Moderator Applications Open
Hello /r/netsec,I am excited to announce that we are opening up applications for new moderators to join the existing moderation team. As our community continues to expand, we want to ensure that we maintain the quality and integrity of the content shared here.If you are passionate about information security and have a strong desire to help maintain and foster community, we encourage you to apply!Preferred qualifications:A history of posting links and/or comments to /r/netsec, demonstrating your active participation in the community.At least 3 years of academic or professional experience in information security.Not involved with the marketing team of any major vendor, to ensure unbiased moderation.Have read and agree with the /r/netsec posting guidelines.Application Process:To apply, please submit the following information via ModMail:Briefly describe your experience in information security, including any relevant certifications or qualifications.Explain your history of posting and participating in the /r/netsec community.Confirm that you are not involved with the marketing team of any major vendor.Describe why you want to become a moderator for /r/netsec and how you can contribute to maintaining and enhancing the quality of our community.Applying shouldn't feel like a chore; ~1 paragraph per question is more than enough. We'll review your application and /r/netsec posting history before deciding.New moderator selections will be announced on May 31st.
Submitted May 20, 2023 at 02:41AM by sanitybit
via reddit https://ift.tt/hb5QYod
Hello /r/netsec,I am excited to announce that we are opening up applications for new moderators to join the existing moderation team. As our community continues to expand, we want to ensure that we maintain the quality and integrity of the content shared here.If you are passionate about information security and have a strong desire to help maintain and foster community, we encourage you to apply!Preferred qualifications:A history of posting links and/or comments to /r/netsec, demonstrating your active participation in the community.At least 3 years of academic or professional experience in information security.Not involved with the marketing team of any major vendor, to ensure unbiased moderation.Have read and agree with the /r/netsec posting guidelines.Application Process:To apply, please submit the following information via ModMail:Briefly describe your experience in information security, including any relevant certifications or qualifications.Explain your history of posting and participating in the /r/netsec community.Confirm that you are not involved with the marketing team of any major vendor.Describe why you want to become a moderator for /r/netsec and how you can contribute to maintaining and enhancing the quality of our community.Applying shouldn't feel like a chore; ~1 paragraph per question is more than enough. We'll review your application and /r/netsec posting history before deciding.New moderator selections will be announced on May 31st.
Submitted May 20, 2023 at 02:41AM by sanitybit
via reddit https://ift.tt/hb5QYod
Reddit
Technical Information Security Content & Discussion
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere.
PoC for Decrypting SAP Cloud Connector SSFS: Utilizing 'getRecord' Function to Decrypt SSFS Properties without Information of Encryption Algorithm
https://ift.tt/4fVU6Do
Submitted May 20, 2023 at 08:22PM by vah_13
via reddit https://ift.tt/kjGe1xT
https://ift.tt/4fVU6Do
Submitted May 20, 2023 at 08:22PM by vah_13
via reddit https://ift.tt/kjGe1xT
GitHub
GitHub - redrays-io/SAP_Cloud_Connector_SSFS_Decryption: A PoC of decryption the SAP Cloud Connector SSFS
A PoC of decryption the SAP Cloud Connector SSFS. Contribute to redrays-io/SAP_Cloud_Connector_SSFS_Decryption development by creating an account on GitHub.
Cisco Small Business Series Switches Buffer Overflow Vulnerabilities
https://ift.tt/tyaAKco
Submitted May 21, 2023 at 12:32AM by mstfknn
via reddit https://ift.tt/8p5fn06
https://ift.tt/tyaAKco
Submitted May 21, 2023 at 12:32AM by mstfknn
via reddit https://ift.tt/8p5fn06
Cisco
Cisco Security Advisory: Cisco Small Business Series Switches Buffer Overflow Vulnerabilities
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected…
PGP signatures on PyPI: worse than useless
https://ift.tt/Uw7kjRs
Submitted May 21, 2023 at 09:19PM by yossarian_flew_away
via reddit https://ift.tt/M7Agyk1
https://ift.tt/Uw7kjRs
Submitted May 21, 2023 at 09:19PM by yossarian_flew_away
via reddit https://ift.tt/M7Agyk1
blog.yossarian.net
PGP signatures on PyPI: worse than useless
CVE-2023-26818 - Bypass TCC with Telegram in macOS
https://ift.tt/N4K3l7a
Submitted May 22, 2023 at 01:22PM by ffyns
via reddit https://ift.tt/ONIaYoV
https://ift.tt/N4K3l7a
Submitted May 22, 2023 at 01:22PM by ffyns
via reddit https://ift.tt/ONIaYoV
Dan Revah’s Blog
CVE-2023-26818 - Bypass TCC with Telegram in macOS
Preface
"Mirror" of the soon to be deprecated NIST NVD CVE Feeds
https://ift.tt/v6DoA9Q
Submitted May 22, 2023 at 04:18PM by martinclauss
via reddit https://ift.tt/Ur9FsPg
https://ift.tt/v6DoA9Q
Submitted May 22, 2023 at 04:18PM by martinclauss
via reddit https://ift.tt/Ur9FsPg
GitHub
GitHub - fkie-cad/nvd-json-data-feeds: Community reconstruction of the soon-to-be deprecated JSON NVD Data Feeds. This project…
Community reconstruction of the soon-to-be deprecated JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is not endorsed or certified by the NVD. - GitHub - fkie-cad...
Critical Security Vulnerability In PowerVM Hypervisor
https://ift.tt/qUSpdmw
Submitted May 22, 2023 at 05:38PM by mstfknn
via reddit https://ift.tt/0qd1TGB
https://ift.tt/qUSpdmw
Submitted May 22, 2023 at 05:38PM by mstfknn
via reddit https://ift.tt/0qd1TGB
IT Jungle
Critical Security Vulnerability In PowerVM Hypervisor - IT Jungle
IBM’s Product Security Incident Response Team (PSIRT) put out a notice on Wednesday, May 17, to inform the Power Systems installed base that there is a very serious security vulnerability in the PowerVM hypervisor. You can see the PSIRT notice at this link…
ports.sh
http://ports.sh
Submitted May 22, 2023 at 05:32PM by cov_id19
via reddit https://ift.tt/p1NbXx0
http://ports.sh
Submitted May 22, 2023 at 05:32PM by cov_id19
via reddit https://ift.tt/p1NbXx0
Reddit
From the netsec community on Reddit: ports.sh
Posted by cov_id19 - 8 votes and 8 comments
AI-powered Password Testing for ABAP and S/4HANA stacks
https://ift.tt/xyou7CV
Submitted May 22, 2023 at 06:14PM by vah_13
via reddit https://ift.tt/2sk1YFo
https://ift.tt/xyou7CV
Submitted May 22, 2023 at 06:14PM by vah_13
via reddit https://ift.tt/2sk1YFo
Sap
AI-powered Password Testing for ABAP stack | SAP Blogs
Greetings, I am glad to inform you about a significant development in the RedRays Security Platform for the ABAP stack. We have created a new module that effectively deals with the pressing concern of password
IcedID Macro Ends in Nokoyawa Ransomware
https://ift.tt/eh6CnyK
Submitted May 22, 2023 at 06:02PM by TheDFIRReport
via reddit https://ift.tt/vrq0VNs
https://ift.tt/eh6CnyK
Submitted May 22, 2023 at 06:02PM by TheDFIRReport
via reddit https://ift.tt/vrq0VNs
The DFIR Report
IcedID Macro Ends in Nokoyawa Ransomware - The DFIR Report
Threat actors have moved to other means of initial access, such as ISO files combined with LNKs or OneNote payloads, but some appearances of VBA macros in Office documents can … Read More
🐛 CVE-2023-31070 Broadcom BCM47xx SDK EMF slab-out-of-bounds write
https://ift.tt/7I2pz8X
Submitted May 22, 2023 at 05:51PM by attilaszia
via reddit https://ift.tt/I3tohWq
https://ift.tt/7I2pz8X
Submitted May 22, 2023 at 05:51PM by attilaszia
via reddit https://ift.tt/I3tohWq
Bugprove
CVE-2023-31070 Broadcom BCM47xx SDK EMF slab-out-of-bounds write
Exploring the Impact of CVE-2023-31070: A Deep Dive into Broadcom BCM47xx SDK, found by Attila Szasz with BugProve's engine.
A Deep Dive into Medusa Ransomware
https://ift.tt/FL8WRwO
Submitted May 23, 2023 at 06:33PM by CyberMasterV
via reddit https://ift.tt/oC4M8Ui
https://ift.tt/FL8WRwO
Submitted May 23, 2023 at 06:33PM by CyberMasterV
via reddit https://ift.tt/oC4M8Ui
Security Scorecard
A Deep Dive Into Medusa Ransomware
Trusted publishing: a new benchmark for packaging security
https://ift.tt/CF1qsgH
Submitted May 23, 2023 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/BrxKojc
https://ift.tt/CF1qsgH
Submitted May 23, 2023 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/BrxKojc
Trail of Bits Blog
Trusted publishing: a new benchmark for packaging security
Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index to add a new, more secure authentication method called “trusted publishing.” T…
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor
https://ift.tt/6PnCzyx
Submitted May 23, 2023 at 06:59PM by permis0
via reddit https://ift.tt/GPpRHeB
https://ift.tt/6PnCzyx
Submitted May 23, 2023 at 06:59PM by permis0
via reddit https://ift.tt/GPpRHeB
permiso.io
Permiso | Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor
Permiso’s p0 Labs has been tracking a threat actor for the last 18 months. In this article we will describe the attack lifecycle and detection opportunities for the cloud-focused, financially motivated threat actor we have dubbed as p0-LUCR-1, aka GUI-vil…
GitHub - avilum/secimport: seccomp Python sandbox, powered by eBPF and Dtrace
https://ift.tt/KGioqpr
Submitted May 24, 2023 at 01:42PM by cov_id19
via reddit https://ift.tt/Ii9NsGU
https://ift.tt/KGioqpr
Submitted May 24, 2023 at 01:42PM by cov_id19
via reddit https://ift.tt/Ii9NsGU
GitHub
GitHub - avilum/secimport: The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce…
The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce precise syscall control. Dive into module & package-level security now. - avilum/secimport
What if we had the SockPuppet vulnerability in iOS 16? - Apple Security Research
https://ift.tt/3kT2H4E
Submitted May 24, 2023 at 03:10PM by poltess0
via reddit https://ift.tt/qap9kKr
https://ift.tt/3kT2H4E
Submitted May 24, 2023 at 03:10PM by poltess0
via reddit https://ift.tt/qap9kKr
Blog - What if we had the SockPuppet vulnerability in iOS 16? - Apple Security Research
The next post in our XNU memory safety series examines how our hardened kernel allocator performs in the real world against a previously patched but powerful UAF software vulnerability. In this detailed analysis, we find out what might happen if SockPuppet…
CVE-2023-33617 Writeup
https://ift.tt/WRUn6SQ
Submitted May 24, 2023 at 05:24PM by gabriel_schneider
via reddit https://ift.tt/LVGtCs8
https://ift.tt/WRUn6SQ
Submitted May 24, 2023 at 05:24PM by gabriel_schneider
via reddit https://ift.tt/LVGtCs8
blog.gbrls.space
gbrls's blog
gbrls's hacking blog
The second article in the Breaking OAuth series. This time an OAuth framework bug impacts hundreds of companies including CodeCademy and others.
https://ift.tt/BhZTdlx
Submitted May 24, 2023 at 10:13PM by ynvb
via reddit https://ift.tt/najhdum
https://ift.tt/BhZTdlx
Submitted May 24, 2023 at 10:13PM by ynvb
via reddit https://ift.tt/najhdum
salt.security
A new OAuth vulnerability may impact hundreds of online services
This post details issues identified in a popular framework used by many online services to implement OAuth (as well as other functionality). Salt Labs findings show that services using this framework are susceptible to credentials leakage.
Exploring P4 Protocol: Usage, Implementation, and CVE-2021-37535
https://ift.tt/dKum8Vx
Submitted May 24, 2023 at 11:42PM by vah_13
via reddit https://ift.tt/cn5GjS6
https://ift.tt/dKum8Vx
Submitted May 24, 2023 at 11:42PM by vah_13
via reddit https://ift.tt/cn5GjS6
RedRays - Your SAP Security Solution
Exploring P4 Protocol: Usage, Implementation, and CVE-2021-37535
Explore the P4 protocol's role in Java remote communication, its implementation, and security features. Understand its use in JNDI, RMI, and distributed systems. Dive into the CVE-2021-37535 vulnerability resolution for safer Java applications.
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
Microsoft Security Blog
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
Chinese state-sponsored actor Volt Typhoon is using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG)
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
Barracuda
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
Barracuda Networks's Status Page - Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023..