Verified Security Test: Malicious File vs EDR
https://ift.tt/wvBTeNg
Submitted February 13, 2023 at 09:30PM by DH_Prelude
via reddit https://ift.tt/3bumn1X
https://ift.tt/wvBTeNg
Submitted February 13, 2023 at 09:30PM by DH_Prelude
via reddit https://ift.tt/3bumn1X
GitHub
GitHub - preludeorg/test: Verified Security Tests
Verified Security Tests. Contribute to preludeorg/test development by creating an account on GitHub.
How I hacked into a Telecom Network — Part 1 (Getting the RCE)
https://ift.tt/0e8VHFo
Submitted February 14, 2023 at 01:35AM by TheCyb3rAlpha
via reddit https://ift.tt/vp9KnqR
https://ift.tt/0e8VHFo
Submitted February 14, 2023 at 01:35AM by TheCyb3rAlpha
via reddit https://ift.tt/vp9KnqR
Medium
How I hacked into a Telecom Network — Part 1 (Getting the RCE)
TLDR; Red Team Engagement for a telecom company. Got a foothold on the company’s Network Monitoring System (NMS). Sorted reverse shell…
N.J. hospital admits data breach involving thousands of patients
https://ift.tt/CP3JltS
Submitted February 14, 2023 at 04:19AM by irckeyboardwarrior
via reddit https://ift.tt/THIf4qx
https://ift.tt/CP3JltS
Submitted February 14, 2023 at 04:19AM by irckeyboardwarrior
via reddit https://ift.tt/THIf4qx
nj
N.J. hospital admits data breach involving thousands of patients
More than a month after the attack, the hospital apologized to patients whose data may have been stolen.
Exploiting a remote heap overflow with a custom TCP stack
https://ift.tt/yZr24PD
Submitted February 14, 2023 at 10:48AM by Gallus
via reddit https://ift.tt/INfV9AG
https://ift.tt/yZr24PD
Submitted February 14, 2023 at 10:48AM by Gallus
via reddit https://ift.tt/INfV9AG
Synacktiv
Exploiting a remote heap overflow with a custom TCP stack
In November 2021 our team took part in the ZDI Pwn2Own Austin 2021 competition [1] with multiple entries.
HackDojo: search engine for top security conference presentations and whitepapers
https://ift.tt/q6EB72V
Submitted February 14, 2023 at 08:31PM by sea__tak
via reddit https://ift.tt/yEmX9Dl
https://ift.tt/q6EB72V
Submitted February 14, 2023 at 08:31PM by sea__tak
via reddit https://ift.tt/yEmX9Dl
HackDojo
HackDojo is a search engine for top conference presentations popular among engineers
A Different Payload for ManageEngine's CVE-2022-47966
https://ift.tt/xLhNQr9
Submitted February 14, 2023 at 08:25PM by chicksdigthelongrun
via reddit https://ift.tt/4jHRzsM
https://ift.tt/xLhNQr9
Submitted February 14, 2023 at 08:25PM by chicksdigthelongrun
via reddit https://ift.tt/4jHRzsM
A Different Payload for CVE-2022-47966 - Blog - VulnCheck
Exploring a memory resident payload for CVE-2022-47966.
How to deal with developers' fatigue? - Having a long list of vulnerabilities to fix
https://ift.tt/Qt1XkW0
Submitted February 14, 2023 at 09:37PM by MiguelHzBz
via reddit https://ift.tt/IPgmCtE
https://ift.tt/Qt1XkW0
Submitted February 14, 2023 at 09:37PM by MiguelHzBz
via reddit https://ift.tt/IPgmCtE
Sysdig
Vulnerability Prioritization - Combating Developer Fatigue
2023 still a challenge for developers to endure the fatigue of continually vulnerability prioritization and mitigating new threats.
Semgrep Code: SAST designed and built for engineers
https://ift.tt/zuNdkUx
Submitted February 14, 2023 at 10:36PM by iterablewords
via reddit https://ift.tt/QTbeyDB
https://ift.tt/zuNdkUx
Submitted February 14, 2023 at 10:36PM by iterablewords
via reddit https://ift.tt/QTbeyDB
Announcing Semgrep Code: SAST designed and built for engineers
Could Electric Vehicles Be Hacked? Meta-analysis on the risks of the EV ecosystem.
https://ift.tt/msHuhOF
Submitted February 15, 2023 at 07:47AM by UnexpectedLizard
via reddit https://ift.tt/gqaPWw5
https://ift.tt/msHuhOF
Submitted February 15, 2023 at 07:47AM by UnexpectedLizard
via reddit https://ift.tt/gqaPWw5
archive.is
Could Electric Vehicles Be Hacked? - WSJ
archived 14 Feb 2023 23:28:37 UTC
Google Lets Anyone See Original Uncropped Images – Proof of Concept
https://ift.tt/fzCShkm
Submitted February 15, 2023 at 08:41AM by moxofoxo
via reddit https://ift.tt/0QdDCtr
https://ift.tt/fzCShkm
Submitted February 15, 2023 at 08:41AM by moxofoxo
via reddit https://ift.tt/0QdDCtr
Google Docs
Google Lets Anyone See Original Uncropped Images – Proof of Concept
Google Lets Anyone See Original Uncropped Images – Proof of Concept Details: https://theintercept.com/2023/02/14/whistleblower-image-crop-document/
cURL audit: How a joke led to significant findings
https://ift.tt/PrWTM4Y
Submitted February 15, 2023 at 10:48AM by Gallus
via reddit https://ift.tt/ugYKaxk
https://ift.tt/PrWTM4Y
Submitted February 15, 2023 at 10:48AM by Gallus
via reddit https://ift.tt/ugYKaxk
Trail of Bits Blog
cURL audit: How a joke led to significant findings
By Maciej Domanski In fall 2022, Trail of Bits audited cURL, a widely-used command-line utility that transfers data between a server and supports various protocols. The project coincided with a Tra…
HAProxy Security Update (CVE-2023-25725) - HTTP content smuggling attack
https://ift.tt/d6ptXHQ
Submitted February 15, 2023 at 10:15AM by Gallus
via reddit https://ift.tt/8ve30Ab
https://ift.tt/d6ptXHQ
Submitted February 15, 2023 at 10:15AM by Gallus
via reddit https://ift.tt/8ve30Ab
Cross-Thread Return Address Predictions
https://ift.tt/xXrvY93
Submitted February 15, 2023 at 02:07PM by Gallus
via reddit https://ift.tt/miH6pZ1
https://ift.tt/xXrvY93
Submitted February 15, 2023 at 02:07PM by Gallus
via reddit https://ift.tt/miH6pZ1
Amd
Cross-Thread Return Address Predictions
Summary AMD internally discovered a potential vulnerability where certain AMD processors may speculatively execute instructions at an incorrect return site after an SMT mode switch that may potentially lead to information disclosure. AMD believes that due…
Server-side prototype pollution: Black-box detection without the DoS
https://ift.tt/ndDGe1w
Submitted February 15, 2023 at 10:12PM by Gallus
via reddit https://ift.tt/D1do06f
https://ift.tt/ndDGe1w
Submitted February 15, 2023 at 10:12PM by Gallus
via reddit https://ift.tt/D1do06f
PortSwigger Research
Server-side prototype pollution: Black-box detection without the DoS
Server-side prototype pollution is hard to detect black-box without causing a DoS. In this post, we introduce a range of safe detection techniques, which we've also implemented in an open source Burp
GitHub - misterch0c/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
https://ift.tt/fLJIVFz
Submitted February 16, 2023 at 12:45AM by Various-Musician-218
via reddit https://ift.tt/JaUOQro
https://ift.tt/fLJIVFz
Submitted February 16, 2023 at 12:45AM by Various-Musician-218
via reddit https://ift.tt/JaUOQro
GitHub
GitHub - misterch0c/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
A collection of various awesome lists for hackers, pentesters and security researchers - GitHub - misterch0c/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and secur...
Researcher infiltrates phishing syndicate to learn TTP's
https://ift.tt/4xSU8gr
Submitted February 16, 2023 at 09:10PM by CyberArkLabs
via reddit https://ift.tt/BobeNgw
https://ift.tt/4xSU8gr
Submitted February 16, 2023 at 09:10PM by CyberArkLabs
via reddit https://ift.tt/BobeNgw
Cyberark
Phishing as a Service
Introduction Everyone knows what phishing is. It has been around for more than two decades. Now it seems that phishing is more accessible than before. This blog covers how malicious actors can...
[BugTales] REUnziP: Re-Exploiting Huawei Recovery With FaultyUSB
https://ift.tt/j0DPtKa
Submitted February 16, 2023 at 10:01PM by poltess0
via reddit https://ift.tt/wxlfjPq
https://ift.tt/j0DPtKa
Submitted February 16, 2023 at 10:01PM by poltess0
via reddit https://ift.tt/wxlfjPq
labs.taszk.io
[BugTales] REUnziP: Re-Exploiting Huawei Recovery With FaultyUSB
Huawei Recovery Update Zip ToC-ToU Vulnerability
Secure Boot to Heads: A brief history of #Linux Boot Integrity
https://ift.tt/3hJjucx
Submitted February 16, 2023 at 09:56PM by maltfield
via reddit https://ift.tt/xSvupWd
https://ift.tt/3hJjucx
Submitted February 16, 2023 at 09:56PM by maltfield
via reddit https://ift.tt/xSvupWd
Michael Altfield's Tech Blog
Trusted Boot (Anti-Evil-Maid, Heads, and PureBoot) - Michael Altfield's Tech Blog
This post will help to provide historical context and demystify what's under the hood of Heads, PureBoot, and other tools to provide Trusted Boot. I will not be presenting anything new in this article; I merely hope to provide a historical timeline and a…
No More Access Denied - I Am the TrustedInstaller
https://ift.tt/gkMqKpu
Submitted February 17, 2023 at 12:07AM by achilles4828
via reddit https://ift.tt/w6Roj1s
https://ift.tt/gkMqKpu
Submitted February 17, 2023 at 12:07AM by achilles4828
via reddit https://ift.tt/w6Roj1s
FourCore
No more Access Denied - I am TrustedInstaller - FourCore
TrustedInstaller is a Service Account which is used to protect important Windows files and folders from unautorized modification. We take a look at how to obtain TrustedInstaller privileges to delete Windows Defender directory
Outdated Default AWS IAM Policy Language Versions | CloudQuery
https://ift.tt/L2jKyAC
Submitted February 17, 2023 at 03:51AM by jsonpile
via reddit https://ift.tt/5flPX1N
https://ift.tt/L2jKyAC
Submitted February 17, 2023 at 03:51AM by jsonpile
via reddit https://ift.tt/5flPX1N
CloudQuery
Outdated Default AWS IAM Policy Language Versions | CloudQuery
Amazon Web Services (AWS) has 2 different policy versions for writing JSON IAM policies. This lesser known nuance creates issues with policy variables and newer features. This blog focuses on identifying IAM policies still using the outdated IAM language…
Guide For Beginners: Syslog Configuration on Cisco Devices
https://ift.tt/igNQkRh
Submitted February 17, 2023 at 12:35PM by DenofBlerds
via reddit https://ift.tt/a4FTO0x
https://ift.tt/igNQkRh
Submitted February 17, 2023 at 12:35PM by DenofBlerds
via reddit https://ift.tt/a4FTO0x
Cyber Coastal
Cybersecurity Guide For Beginners: Syslog Configuration on Cisco Devices - Cyber Coastal
https://youtu.be/bDIIj3J7JcMSyslog is an open-source protocol used to collect log messages from many different sources, including operating systems, applications, routers, switches, and other network devices. It is used to manage network events, detect security…