Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
https://ift.tt/meItPNd
Submitted May 25, 2023 at 12:37AM by SCI_Rusher
via reddit https://ift.tt/WskM5ly
Microsoft Security Blog
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
Chinese state-sponsored actor Volt Typhoon is using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG)
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
https://ift.tt/9OVv3nQ
Submitted May 25, 2023 at 01:03AM by mstfknn
via reddit https://ift.tt/5DBwem0
Barracuda
Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023.
Barracuda Networks's Status Page - Barracuda identified a vulnerability (CVE-2023-2868) in our Email Security Gateway appliance (ESG) on May 19, 2023..
codeexplain.vim: A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection (no internet necessary)
https://ift.tt/xjdqGub
Submitted May 25, 2023 at 04:50PM by n00bc00k
via reddit https://ift.tt/djFgbam
https://ift.tt/xjdqGub
Submitted May 25, 2023 at 04:50PM by n00bc00k
via reddit https://ift.tt/djFgbam
GitHub
GitHub - mthbernardes/codeexplain.nvim: A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection…
A nvim plugin Powered by GPT4ALL for Real-time Code Explanation and Vulnerability Detection (no internet necessary) - mthbernardes/codeexplain.nvim
Legion Malware Updated, targeting SSH and AWS Credentials
https://ift.tt/3IsxbEm
Submitted May 25, 2023 at 05:15PM by weseven
via reddit https://ift.tt/qnxsPVH
https://ift.tt/3IsxbEm
Submitted May 25, 2023 at 05:15PM by weseven
via reddit https://ift.tt/qnxsPVH
Cado Security | Cloud Forensics & Incident Response
Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker - Cado Security | Cloud Forensics & Incident Response
Cado Labs have encountered an updated version of a cloud-focused hacktool named Legion with some additional functionality.
Rooting with root cause: finding a variant of a Project Zero bug | The GitHub Blog
https://ift.tt/9rLbyu3
Submitted May 25, 2023 at 09:52PM by poltess0
via reddit https://ift.tt/5YusF0I
https://ift.tt/9rLbyu3
Submitted May 25, 2023 at 09:52PM by poltess0
via reddit https://ift.tt/5YusF0I
The GitHub Blog
Rooting with root cause: finding a variant of a Project Zero bug
In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain on an Android phone that uses the Arm Mali GPU. I’ll also…
bettercap hell
https://ift.tt/em5YzDV
Submitted May 26, 2023 at 11:33AM by Tiny_Scientist2361
via reddit https://ift.tt/4WoyuA3
https://ift.tt/em5YzDV
Submitted May 26, 2023 at 11:33AM by Tiny_Scientist2361
via reddit https://ift.tt/4WoyuA3
Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
https://ift.tt/R2Jhlpw
Submitted May 25, 2023 at 09:47PM by poltess0
via reddit https://ift.tt/8wQ93Bf
https://ift.tt/R2Jhlpw
Submitted May 25, 2023 at 09:47PM by poltess0
via reddit https://ift.tt/8wQ93Bf
Zero Day Initiative
Zero Day Initiative — Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
During Pwn2Own Toronto 2022, three different teams successfully exploited the Sonos One Speaker. In total, $105,000 was awarded to the three teams, with the team of Toan Pham and Tri Dang from Qrious Secure winning $60,000 since their entry was first on the…
Cryptography settings analyzer CryptoLyzer can analyze TLS settings of an OpenVPN server from it's latest release
https://ift.tt/DBxp79I
Submitted May 26, 2023 at 01:58PM by c0r0n3r
via reddit https://ift.tt/erBQfRW
https://ift.tt/DBxp79I
Submitted May 26, 2023 at 01:58PM by c0r0n3r
via reddit https://ift.tt/erBQfRW
GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure
https://ift.tt/eoLx4NZ
Submitted May 27, 2023 at 01:07AM by ElectroPanic0
via reddit https://ift.tt/Nu8jSaq
https://ift.tt/eoLx4NZ
Submitted May 27, 2023 at 01:07AM by ElectroPanic0
via reddit https://ift.tt/Nu8jSaq
www.dig.security
Vulnerability in GCP CloudSQL Leads to Data Exposure
The Dig research team reveals recently discovered critical vulnerability in GCP CloudSQL service that lead to internal container access and data exposure
Hi,
https://ift.tt/vT68Pfl
Submitted May 27, 2023 at 02:33AM by FGXX-Society
via reddit https://ift.tt/0wiAxcV
https://ift.tt/vT68Pfl
Submitted May 27, 2023 at 02:33AM by FGXX-Society
via reddit https://ift.tt/0wiAxcV
WinDiff - Web-based tool to browse and compare symbol and type information of Microsoft Windows binaries across different versions of the operating system. Inspired by ntdiff and updated automatically via Winbindex.
https://ift.tt/NtJpSA2
Submitted May 28, 2023 at 09:15PM by ergrelet
via reddit https://ift.tt/Dj74OJM
https://ift.tt/NtJpSA2
Submitted May 28, 2023 at 09:15PM by ergrelet
via reddit https://ift.tt/Dj74OJM
GitHub
GitHub - ergrelet/windiff: Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries…
Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS. - GitHub - ergrelet/windiff: Web-based tool that allows ...
Securing PDF Generators Against SSRF Vulnerabilities
https://ift.tt/hepUV9l
Submitted May 30, 2023 at 03:58AM by AffectionateOrchid10
via reddit https://ift.tt/GMhUS6d
https://ift.tt/hepUV9l
Submitted May 30, 2023 at 03:58AM by AffectionateOrchid10
via reddit https://ift.tt/GMhUS6d
Medium
Securing PDF Generators Against SSRF Vulnerabilities
Securing WeasyPrint and wkhtmltopdf against SSRF
GobRAT malware written in Go language targeting Linux routers
https://ift.tt/MFTY8Rh
Submitted May 30, 2023 at 12:45PM by oil_sardine
via reddit https://ift.tt/51FTLEK
https://ift.tt/MFTY8Rh
Submitted May 30, 2023 at 12:45PM by oil_sardine
via reddit https://ift.tt/51FTLEK
JPCERT/CC Eyes
GobRAT malware written in Go language targeting Linux routers - JPCERT/CC Eyes
JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack confirmed by JPCERT/CC and GobRAT malware, which was used in the attack. ### Attack flow up to...
The Gemini protocol seen by this HTTP client person
https://ift.tt/RcYHdni
Submitted May 30, 2023 at 12:29PM by Xadartt
via reddit https://ift.tt/lwMFUAH
https://ift.tt/RcYHdni
Submitted May 30, 2023 at 12:29PM by Xadartt
via reddit https://ift.tt/lwMFUAH
Return-Oriented Programming (ROP) Exploits
https://ift.tt/U9Aj63o
Submitted May 30, 2023 at 12:15PM by 0x5FC3
via reddit https://ift.tt/c9CNPh7
https://ift.tt/U9Aj63o
Submitted May 30, 2023 at 12:15PM by 0x5FC3
via reddit https://ift.tt/c9CNPh7
pop.rdi.sh
ROP Exploits
Your favourite ROP gadget
[CVE-2023-32749] Pydio Cells: Unauthorised Role Assignments
https://ift.tt/Yz4Oty6
Submitted May 30, 2023 at 02:48PM by RedTeamPentesting
via reddit https://ift.tt/r6iPj4w
https://ift.tt/Yz4Oty6
Submitted May 30, 2023 at 02:48PM by RedTeamPentesting
via reddit https://ift.tt/r6iPj4w
www.redteam-pentesting.de
RedTeam Pentesting - Pydio Cells: Unauthorised Role Assignments
Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning all roles…
Exploring Android Heap allocations in jemalloc 'new'
https://ift.tt/sHdVCJQ
Submitted May 30, 2023 at 03:40PM by Gallus
via reddit https://ift.tt/5U6biye
https://ift.tt/sHdVCJQ
Submitted May 30, 2023 at 03:40PM by Gallus
via reddit https://ift.tt/5U6biye
Synacktiv
Exploring Android Heap allocations in jemalloc 'new'
When writing an exploit for a memory corruption vulnerability, knowing the heap allocator internals is often required to shape the heap as desired. This article will dive into one of Android libc allo
Introducing ScrapingKit
https://ift.tt/nRPSikT
Submitted May 30, 2023 at 03:40PM by ZephrX112
via reddit https://ift.tt/fzeAJsP
https://ift.tt/nRPSikT
Submitted May 30, 2023 at 03:40PM by ZephrX112
via reddit https://ift.tt/fzeAJsP
Lares Labs
Introducing ScrapingKit
A toolkit for scraping windows apps for keywords to find quick wins on outlook and domain shares.
Fickle Multi-Factor Authentication in Microsoft 365
https://ift.tt/s5BGt6Q
Submitted May 30, 2023 at 02:57PM by CptWin_NZ
via reddit https://ift.tt/o56IiVx
https://ift.tt/s5BGt6Q
Submitted May 30, 2023 at 02:57PM by CptWin_NZ
via reddit https://ift.tt/o56IiVx
blog.cybercx.co.nz
Fickle Multi-Factor Authentication in Microsoft 365
MFA is widely accepted as necessary in our threat-filled environment, and often forms a critical part of compliance frameworks. Once applied though, what assurance does an organisation have that its configuration is impermeable?
A deep-dive on Pluck CMS vulnerability CVE-2023-25828
https://ift.tt/maUTl7S
Submitted May 30, 2023 at 05:34PM by FineDines
via reddit https://ift.tt/FRo9w3p
https://ift.tt/maUTl7S
Submitted May 30, 2023 at 05:34PM by FineDines
via reddit https://ift.tt/FRo9w3p
Application Security Blog
A deep-dive on Pluck CMS vulnerability CVE-2023-25828
CVE-2023-25828; history, mitigation analysis, and everything you need to know about the remote code execution vulnerability in Pluck CMS.
New macOS vulnerability, Migraine, could bypass System Integrity Protection
https://ift.tt/6uXP7jU
Submitted May 30, 2023 at 09:52PM by SCI_Rusher
via reddit https://ift.tt/XGDZBna
https://ift.tt/6uXP7jU
Submitted May 30, 2023 at 09:52PM by SCI_Rusher
via reddit https://ift.tt/XGDZBna
Microsoft Security Blog
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
A new vulnerability, which we refer to as “Migraine”, could allow an attacker with root access to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device.