🐛 CVE-2023-31070 Broadcom BCM47xx SDK EMF slab-out-of-bounds write
https://ift.tt/7I2pz8X
Submitted May 22, 2023 at 05:51PM by attilaszia
via reddit https://ift.tt/I3tohWq
https://ift.tt/7I2pz8X
Submitted May 22, 2023 at 05:51PM by attilaszia
via reddit https://ift.tt/I3tohWq
Bugprove
CVE-2023-31070 Broadcom BCM47xx SDK EMF slab-out-of-bounds write
Exploring the Impact of CVE-2023-31070: A Deep Dive into Broadcom BCM47xx SDK, found by Attila Szasz with BugProve's engine.
A Deep Dive into Medusa Ransomware
https://ift.tt/FL8WRwO
Submitted May 23, 2023 at 06:33PM by CyberMasterV
via reddit https://ift.tt/oC4M8Ui
https://ift.tt/FL8WRwO
Submitted May 23, 2023 at 06:33PM by CyberMasterV
via reddit https://ift.tt/oC4M8Ui
Security Scorecard
A Deep Dive Into Medusa Ransomware
Trusted publishing: a new benchmark for packaging security
https://ift.tt/CF1qsgH
Submitted May 23, 2023 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/BrxKojc
https://ift.tt/CF1qsgH
Submitted May 23, 2023 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/BrxKojc
Trail of Bits Blog
Trusted publishing: a new benchmark for packaging security
Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index to add a new, more secure authentication method called “trusted publishing.” T…
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor
https://ift.tt/6PnCzyx
Submitted May 23, 2023 at 06:59PM by permis0
via reddit https://ift.tt/GPpRHeB
https://ift.tt/6PnCzyx
Submitted May 23, 2023 at 06:59PM by permis0
via reddit https://ift.tt/GPpRHeB
permiso.io
Permiso | Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor
Permiso’s p0 Labs has been tracking a threat actor for the last 18 months. In this article we will describe the attack lifecycle and detection opportunities for the cloud-focused, financially motivated threat actor we have dubbed as p0-LUCR-1, aka GUI-vil…
GitHub - avilum/secimport: seccomp Python sandbox, powered by eBPF and Dtrace
https://ift.tt/KGioqpr
Submitted May 24, 2023 at 01:42PM by cov_id19
via reddit https://ift.tt/Ii9NsGU
https://ift.tt/KGioqpr
Submitted May 24, 2023 at 01:42PM by cov_id19
via reddit https://ift.tt/Ii9NsGU
GitHub
GitHub - avilum/secimport: The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce…
The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce precise syscall control. Dive into module & package-level security now. - avilum/secimport
What if we had the SockPuppet vulnerability in iOS 16? - Apple Security Research
https://ift.tt/3kT2H4E
Submitted May 24, 2023 at 03:10PM by poltess0
via reddit https://ift.tt/qap9kKr
https://ift.tt/3kT2H4E
Submitted May 24, 2023 at 03:10PM by poltess0
via reddit https://ift.tt/qap9kKr
Blog - What if we had the SockPuppet vulnerability in iOS 16? - Apple Security Research
The next post in our XNU memory safety series examines how our hardened kernel allocator performs in the real world against a previously patched but powerful UAF software vulnerability. In this detailed analysis, we find out what might happen if SockPuppet…
CVE-2023-33617 Writeup
https://ift.tt/WRUn6SQ
Submitted May 24, 2023 at 05:24PM by gabriel_schneider
via reddit https://ift.tt/LVGtCs8
https://ift.tt/WRUn6SQ
Submitted May 24, 2023 at 05:24PM by gabriel_schneider
via reddit https://ift.tt/LVGtCs8
blog.gbrls.space
gbrls's blog
gbrls's hacking blog
The second article in the Breaking OAuth series. This time an OAuth framework bug impacts hundreds of companies including CodeCademy and others.
https://ift.tt/BhZTdlx
Submitted May 24, 2023 at 10:13PM by ynvb
via reddit https://ift.tt/najhdum
https://ift.tt/BhZTdlx
Submitted May 24, 2023 at 10:13PM by ynvb
via reddit https://ift.tt/najhdum
salt.security
A new OAuth vulnerability may impact hundreds of online services
This post details issues identified in a popular framework used by many online services to implement OAuth (as well as other functionality). Salt Labs findings show that services using this framework are susceptible to credentials leakage.
Exploring P4 Protocol: Usage, Implementation, and CVE-2021-37535
https://ift.tt/dKum8Vx
Submitted May 24, 2023 at 11:42PM by vah_13
via reddit https://ift.tt/cn5GjS6
https://ift.tt/dKum8Vx
Submitted May 24, 2023 at 11:42PM by vah_13
via reddit https://ift.tt/cn5GjS6
RedRays - Your SAP Security Solution
Exploring P4 Protocol: Usage, Implementation, and CVE-2021-37535
Explore the P4 protocol's role in Java remote communication, its implementation, and security features. Understand its use in JNDI, RMI, and distributed systems. Dive into the CVE-2021-37535 vulnerability resolution for safer Java applications.
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
Microsoft Security Blog
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
Chinese state-sponsored actor Volt Typhoon is using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG)
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
Barracuda
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
Barracuda Networks's Status Page - Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023..
codeexplain.vim: A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection (no internet necessary)
https://ift.tt/xjdqGub
Submitted May 25, 2023 at 04:50PM by n00bc00k
via reddit https://ift.tt/djFgbam
https://ift.tt/xjdqGub
Submitted May 25, 2023 at 04:50PM by n00bc00k
via reddit https://ift.tt/djFgbam
GitHub
GitHub - mthbernardes/codeexplain.nvim: A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection…
A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection (no internet necessary) - mthbernardes/codeexplain.nvim
Legion Malware Updated, targeting SSH and AWS Credentials
https://ift.tt/3IsxbEm
Submitted May 25, 2023 at 05:15PM by weseven
via reddit https://ift.tt/qnxsPVH
https://ift.tt/3IsxbEm
Submitted May 25, 2023 at 05:15PM by weseven
via reddit https://ift.tt/qnxsPVH
Cado Security | Cloud Forensics & Incident Response
Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker - Cado Security | Cloud Forensics & Incident Response
Cado Labs have encountered an updated version of a cloud-focused hacktool named Legion with some additional functionality.
Rooting with root cause: finding a variant of a Project Zero bug | The GitHub Blog
https://ift.tt/9rLbyu3
Submitted May 25, 2023 at 09:52PM by poltess0
via reddit https://ift.tt/5YusF0I
https://ift.tt/9rLbyu3
Submitted May 25, 2023 at 09:52PM by poltess0
via reddit https://ift.tt/5YusF0I
The GitHub Blog
Rooting with root cause: finding a variant of a Project Zero bug
In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain on an Android phone that uses the Arm Mali GPU. I’ll also…
bettercap hell
https://ift.tt/em5YzDV
Submitted May 26, 2023 at 11:33AM by Tiny_Scientist2361
via reddit https://ift.tt/4WoyuA3
https://ift.tt/em5YzDV
Submitted May 26, 2023 at 11:33AM by Tiny_Scientist2361
via reddit https://ift.tt/4WoyuA3
Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
https://ift.tt/R2Jhlpw
Submitted May 25, 2023 at 09:47PM by poltess0
via reddit https://ift.tt/8wQ93Bf
https://ift.tt/R2Jhlpw
Submitted May 25, 2023 at 09:47PM by poltess0
via reddit https://ift.tt/8wQ93Bf
Zero Day Initiative
Zero Day Initiative — Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
During Pwn2Own Toronto 2022, three different teams successfully exploited the Sonos One Speaker. In total, $105,000 was awarded to the three teams, with the team of Toan Pham and Tri Dang from Qrious Secure winning $60,000 since their entry was first on the…
Cryptography settings analyzer CryptoLyzer can analyze TLS settings of an OpenVPN server from it's latest release
https://ift.tt/DBxp79I
Submitted May 26, 2023 at 01:58PM by c0r0n3r
via reddit https://ift.tt/erBQfRW
https://ift.tt/DBxp79I
Submitted May 26, 2023 at 01:58PM by c0r0n3r
via reddit https://ift.tt/erBQfRW
GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure
https://ift.tt/eoLx4NZ
Submitted May 27, 2023 at 01:07AM by ElectroPanic0
via reddit https://ift.tt/Nu8jSaq
https://ift.tt/eoLx4NZ
Submitted May 27, 2023 at 01:07AM by ElectroPanic0
via reddit https://ift.tt/Nu8jSaq
www.dig.security
Vulnerability in GCP CloudSQL Leads to Data Exposure
The Dig research team reveals recently discovered critical vulnerability in GCP CloudSQL service that lead to internal container access and data exposure
Hi,
https://ift.tt/vT68Pfl
Submitted May 27, 2023 at 02:33AM by FGXX-Society
via reddit https://ift.tt/0wiAxcV
https://ift.tt/vT68Pfl
Submitted May 27, 2023 at 02:33AM by FGXX-Society
via reddit https://ift.tt/0wiAxcV
WinDiff - Web-based tool to browse and compare symbol and type information of Microsoft Windows binaries across different versions of the operating system. Inspired by ntdiff and updated automatically via Winbindex.
https://ift.tt/NtJpSA2
Submitted May 28, 2023 at 09:15PM by ergrelet
via reddit https://ift.tt/Dj74OJM
https://ift.tt/NtJpSA2
Submitted May 28, 2023 at 09:15PM by ergrelet
via reddit https://ift.tt/Dj74OJM
GitHub
GitHub - ergrelet/windiff: Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries…
Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS. - GitHub - ergrelet/windiff: Web-based tool that allows ...
Securing PDF Generators Against SSRF Vulnerabilities
https://ift.tt/hepUV9l
Submitted May 30, 2023 at 03:58AM by AffectionateOrchid10
via reddit https://ift.tt/GMhUS6d
https://ift.tt/hepUV9l
Submitted May 30, 2023 at 03:58AM by AffectionateOrchid10
via reddit https://ift.tt/GMhUS6d
Medium
Securing PDF Generators Against SSRF Vulnerabilities
Securing WeasyPrint and wkhtmltopdf against SSRF