Why are Prometheus queries hard? - Blog
https://ift.tt/P2hDyx7
Submitted July 13, 2023 at 12:10PM by Xadartt
via reddit https://ift.tt/ucZJafn
https://ift.tt/P2hDyx7
Submitted July 13, 2023 at 12:10PM by Xadartt
via reddit https://ift.tt/ucZJafn
Fiberplane
Why are Prometheus queries hard?
Explaining some of the confusing inner-workings of PromQL
Neutralising AMSI System-Wide as an Admin
https://ift.tt/Kk3Gcqw
Submitted July 13, 2023 at 02:49PM by h0wlett
via reddit https://ift.tt/JSLz4lp
https://ift.tt/Kk3Gcqw
Submitted July 13, 2023 at 02:49PM by h0wlett
via reddit https://ift.tt/JSLz4lp
Pavel Tsakalidis - Personal Blog
Neutralising AMSI System-Wide as an Admin
Use Spartacus to neutralise AMSI system-wide, without having to patch memory
TeamTNT's latest campaign
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:49PM by Easy-Bumblebee2503
via reddit https://ift.tt/nvPNOG5
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:49PM by Easy-Bumblebee2503
via reddit https://ift.tt/nvPNOG5
Aqua
TeamTNT Reemerged with New Aggressive Cloud Campaign
The botnet run by TeamTNT has set its sights on Docker and Kubernetes environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and others.
TeamTNT Reemerged with New Aggressive Campaign
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:52PM by Easy-Bumblebee2503
via reddit https://ift.tt/qLYIKoz
https://ift.tt/UZOSDNF
Submitted July 13, 2023 at 05:52PM by Easy-Bumblebee2503
via reddit https://ift.tt/qLYIKoz
Aqua
TeamTNT Reemerged with New Aggressive Cloud Campaign
The botnet run by TeamTNT has set its sights on Docker and Kubernetes environments, Redis servers, Postgres databases, Hadoop clusters, Tomcat and others.
Telemedicine, smart intercom apps at risk from QuickBlox vulns
https://ift.tt/hCq6MSr
Submitted July 13, 2023 at 08:22PM by derp6996
via reddit https://ift.tt/ipCyGgo
https://ift.tt/hCq6MSr
Submitted July 13, 2023 at 08:22PM by derp6996
via reddit https://ift.tt/ipCyGgo
Claroty
Security Flaws Exposed in QuickBlox Chat And Video Framework
Team82 and Check Point Research collaborated to look at the security of the popular QuickBlox SDK and API. Learn more.
Resource Based Constrained Delegation - Practical Guide for Active Directory Privilege Escalation and Lateral Movement
https://ift.tt/I75M6XH
Submitted July 13, 2023 at 08:47PM by S3cur3Th1sSh1t
via reddit https://ift.tt/bTLhMPE
https://ift.tt/I75M6XH
Submitted July 13, 2023 at 08:47PM by S3cur3Th1sSh1t
via reddit https://ift.tt/bTLhMPE
www.r-tec.net
Resource Based Constrained Delegation
This blog post is the start of a series, which presents the attack technique named Resource Based Constrained Delegation (RBCD).
Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
permiso.io
Agile Approach to mass cloud credential harvesting and crypto mining sprints ahead
Permiso p0 Labs and SentinelLabs team up to tackle the latest mass cloud credential harvesting and crypto mining campaign "SilentBob".
We compared modern free or open source SAST tools, and this is what we found
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
Bearer
Bearer | We benchmarked top SAST products, and this is what we learned
We benchmarked top SAST products to see how Bearer CLI stands up. Here are the results!
Brute-forcing a macOS user’s real name from a browser using mDNS
https://ift.tt/Eb6oUVj
Submitted July 14, 2023 at 12:55AM by DrinkMoreCodeMore
via reddit https://ift.tt/RiOzJHM
https://ift.tt/Eb6oUVj
Submitted July 14, 2023 at 12:55AM by DrinkMoreCodeMore
via reddit https://ift.tt/RiOzJHM
Fingerprint
Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.
Penetrating the Apple: A Deep Dive into macOS Pentesting
https://ift.tt/B91Iv8Y
Submitted July 14, 2023 at 03:12AM by jat0369
via reddit https://ift.tt/5W1psby
https://ift.tt/B91Iv8Y
Submitted July 14, 2023 at 03:12AM by jat0369
via reddit https://ift.tt/5W1psby
Cyberark
A Deep Dive into Penetration Testing of macOS Applications (Part 1)
Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
https://ift.tt/UeLwFcj
Submitted July 14, 2023 at 12:35PM by 0xdea
via reddit https://ift.tt/S5PexGk
https://ift.tt/UeLwFcj
Submitted July 14, 2023 at 12:35PM by 0xdea
via reddit https://ift.tt/S5PexGk
Cisco Talos Blog
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
Uncovered issues fall into use-after-free, buffer-overflow, information leak and denial of service vulnerability classes. Some of these could be combined to achieve remote code execution or privilege escalation.
Unveiling the Secrets: LSASS Memory Dump Parsing
https://ift.tt/pdDvPiI
Submitted July 14, 2023 at 04:08PM by Crountsec
via reddit https://ift.tt/1kjCNil
https://ift.tt/pdDvPiI
Submitted July 14, 2023 at 04:08PM by Crountsec
via reddit https://ift.tt/1kjCNil
Cyvisory Group
Unveiling the Secrets: LSASS Memory Dump Parsing
Unlock LSASS memory dump secrets with a powerful PowerShell tool. Extract credentials and delve into hacker techniques.
Introducing jswzl: In-depth JavaScript analysis for web security testers
https://ift.tt/VqUil9o
Submitted July 14, 2023 at 05:50PM by DebugDucky
via reddit https://ift.tt/rlUnkpI
https://ift.tt/VqUil9o
Submitted July 14, 2023 at 05:50PM by DebugDucky
via reddit https://ift.tt/rlUnkpI
www.jswzl.io
Introducing jswzl: In-depth JavaScript analysis for web security testers · jswzl
For the last year, I’ve been working hard on creating what I believe to be the next stage in the evolution of tooling for penetration testers, web application security testers, security analysts, and security engineers—in short, anyone who spends time testing…
Update: We released version 1.3.0 of the CSTC a few weeks ago. After the review by Portswigger the update is now also available in the BAppStore.
https://ift.tt/sgaSULJ
Submitted July 14, 2023 at 05:49PM by usdAG
via reddit https://ift.tt/O2cC7Ps
https://ift.tt/sgaSULJ
Submitted July 14, 2023 at 05:49PM by usdAG
via reddit https://ift.tt/O2cC7Ps
portswigger.net
CSTC, Modular HTTP Manipulator
Allows request/response modification using a GUI analogous to CyberChef
Pass The Salt 2023 Wrap-Up - /dev/random
https://ift.tt/yZ9vO6Q
Submitted July 14, 2023 at 09:01PM by mikevvei
via reddit https://ift.tt/34IPJ9S
https://ift.tt/yZ9vO6Q
Submitted July 14, 2023 at 09:01PM by mikevvei
via reddit https://ift.tt/34IPJ9S
/dev/random
Pass The Salt 2023 Wrap-Up - /dev/random
I’m back from Lille, France, where I attended the sixth edition of the conference called “Pass The Salt“. This event focuses on security but around free software. Vendors are not welcome to promote their solutions! Christophe from the crew introduced the…
IAMActionHunter: Identify complex IAM PrivEsc in AWS
https://ift.tt/WSD7Vow
Submitted July 14, 2023 at 09:50PM by rhino_security_labs_
via reddit https://ift.tt/rTBC6cl
https://ift.tt/WSD7Vow
Submitted July 14, 2023 at 09:50PM by rhino_security_labs_
via reddit https://ift.tt/rTBC6cl
Rhino Security Labs
IAMActionHunter: Query AWS IAM permission policies with ease | Rhino Security Labs
SonicWall GMS Critical Vulnerabilities Announced | Patches Released
https://ift.tt/l3PJYZn
Submitted July 15, 2023 at 01:57AM by Netsurion
via reddit https://ift.tt/73GeiOX
https://ift.tt/l3PJYZn
Submitted July 15, 2023 at 01:57AM by Netsurion
via reddit https://ift.tt/73GeiOX
Netsurion
Security Advisory: SonicWall Vulnerabilities | Netsurion
SonicWall has recently disclosed several vulnerabilities in their Global Management System (GMS) and Analytics products. Learn impact, mitigation, and risks.
GitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows System
https://ift.tt/FCNWS3t
Submitted July 15, 2023 at 08:46PM by achilles4828
via reddit https://ift.tt/fne974p
https://ift.tt/FCNWS3t
Submitted July 15, 2023 at 08:46PM by achilles4828
via reddit https://ift.tt/fne974p
GitHub
GitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows with loldrivers.io
Scan vulnerable drivers on Windows with loldrivers.io - FourCoreLabs/LolDriverScan
Satellites lack standard security mechanisms found in mobile phones and laptops - Help Net Security
https://ift.tt/bJrXWVG
Submitted July 16, 2023 at 10:34AM by i-_-am-_-batman
via reddit https://ift.tt/mNqU6eD
https://ift.tt/bJrXWVG
Submitted July 16, 2023 at 10:34AM by i-_-am-_-batman
via reddit https://ift.tt/mNqU6eD
Help Net Security
Satellites lack standard security mechanisms found in mobile phones and laptops
Researchers assessed satellite security mechanisms from an IT perspective and found a lack of modern security implementation.
GitHub - ZephrFish/PotFileUtils
https://ift.tt/0Nwto8v
Submitted July 16, 2023 at 05:38PM by ZephrX112
via reddit https://ift.tt/2RiwAnN
https://ift.tt/0Nwto8v
Submitted July 16, 2023 at 05:38PM by ZephrX112
via reddit https://ift.tt/2RiwAnN
GitHub
GitHub - ZephrFish/PotUtils
Contribute to ZephrFish/PotUtils development by creating an account on GitHub.
Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux
https://ift.tt/3EZ8tGL
Submitted July 16, 2023 at 06:55PM by hardenedvault
via reddit https://ift.tt/1dASBvD
https://ift.tt/3EZ8tGL
Submitted July 16, 2023 at 06:55PM by hardenedvault
via reddit https://ift.tt/1dASBvD
hardenedvault.net
Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux
Disclaimer VED (Vault Exploit Defense) test image contains only the VED kernel module, and does not contain any security baselines, access control policies and situational hardening solution.