Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion (Part 2)
https://ift.tt/i9f4yZ0
Submitted August 25, 2022 at 12:49PM by sanitybit
via reddit https://ift.tt/jOwvtY4
https://ift.tt/i9f4yZ0
Submitted August 25, 2022 at 12:49PM by sanitybit
via reddit https://ift.tt/jOwvtY4
bohops
Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion (Part 2)
Introduction Last year, I blogged about Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion. In that part 1 post, we covered: The purpose of .NET Usage Logs and when they are crea…
Cherrybomb: OAS file auditor and API scanner just released version v0.7.0! would love input for more scans to implement
https://ift.tt/W2PjCeJ
Submitted August 24, 2022 at 10:35PM by RazCherrybomb
via reddit https://ift.tt/lAS1iMJ
https://ift.tt/W2PjCeJ
Submitted August 24, 2022 at 10:35PM by RazCherrybomb
via reddit https://ift.tt/lAS1iMJ
GitHub
GitHub - blst-security/cherrybomb: Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour…
Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests. - GitHub - blst-secu...
2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3
https://ift.tt/3AVcabz
Submitted August 25, 2022 at 04:37PM by PierreKimSec
via reddit https://ift.tt/lDBydzi
https://ift.tt/3AVcabz
Submitted August 25, 2022 at 04:37PM by PierreKimSec
via reddit https://ift.tt/lDBydzi
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone - Microsoft Security Blog
https://ift.tt/KqmAvE0
Submitted August 25, 2022 at 07:50PM by gid0rah
via reddit https://ift.tt/S1XYKnj
https://ift.tt/KqmAvE0
Submitted August 25, 2022 at 07:50PM by gid0rah
via reddit https://ift.tt/S1XYKnj
Microsoft Security Blog
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone - Microsoft Security Blog
Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.
IAM Whoever I Say IAM :: Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit
https://ift.tt/eMwWtD6
Submitted August 25, 2022 at 08:10PM by albinowax
via reddit https://ift.tt/BYM5ihZ
https://ift.tt/eMwWtD6
Submitted August 25, 2022 at 08:10PM by albinowax
via reddit https://ift.tt/BYM5ihZ
srcincite.io
IAM Whoever I Say IAM :: Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit
On March 2nd, I reported several security vulnerabilities to VMWare impacting their Identity Access Management (IAM) solution. In this blog post I will discu...
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus
https://ift.tt/xDNydvt
Submitted August 25, 2022 at 08:07PM by CyberMasterV
via reddit https://ift.tt/s7QjWkg
https://ift.tt/xDNydvt
Submitted August 25, 2022 at 08:07PM by CyberMasterV
via reddit https://ift.tt/s7QjWkg
Trend Micro
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus
We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.
Free SANS Workshop: Building an Azure Pentest Lab for Red Teams
https://ift.tt/BspgELq
Submitted August 25, 2022 at 11:29PM by sanitybit
via reddit https://ift.tt/uxjAtbg
https://ift.tt/BspgELq
Submitted August 25, 2022 at 11:29PM by sanitybit
via reddit https://ift.tt/uxjAtbg
www.sans.org
SANS Workshop – Building an Azure Pentest Lab for Red Teams | SANS Institute
The increased importance of the cloud and identity is not lost on attackers. To simulate adversary tradecraft, Red teams must be able to evolve offensive techniques against cloud identity systems. Cloud defenders must adapt quickly to understand these same…
Guide to Using Secrets Management in Enterprise
https://ift.tt/7V50Xu1
Submitted August 26, 2022 at 12:10AM by mesok8
via reddit https://ift.tt/9gdrGBq
https://ift.tt/7V50Xu1
Submitted August 26, 2022 at 12:10AM by mesok8
via reddit https://ift.tt/9gdrGBq
CIO
The quick guide to secrets management in the enterprise
It pays to centralize management of the tools, methods, and credentials used to access apps, services, and all other parts of the IT ecosystem.
LastPass Recent Security Incident
https://ift.tt/gjDt2AB
Submitted August 26, 2022 at 02:02AM by zwamkat
via reddit https://ift.tt/7DdcgIU
https://ift.tt/gjDt2AB
Submitted August 26, 2022 at 02:02AM by zwamkat
via reddit https://ift.tt/7DdcgIU
The LastPass Blog
Notice of Recent Security Incident - The LastPass Blog
We have no evidence that this incident involved any access to customer data or encrypted password vaults. Our products and services are operating normally.
Undetectable backdooring PE file
https://ift.tt/ZeyJN46
Submitted August 26, 2022 at 04:51PM by InformationSecurity
via reddit https://ift.tt/tdruRNa
https://ift.tt/ZeyJN46
Submitted August 26, 2022 at 04:51PM by InformationSecurity
via reddit https://ift.tt/tdruRNa
Zimbra Open Bucket Data Leak – Responsible Disclosure
https://ift.tt/MjRsczk
Submitted August 26, 2022 at 05:22PM by bowline90
via reddit https://ift.tt/xQNbkV7
https://ift.tt/MjRsczk
Submitted August 26, 2022 at 05:22PM by bowline90
via reddit https://ift.tt/xQNbkV7
BackBox.org Membership - A Free Open Source Community Project
Zimbra Open Bucket Data Leak – Responsible Disclosure - BackBox.org Membership
Authors: Raffaele Forte, BackBox Team
Tool Release – JWT-Reauth - a plugin aims to provide a painless solution to this issue. JWT-Reauth provides Burp with a way to authenticate with a given endpoint, parse out the provided token and then attach it as a header on requests going to a given scope.
https://ift.tt/k5OBcpH
Submitted August 26, 2022 at 06:10PM by digicat
via reddit https://ift.tt/AbxJNiH
https://ift.tt/k5OBcpH
Submitted August 26, 2022 at 06:10PM by digicat
via reddit https://ift.tt/AbxJNiH
NCC Group Research
Tool Release – JWT-Reauth
When testing APIs with short-lived authentication tokens, it can be frustrating to login every few minutes, taking up a consultant's time with an unnecessary cut+paste task — As well as introducing the possibility for human error in copying across the token…
Security in Advanced Analytics and Machine Learning Environments
https://ift.tt/t7Mgjk4
Submitted August 26, 2022 at 12:37PM by Preatoria
via reddit https://ift.tt/cKP2Y76
https://ift.tt/t7Mgjk4
Submitted August 26, 2022 at 12:37PM by Preatoria
via reddit https://ift.tt/cKP2Y76
Medium
Security in Advanced Analytics and Machine Learning Environments
1. Introduction to Advanced Analytic Environment
Matano - An open source serverless security lake platform for AWS using Rust + Apache Iceberg
https://ift.tt/tsU41yb
Submitted August 27, 2022 at 03:50AM by sanitybit
via reddit https://ift.tt/65FahHu
https://ift.tt/tsU41yb
Submitted August 27, 2022 at 03:50AM by sanitybit
via reddit https://ift.tt/65FahHu
GitHub
GitHub - matanolabs/matano: Open source cloud-native security lake platform (SIEM alternative) for threat hunting, detection &…
Open source cloud-native security lake platform (SIEM alternative) for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS - GitHub - matanolabs/matan...
Microsoft: New UEFI CA memory mitigation requirements for signing
https://ift.tt/NCK7EDa
Submitted August 27, 2022 at 06:13AM by sanitybit
via reddit https://ift.tt/dyV4Gwj
https://ift.tt/NCK7EDa
Submitted August 27, 2022 at 06:13AM by sanitybit
via reddit https://ift.tt/dyV4Gwj
TECHCOMMUNITY.MICROSOFT.COM
New UEFI CA memory mitigation requirements for signing
Microsoft, in conjuncture with partners in the PC ecosystem, has developed a set of capabilities and new operating environment conditions for UEFI based systems. This environment will leverage common, architecturally defined mitigations to improve the device…
The Elastic Container Project for Security Research
https://ift.tt/0GxmbLs
Submitted August 27, 2022 at 06:13AM by sanitybit
via reddit https://ift.tt/uh6XOJ3
https://ift.tt/0GxmbLs
Submitted August 27, 2022 at 06:13AM by sanitybit
via reddit https://ift.tt/uh6XOJ3
Elastic Blog
The Elastic Container Project for Security Research
The Elastic Container Project provides a single shell noscript that will allow you to stand up and manage an entire Elastic Stack using Docker. This open source project enables rapid deployment for testing use cases.
Awesome Security Newsletters
https://ift.tt/Y1xkmNf
Submitted August 27, 2022 at 05:57PM by zuuZuux3
via reddit https://ift.tt/5zEauNK
https://ift.tt/Y1xkmNf
Submitted August 27, 2022 at 05:57PM by zuuZuux3
via reddit https://ift.tt/5zEauNK
GitHub
GitHub - TalEliyahu/awesome-security-newsletters: Periodic cyber security newsletters that capture the latest news, summaries of…
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attac...
Command Injection in the GitHub Pages Build Pipeline
https://ift.tt/1QOnWcD
Submitted August 27, 2022 at 09:18PM by whisperingmime
via reddit https://ift.tt/vtZFUVE
https://ift.tt/1QOnWcD
Submitted August 27, 2022 at 09:18PM by whisperingmime
via reddit https://ift.tt/vtZFUVE
Blog by Joren Vrancken
Command Injection in the GitHub Pages Build Pipeline
Recently, I participated in the GitHub Bug Bounty program (run through HackerOne). This is a writeup of a command injection bug I discovered in GitHub Pages build process.
SATisfying our way into remote code execution in the OPC UA industrial stack
https://ift.tt/izt4D5Y
Submitted August 28, 2022 at 12:06PM by SRMish3
via reddit https://ift.tt/s8PutUJ
https://ift.tt/izt4D5Y
Submitted August 28, 2022 at 12:06PM by SRMish3
via reddit https://ift.tt/s8PutUJ
JFrog
OPC UA Vulnerabilities Discovered Following Pwn2Own 2022 Hacking Competition
Remote code execution vulnerability found by JFrog Security Research, exploiting an Info Leak and Heap Overflow on UA’s C++ OPC demo server.
On Cryptocurrency Wallet Design – defines access control taxonomy, can be reused e.g. for MFA factors
https://ift.tt/ckmaULi
Submitted August 28, 2022 at 12:58PM by D4r1
via reddit https://ift.tt/hCVnlSg
https://ift.tt/ckmaULi
Submitted August 28, 2022 at 12:58PM by D4r1
via reddit https://ift.tt/hCVnlSg
Vision2 this noscript analyses the Nmap XML scanning results parses each CPE context and correlates to search CVE on NIST. You can use that to find public vulnerabilities in services.
https://ift.tt/vT3eInP
Submitted August 29, 2022 at 08:23AM by CoolerVoid
via reddit https://ift.tt/OmiISeX
https://ift.tt/vT3eInP
Submitted August 29, 2022 at 08:23AM by CoolerVoid
via reddit https://ift.tt/OmiISeX
GitHub
GitHub - CoolerVoid/Vision2: Nmap's XML result parse and NVD's CPE correlation to search CVE.
Nmap's XML result parse and NVD's CPE correlation to search CVE. - GitHub - CoolerVoid/Vision2: Nmap's XML result parse and NVD's CPE correlation to search CVE.