://ift.tt/Ywy1q3L
Submitted July 18, 2022 at 10:30PM by iagox86
via reddit https://ift.tt/4rWzVGy
AttackerKB
CVE-2022-30333 | AttackerKB
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a…
Disrupting Kill Chains with Just-in-Time Access Environments
https://ift.tt/PDTvYm8
Submitted July 18, 2022 at 09:54PM by mesok8
via reddit https://ift.tt/kuxc65m
https://ift.tt/PDTvYm8
Submitted July 18, 2022 at 09:54PM by mesok8
via reddit https://ift.tt/kuxc65m
Akeyless
Disrupting the Kill Chain with Just-in-Time Access | Akeyless
The classic perimeter concept evolved to focus on identities, so will our use of secrets. By virtually eliminating the long time window an attacker gets with compromised static secrets, dynamic secrets severely limit an attacker’s ability to maintain access…
/r/netsec's Q3 2022 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 18, 2022 at 11:21PM by ranok
via reddit https://ift.tt/Du9mpl4
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 18, 2022 at 11:21PM by ranok
via reddit https://ift.tt/Du9mpl4
new privesc on AWS (DataScientist policy)
https://ift.tt/stlRCkS
Submitted July 19, 2022 at 02:00AM by stk_
via reddit https://ift.tt/GxXfErQ
https://ift.tt/stlRCkS
Submitted July 19, 2022 at 02:00AM by stk_
via reddit https://ift.tt/GxXfErQ
chip-red-pill/MicrocodeDecryptor - understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies
https://ift.tt/UuPEkdr
Submitted July 19, 2022 at 07:13AM by Gallus
via reddit https://ift.tt/ve0IupO
https://ift.tt/UuPEkdr
Submitted July 19, 2022 at 07:13AM by Gallus
via reddit https://ift.tt/ve0IupO
GitHub
GitHub - chip-red-pill/MicrocodeDecryptor
Contribute to chip-red-pill/MicrocodeDecryptor development by creating an account on GitHub.
EJS, Server side template injection RCE (CVE-2022-29078)
https://ift.tt/2EmBV0e
Submitted July 19, 2022 at 07:10AM by Gallus
via reddit https://ift.tt/V5sYODi
https://ift.tt/2EmBV0e
Submitted July 19, 2022 at 07:10AM by Gallus
via reddit https://ift.tt/V5sYODi
Eslam Salem blog
EJS, Server side template injection RCE (CVE-2022-29078) - writeup
Note: The objective of this research or any similar researches is to improve the nodejs ecosystem security level.
Recently i was working on a related project using one of the most popular Nodejs templating engines Embedded JavaScript templates - EJS
In my…
Recently i was working on a related project using one of the most popular Nodejs templating engines Embedded JavaScript templates - EJS
In my…
The Workings of Whatsapp's Backups (and why you should enable End-to-End Encrypted Backups)
https://ift.tt/obie6c7
Submitted July 19, 2022 at 05:45PM by IceCereal
via reddit https://ift.tt/92kYKB1
https://ift.tt/obie6c7
Submitted July 19, 2022 at 05:45PM by IceCereal
via reddit https://ift.tt/92kYKB1
sudneela.github.io
The Workings of Whatsapp's Backups (and why you should enable End-to-End Encrypted Backups)
About This Blog Post This blog post is a technical report of a presentation that I presented on June 10, 2022 for the second task of my Mobile Security course. I decided to investigate how WhatsApp backs up messages to the cloud with the “end-to-end encrypted…
Writeup for Pwn2Own Miami 2022: OPC UA .NET Standard Trusted Application Check Bypass
https://ift.tt/WE2Hw5k
Submitted July 19, 2022 at 10:21PM by xnyhps
via reddit https://ift.tt/0GOkSlm
https://ift.tt/WE2Hw5k
Submitted July 19, 2022 at 10:21PM by xnyhps
via reddit https://ift.tt/0GOkSlm
sector7.computest.nl
Pwn2Own Miami 2022: OPC UA .NET Standard Trusted Application Check Bypass
This write-up is part 1 of a series of write-ups about the 5 vulnerabilities we demonstrated last April at Pwn2Own Miami. This is the write-up for the Trusted Application Check Bypass in the OPC Foundation’s OPC UA .NET Standard.
Session On Android – An App Wrapped in Signal
https://ift.tt/4XRJoSz
Submitted July 20, 2022 at 10:38AM by jeandrew
via reddit https://ift.tt/vBonAT8
https://ift.tt/4XRJoSz
Submitted July 20, 2022 at 10:38AM by jeandrew
via reddit https://ift.tt/vBonAT8
The Binary Hick
Session On Android – An App Wrapped in Signal
NOTE: parts of this article describe steps by which the order of encryption methods are reversed to render encrypted data in clear-text. This was done in order to investigate the app being discusse…
Microsoft Azure Arc Logging Passwords in Plaintext
https://ift.tt/Mh1R2oe
Submitted July 19, 2022 at 07:47PM by dinobyt3s
via reddit https://ift.tt/oRq9WjO
https://ift.tt/Mh1R2oe
Submitted July 19, 2022 at 07:47PM by dinobyt3s
via reddit https://ift.tt/oRq9WjO
Medium
Logging Passwords in Plaintext in Azure Arc
Microsoft’s Azure Arc is a management platform designed to bridge multi-cloud and similarly mixed environments together in a convenient…
Building a process to evaluate security tools
https://ift.tt/SXfBs8g
Submitted July 18, 2022 at 09:03PM by LivingInSyn
via reddit https://ift.tt/tYP8fQi
https://ift.tt/SXfBs8g
Submitted July 18, 2022 at 09:03PM by LivingInSyn
via reddit https://ift.tt/tYP8fQi
DEV Community 👩💻👨💻
Evaluating Security Tools
a sample security tool testing procedure
DNS-over-HTTP/3 in Android
https://ift.tt/SQ8Us4M
Submitted July 20, 2022 at 03:12PM by SeanPesce
via reddit https://ift.tt/R90pyj1
https://ift.tt/SQ8Us4M
Submitted July 20, 2022 at 03:12PM by SeanPesce
via reddit https://ift.tt/R90pyj1
Google Online Security Blog
DNS-over-HTTP/3 in Android
Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. I...
Cloud is more fun with an SSRF
https://ift.tt/AEH39IU
Submitted July 20, 2022 at 03:00PM by Ancient_Title_1860
via reddit https://ift.tt/X8Blrbv
https://ift.tt/AEH39IU
Submitted July 20, 2022 at 03:00PM by Ancient_Title_1860
via reddit https://ift.tt/X8Blrbv
[CVE-2022-34918] A crack in the Linux firewall
https://ift.tt/V1e5W4I
Submitted July 20, 2022 at 08:39PM by gquere
via reddit https://ift.tt/GYH9Tlf
https://ift.tt/V1e5W4I
Submitted July 20, 2022 at 08:39PM by gquere
via reddit https://ift.tt/GYH9Tlf
www.randorisec.fr
[CVE-2022-34918] A crack in the Linux firewall
RandoriSec Offensive Security
Multiple Vulnerabilities in Atlassian Products
https://ift.tt/zqfAt81
Submitted July 21, 2022 at 12:22AM by sullivanmatt
via reddit https://ift.tt/nVjzuio
https://ift.tt/zqfAt81
Submitted July 21, 2022 at 12:22AM by sullivanmatt
via reddit https://ift.tt/nVjzuio
Bug Alert
Bug Alert: Multiple Vulnerabilities in Atlassian Products (CVE-2022-26136, CVE-2022-26137, CVE-2022-26138)
Multiple Vulnerabilities have been disclosed in Atlassian Products. A hardcoded credential vulnerability in Questions for Confluence, and Servlet Filter Bypass Vulnerabilities have been found in multiple Atlassian products that may enable Authentication Bypasses…
Django web applications with enabled Debug Mode, DB accounts information and API Keys of more than 3,100 applications were exposed on internet.
https://ift.tt/b8CGA6q
Submitted July 21, 2022 at 10:51AM by zwrinerlucas
via reddit https://ift.tt/EhxuiAr
https://ift.tt/b8CGA6q
Submitted July 21, 2022 at 10:51AM by zwrinerlucas
via reddit https://ift.tt/EhxuiAr
CIP Blog
API Key, a Key to Credential Leakage & Manipulation
Upon searching for Django web applications with enabled Debug Mode on Criminal IP (https://www.criminalip.io/), Database (hereinafter referred to as DB) accounts information and API Keys of more than 3,100 applications were found to be exposed on the internet.…