Scarleteel operation ups their cloud game with new targets and tools
https://ift.tt/PsfUNLo
Submitted July 11, 2023 at 06:34PM by weseven
via reddit https://ift.tt/EJRnQUl
https://ift.tt/PsfUNLo
Submitted July 11, 2023 at 06:34PM by weseven
via reddit https://ift.tt/EJRnQUl
Sysdig
SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto | Sysdig
SCARLETEEL, an operation reported on by the Sysdig Threat Research Team last February, continues to thrive, improve tactics, and steal proprietary data.
Exploiting XSS in hidden inputs and meta tags using popovertarget
https://ift.tt/ptAyvmC
Submitted July 11, 2023 at 07:45PM by albinowax
via reddit https://ift.tt/cDLU0jd
https://ift.tt/ptAyvmC
Submitted July 11, 2023 at 07:45PM by albinowax
via reddit https://ift.tt/cDLU0jd
PortSwigger Research
Exploiting XSS in hidden inputs and meta tags
In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs. It all started when I noticed the new popover behaviour
Weaknesses and Vulnerabilities explained - Everything you need to know in simple words.
https://ift.tt/cxSb0p8
Submitted July 12, 2023 at 12:55AM by D4b0zz
via reddit https://ift.tt/aRFocSg
https://ift.tt/cxSb0p8
Submitted July 12, 2023 at 12:55AM by D4b0zz
via reddit https://ift.tt/aRFocSg
Medium
Weaknesses and Vulnerabilities explained - Everything you need to know in simple words.
Everything you need or want to know around weaknesses and vulnerabilities in simple words for anyone and everyone!
/r/netsec's Q3 2023 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 12, 2023 at 03:10AM by netsec_burn
via reddit https://ift.tt/K1aZsxD
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 12, 2023 at 03:10AM by netsec_burn
via reddit https://ift.tt/K1aZsxD
Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803
https://ift.tt/EmdHXZN
Submitted July 12, 2023 at 05:32AM by Acceptable-Doubt-878
via reddit https://ift.tt/uyTURjE
https://ift.tt/EmdHXZN
Submitted July 12, 2023 at 05:32AM by Acceptable-Doubt-878
via reddit https://ift.tt/uyTURjE
Aura Research Division
Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803
CVE-2023-35803 - An adventure in finding and exploiting a buffer overflow in Extreme Networks/Aerohive Wireless Access Points
CVE-2023-36884 MS Office Zero-Day Vulnerability Exploited For Espionage - Detection and Mitigation
https://ift.tt/kDKaMBh
Submitted July 12, 2023 at 09:07AM by achilles4828
via reddit https://ift.tt/MSEtrmw
https://ift.tt/kDKaMBh
Submitted July 12, 2023 at 09:07AM by achilles4828
via reddit https://ift.tt/MSEtrmw
FourCore
CVE-2023-36884 MS Office Zero-Day Vulnerability Exploited For Espionage - Detection and Mitigation
Microsoft has warned of six unpatched zero-day vulnerabilities including CVE-2023-36884 being exploited by attackers for financial and espionage motives. No patches are available for CVE-2023-36884, find the mitigations and detections to prevent CVE-2023…
Mailgun: Public Security Disclosure
https://ift.tt/Way7tLK
Submitted July 12, 2023 at 02:51PM by Aggressive-Art5250
via reddit https://ift.tt/JxhlnPW
https://ift.tt/Way7tLK
Submitted July 12, 2023 at 02:51PM by Aggressive-Art5250
via reddit https://ift.tt/JxhlnPW
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Bringing our HTTP Fuzzer Monsoon to the Next Level
https://ift.tt/OHt0gIS
Submitted July 12, 2023 at 07:50PM by RedTeamPentesting
via reddit https://ift.tt/vgszwSX
https://ift.tt/OHt0gIS
Submitted July 12, 2023 at 07:50PM by RedTeamPentesting
via reddit https://ift.tt/vgszwSX
RedTeam Pentesting - Blog
Bringing Monsoon to the Next Level
We’ve just a released a major update for our HTTP fuzzer monsoon with many new features and improvements. In this blog post we will cover these changes in detail. If you haven’t heard about monsoon, you should start with our announcement blog post …
BusKill (Dead Man Switch) v0.7.0 released 💾
https://ift.tt/DVkWfqE
Submitted July 12, 2023 at 08:57PM by maltfield
via reddit https://ift.tt/2Uy1aks
https://ift.tt/DVkWfqE
Submitted July 12, 2023 at 08:57PM by maltfield
via reddit https://ift.tt/2Uy1aks
BusKill
BusKill v0.7.0 released - BusKill
We're happy to announce the release of BusKill App v0.7.0. This release includes bug fixes and introduces a new GUI "soft-shutdown" trigger.
hvext - Windbg extension implementing commands helpful to study Hyper-V on Intel processors
https://ift.tt/Nbl8kFo
Submitted July 13, 2023 at 12:23AM by Titokhan
via reddit https://ift.tt/bIy4cjJ
https://ift.tt/Nbl8kFo
Submitted July 13, 2023 at 12:23AM by Titokhan
via reddit https://ift.tt/bIy4cjJ
GitHub
GitHub - tandasat/hvext: The Windbg extension that implements commands helpful to study Hyper-V on Intel processors.
The Windbg extension that implements commands helpful to study Hyper-V on Intel processors. - GitHub - tandasat/hvext: The Windbg extension that implements commands helpful to study Hyper-V on Inte...
Using MiTMProxy as a noscriptable pre-proxy for BurpSuite
https://ift.tt/ezsiOEJ
Submitted July 13, 2023 at 02:02AM by rikvduijn
via reddit https://ift.tt/aARLxwi
https://ift.tt/ezsiOEJ
Submitted July 13, 2023 at 02:02AM by rikvduijn
via reddit https://ift.tt/aARLxwi
Zolder B.V.
Using MiTMProxy as a noscriptable pre-proxy for BurpSuite
TLDR: you can use mitmproxy to modify stuff before it sent to Burp Proxy. Instruction below. Recently we were asked to asses a oldschool Java client server application. After configuring BurpSuite …
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email | MSRC Blog
https://ift.tt/pQ4xwFH
Submitted July 13, 2023 at 03:44AM by hontouso
via reddit https://ift.tt/BuVMqKk
https://ift.tt/pQ4xwFH
Submitted July 13, 2023 at 03:44AM by hontouso
via reddit https://ift.tt/BuVMqKk
Microsoft
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email | MSRC Blog
| Microsoft Security Response…
| Microsoft Security Response…
github.com/ldpreload/BlackLotus: BlackLotus UEFI Windows Bootkit
https://ift.tt/DYGlH3x
Submitted July 13, 2023 at 09:44AM by pheexio
via reddit https://ift.tt/CzUpN7m
https://ift.tt/DYGlH3x
Submitted July 13, 2023 at 09:44AM by pheexio
via reddit https://ift.tt/CzUpN7m
GitHub
GitHub - ldpreload/BlackLotus: BlackLotus UEFI Windows Bootkit
BlackLotus UEFI Windows Bootkit. Contribute to ldpreload/BlackLotus development by creating an account on GitHub.
Why are Prometheus queries hard? - Blog
https://ift.tt/P2hDyx7
Submitted July 13, 2023 at 12:10PM by Xadartt
via reddit https://ift.tt/ucZJafn
https://ift.tt/P2hDyx7
Submitted July 13, 2023 at 12:10PM by Xadartt
via reddit https://ift.tt/ucZJafn
Fiberplane
Why are Prometheus queries hard?
Explaining some of the confusing inner-workings of PromQL
Neutralising AMSI System-Wide as an Admin
https://ift.tt/Kk3Gcqw
Submitted July 13, 2023 at 02:49PM by h0wlett
via reddit https://ift.tt/JSLz4lp
https://ift.tt/Kk3Gcqw
Submitted July 13, 2023 at 02:49PM by h0wlett
via reddit https://ift.tt/JSLz4lp
Pavel Tsakalidis - Personal Blog
Neutralising AMSI System-Wide as an Admin
Use Spartacus to neutralise AMSI system-wide, without having to patch memory
TeamTNT's latest campaign
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:49PM by Easy-Bumblebee2503
via reddit https://ift.tt/nvPNOG5
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:49PM by Easy-Bumblebee2503
via reddit https://ift.tt/nvPNOG5
Aqua
TeamTNT Reemerged with New Aggressive Cloud Campaign
The botnet run by TeamTNT has set its sights on Docker and Kubernetes environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and others.
TeamTNT Reemerged with New Aggressive Campaign
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:52PM by Easy-Bumblebee2503
via reddit https://ift.tt/qLYIKoz
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:52PM by Easy-Bumblebee2503
via reddit https://ift.tt/qLYIKoz
Aqua
TeamTNT Reemerged with New Aggressive Cloud Campaign
The botnet run by TeamTNT has set its sights on Docker and Kubernetes environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and others.
Telemedicine, smart intercom apps at risk from QuickBlox vulns
https://ift.tt/hCq6MSr
Submitted July 13, 2023 at 08:22PM by derp6996
via reddit https://ift.tt/ipCyGgo
https://ift.tt/hCq6MSr
Submitted July 13, 2023 at 08:22PM by derp6996
via reddit https://ift.tt/ipCyGgo
Claroty
Security Flaws Exposed in QuickBlox Chat And Video Framework
Team82 and Check Point Research collaborated to look at the security of the popular QuickBlox SDK and API. Learn more.
Resource Based Constrained Delegation - Practical Guide for Active Directory Privilege Escalation and Lateral Movement
https://ift.tt/I75M6XH
Submitted July 13, 2023 at 08:47PM by S3cur3Th1sSh1t
via reddit https://ift.tt/bTLhMPE
https://ift.tt/I75M6XH
Submitted July 13, 2023 at 08:47PM by S3cur3Th1sSh1t
via reddit https://ift.tt/bTLhMPE
www.r-tec.net
Resource Based Constrained Delegation
This blog post is the start of a series, which presents the attack technique named Resource Based Constrained Delegation (RBCD).
Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
permiso.io
Agile Approach to mass cloud credential harvesting and crypto mining sprints ahead
Permiso p0 Labs and SentinelLabs team up to tackle the latest mass cloud credential harvesting and crypto mining campaign "SilentBob".
We compared modern free or open source SAST tools, and this is what we found
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
Bearer
Bearer | We benchmarked top SAST products, and this is what we learned
We benchmarked top SAST products to see how Bearer CLI stands up. Here are the results!