Socket for Python — Protect your Python app from a software supply chain attack
https://ift.tt/cVyXWIx
Submitted March 02, 2023 at 03:21AM by feross
via reddit https://ift.tt/kAsjvU8
https://ift.tt/cVyXWIx
Submitted March 02, 2023 at 03:21AM by feross
via reddit https://ift.tt/kAsjvU8
Socket
Introducing Python Support - Socket
We're excited to announce that Socket now supports the Python programming language.
Incident Response in Google Cloud: Forensic Artifacts
https://ift.tt/DsUWCnl
Submitted March 02, 2023 at 04:02AM by MiguelHzBz
via reddit https://ift.tt/T0jMOG2
https://ift.tt/DsUWCnl
Submitted March 02, 2023 at 04:02AM by MiguelHzBz
via reddit https://ift.tt/T0jMOG2
blog.sygnia.co
Incident Response in Google Cloud: Forensic Artifacts
Discover effective incident response in Google Cloud. Learn how to analyze forensic artifacts for swift resolution. Expert insights on Sygnia blog.
Gitpod remote code execution 0-day vulnerability via WebSockets
https://ift.tt/rMyZPcf
Submitted March 02, 2023 at 04:55AM by lirantal
via reddit https://ift.tt/AIUshpq
https://ift.tt/rMyZPcf
Submitted March 02, 2023 at 04:55AM by lirantal
via reddit https://ift.tt/AIUshpq
Snyk
Gitpod remote code execution 0-day vulnerability via WebSockets | Snyk
In this post, we present the first findings from our current research into Cloud Development Environments (CDEs) — which allowed a full account takeover through visiting a link, exploiting a commonly misunderstood vulnerability (WebSocket Hijacking), and…
SSH PKI on top of Web PKI
https://ift.tt/ryNEKvV
Submitted March 02, 2023 at 01:40PM by ptman
via reddit https://ift.tt/VnscUdN
https://ift.tt/ryNEKvV
Submitted March 02, 2023 at 01:40PM by ptman
via reddit https://ift.tt/VnscUdN
paul.totterman.name
SSH PKI on top of Web PKI | Paul's page
Reading Future Internet PKI schemes need to be bootstrapped through web
PKI I was
reminded by all the problems I’ve had with SSH (Secure SHell) PKI (Public Key
Infrastructure). SSH host verification is trust-on-first-use (TOFU). So SSH is
protected from man…
PKI I was
reminded by all the problems I’ve had with SSH (Secure SHell) PKI (Public Key
Infrastructure). SSH host verification is trust-on-first-use (TOFU). So SSH is
protected from man…
BlackLotus UEFI bootkit: Myth confirmed
https://ift.tt/OE9aBT2
Submitted March 02, 2023 at 02:11PM by hardenedvault
via reddit https://ift.tt/ecPm2fy
https://ift.tt/OE9aBT2
Submitted March 02, 2023 at 02:11PM by hardenedvault
via reddit https://ift.tt/ecPm2fy
WeLiveSecurity
BlackLotus UEFI bootkit: Myth confirmed
ESET researchers are the first to publish an analysis of BlackLotus, the first in-the-wild UEFI bootkit capable of bypassing UEFI Secure Boot.
Taking over booking.com accounts by abusing OAuth 2.0
https://ift.tt/Z8Q51hX
Submitted March 02, 2023 at 06:50PM by ynvb
via reddit https://ift.tt/hI5MWDH
https://ift.tt/Z8Q51hX
Submitted March 02, 2023 at 06:50PM by ynvb
via reddit https://ift.tt/hI5MWDH
salt.security
Salt Labs | Traveling with OAuth - Account Takeover on Booking.com
Given the widespread usage of OAuth, any vulnerabilities found in its components or their implementations may lead to considerable security impact in the applications and services using them.
Lesser Known Persistence Techniques of WinXP are still effective on Win 10 and 11.
https://ift.tt/ZPR4evG
Submitted March 03, 2023 at 01:07AM by jat0369
via reddit https://ift.tt/ZeGSuAz
https://ift.tt/ZPR4evG
Submitted March 03, 2023 at 01:07AM by jat0369
via reddit https://ift.tt/ZeGSuAz
Cyberark
Persistence Techniques That Persist
Abstract Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change...
Backups of ALL customer vault data, including encrypted passwords and decrypted authenticator seeds, exfiltrated in 2022 LastPass breach, You will need to regenerate OTP KEYS for all services and if you have a weak master password or low iteration count, you will need to change all of your passwords
https://ift.tt/QnMXIyo
Submitted March 03, 2023 at 03:57AM by alexanderpas
via reddit https://ift.tt/5BEwpi3
https://ift.tt/QnMXIyo
Submitted March 03, 2023 at 03:57AM by alexanderpas
via reddit https://ift.tt/5BEwpi3
The LastPass Blog
Security Incident March 2023 Update & Actions - LastPass
Our March 2023 update regarding the LastPass security breach incident including our additional security measures and recommended actions for our LastPass users.
Nosey Parker, a fast secrets detector, now enumerates GitHub repos, writes SARIF output, and has 90 default rules
https://ift.tt/ZF6e7yW
Submitted March 03, 2023 at 05:31AM by exploding_nun
via reddit https://ift.tt/4IKJaQ8
https://ift.tt/ZF6e7yW
Submitted March 03, 2023 at 05:31AM by exploding_nun
via reddit https://ift.tt/4IKJaQ8
GitHub
Release Nosey Parker v0.12.0 · praetorian-inc/noseyparker
A prebuilt Docker image for this release is available for x86_64 architectures:
docker pull ghcr.io/praetorian-inc/noseyparker:v0.12.0
Additions
The scan command can now be given Git https URLs,...
docker pull ghcr.io/praetorian-inc/noseyparker:v0.12.0
Additions
The scan command can now be given Git https URLs,...
Reverse SSH - A Fast, Stable Reverse Shell Handler
https://ift.tt/KIBNmsE
Submitted March 03, 2023 at 06:10AM by Acceptable-Doubt-878
via reddit https://ift.tt/9qP3CTJ
https://ift.tt/KIBNmsE
Submitted March 03, 2023 at 06:10AM by Acceptable-Doubt-878
via reddit https://ift.tt/9qP3CTJ
research.aurainfosec.io
Reverse SSH: A Fast, Stable Reverse Shell Handler
Want to use SSH for reverse shells? Now you can.
Hacking the Nintendo DSi Browser
https://ift.tt/fubXSMw
Submitted March 04, 2023 at 12:47PM by Gallus
via reddit https://ift.tt/EOUqnQB
https://ift.tt/fubXSMw
Submitted March 04, 2023 at 12:47PM by Gallus
via reddit https://ift.tt/EOUqnQB
farlow.dev
Hacking the Nintendo DSi Browser
I managed to exploit the Nintendo DSi browser 15 years after it was released in Japan. This post will go over the journey and the technical details.
“StreamJacking” - Hijacking Hundreds of YouTube Channels Per Day Propagating Elon Musk Branded Crypto Giveaway Scams
https://ift.tt/NTepfE4
Submitted March 05, 2023 at 03:00PM by lowlet3443
via reddit https://ift.tt/txAFh76
https://ift.tt/NTepfE4
Submitted March 05, 2023 at 03:00PM by lowlet3443
via reddit https://ift.tt/txAFh76
Medium
“StreamJacking” - Hijacking Hundreds of YouTube Channels Per Day Propagating Elon Musk Branded Crypto Giveaway Scams
By Nati Tal (Guardio Labs)
Passive Takeover - uncovering (and emulating) an expensive subdomain takeover campaign
https://ift.tt/1cdKnQe
Submitted March 05, 2023 at 05:50PM by -nbsp-
via reddit https://ift.tt/0fOMLWw
https://ift.tt/1cdKnQe
Submitted March 05, 2023 at 05:50PM by -nbsp-
via reddit https://ift.tt/0fOMLWw
kmsec.uk
kmsec | Passive Takeover - uncovering (and emulating) an expensive subdomain takeover campaign
This post explores an often overlooked type of subdomain takeover attack I am dubbing "passive takeover."
Obfuscating Rubeus using Codecepticon
https://ift.tt/sYOKgQe
Submitted March 05, 2023 at 05:40PM by h0wlett
via reddit https://ift.tt/uJCbRad
https://ift.tt/sYOKgQe
Submitted March 05, 2023 at 05:40PM by h0wlett
via reddit https://ift.tt/uJCbRad
Pavel Tsakalidis - Personal Blog
Obfuscating Rubeus using Codecepticon
How to use Codecepticon for obfuscating offensive security tooling, such as Rubeus
Lord Of The Ring0 - Part 4 is out!
https://ift.tt/ut3bOXR
Submitted March 05, 2023 at 05:35PM by Idov31
via reddit https://ift.tt/cnwEFdM
https://ift.tt/ut3bOXR
Submitted March 05, 2023 at 05:35PM by Idov31
via reddit https://ift.tt/cnwEFdM
idov31.github.io
Lord Of The Ring0 - Part 4 | The call back home - Ido Veltzman - Security Blog
PrologueIn the last blog post, we learned some debugging concepts, understood what is IOCTL how to handle it and started to learn how to validate the data th...
Polynonce A Novel Attack against ECDSA. Paper, Code, and associated Story
https://ift.tt/JuRxLfw
Submitted March 06, 2023 at 07:43PM by nhamiel
via reddit https://ift.tt/hCZnrQt
https://ift.tt/JuRxLfw
Submitted March 06, 2023 at 07:43PM by nhamiel
via reddit https://ift.tt/hCZnrQt
Kudelski Security Research
Polynonce: A Tale of a Novel ECDSA Attack and Bitcoin Tears
Introduction In this blog post, we tell a tale of how we discovered a novel attack against ECDSA and how we applied it to datasets we found in the wild, including the Bitcoin and Ethereum net…
Insecure Toyota CRM exposed Mexican customer information
https://ift.tt/4XMJghx
Submitted March 06, 2023 at 11:49PM by EatonZ
via reddit https://ift.tt/jeg7B3n
https://ift.tt/4XMJghx
Submitted March 06, 2023 at 11:49PM by EatonZ
via reddit https://ift.tt/jeg7B3n
Eaton-Works
Insecure Toyota CRM exposed Mexican customer information
Breaking into a Toyota CRM and exploiting it to view customer information.
Protecting Android clipboard content from unintended exposure
https://ift.tt/soEcAUp
Submitted March 06, 2023 at 11:27PM by SCI_Rusher
via reddit https://ift.tt/oQwqtv1
https://ift.tt/soEcAUp
Submitted March 06, 2023 at 11:27PM by SCI_Rusher
via reddit https://ift.tt/oQwqtv1
Microsoft Security Blog
Protecting Android clipboard content from unintended exposure | Microsoft Security Blog
Microsoft discovered that the SHEIN Android application periodically read the contents of the Android device clipboard and, if a particular pattern was present, sent the contents of the clipboard to a remote server.
Manipulating Encrypted Traffic using PyCript for Manual and Automation
https://ift.tt/6HPoIJQ
Submitted March 06, 2023 at 11:52PM by Ano_F
via reddit https://ift.tt/lLbyMQu
https://ift.tt/6HPoIJQ
Submitted March 06, 2023 at 11:52PM by Ano_F
via reddit https://ift.tt/lLbyMQu
Medium
Manipulating Encrypted Traffic using PyCript
Bypassing Client-Side Encryption with Burp Suite and PyCript
Harvesting Active Directory credentials via HTTP Request Smuggling
https://ift.tt/q0zWc6X
Submitted March 07, 2023 at 02:46PM by albinowax
via reddit https://ift.tt/79qkfKe
https://ift.tt/q0zWc6X
Submitted March 07, 2023 at 02:46PM by albinowax
via reddit https://ift.tt/79qkfKe
tij.me
Harvesting credentials via HTTP Request Smuggling
By abusing an HTTP Request Smuggling vulnerability on Outlook Web Access (OWA) for Exchange, it is possible to steal credentials of unsuspecting Active Directory users trying to authenticate to OWA.
Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
https://ift.tt/DRJnAmO
Submitted March 07, 2023 at 04:40PM by hardenedvault
via reddit https://ift.tt/iVYqk7x
https://ift.tt/DRJnAmO
Submitted March 07, 2023 at 04:40PM by hardenedvault
via reddit https://ift.tt/iVYqk7x
hardenedvault.net
Avoiding Single-Point-of-Failure and securing the Root Infrastructure: TCG TPM 2.0
What is TCG TPM 2.0? Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2.