Istio outboundTrafficPolicy Egress Control Bypass
https://ift.tt/7B4fgOm
Submitted August 16, 2023 at 04:50AM by MysteriousHotel3017
via reddit https://ift.tt/zUsg962
https://ift.tt/7B4fgOm
Submitted August 16, 2023 at 04:50AM by MysteriousHotel3017
via reddit https://ift.tt/zUsg962
Pulse Security
Istio outboundTrafficPolicy Egress Control Bypass
Istio egress controls can be bypassed, and are not suitable for restricting egress networking for Kubernetes pods. This advisory details an example bypass using setuid() in a compromised pod.
LLM Security Series: Nuts and Bolts
https://ift.tt/JD5tMNh
Submitted August 16, 2023 at 11:36AM by r0075h3ll
via reddit https://ift.tt/6jXHabp
https://ift.tt/JD5tMNh
Submitted August 16, 2023 at 11:36AM by r0075h3ll
via reddit https://ift.tt/6jXHabp
r0075h3ll.github.io
LLM Security Series: Nuts and Bolts | Hardik Nanda
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
https://ift.tt/176Nu0m
Submitted August 16, 2023 at 05:31PM by ilay789
via reddit https://ift.tt/p2Nsnhi
https://ift.tt/176Nu0m
Submitted August 16, 2023 at 05:31PM by ilay789
via reddit https://ift.tt/p2Nsnhi
Aquasec
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
We expose significant flaws in PowerShell Gallery's policy package names and owners, that open potential supply chain attacks on the registry's user base.
How Browser Sync Can Unknowingly Risk Your Business
https://ift.tt/AfBIrD7
Submitted August 16, 2023 at 06:39PM by ziyahanalbeniz
via reddit https://ift.tt/6CPmnQZ
https://ift.tt/AfBIrD7
Submitted August 16, 2023 at 06:39PM by ziyahanalbeniz
via reddit https://ift.tt/6CPmnQZ
SOCRadar® Cyber Intelligence Inc.
How Browser Sync Can Unknowingly Risk Your Business
Upon initiating browser sync, users trigger a process that shares vital data across devices. By default, this synchronization...
SAP Security: Vulnerabilities Analysis By RedRays
https://ift.tt/Q2oJnHE
Submitted August 16, 2023 at 07:06PM by vah_13
via reddit https://ift.tt/2zLA6Tu
https://ift.tt/Q2oJnHE
Submitted August 16, 2023 at 07:06PM by vah_13
via reddit https://ift.tt/2zLA6Tu
RedRays - Your SAP Security Solution
SAP Security: Vulnerability Analysis By RedRays
RedRays' comprehensive SAP security analysis reveals critical vulnerabilities across 10,000 public IP addresses. Discover the severity distribution, insights into the most pressing vulnerabilities, and RedRays' innovative, accessible solutions for SAP security.
Primer on HTTP Security Headers
https://ift.tt/rA7JlXD
Submitted August 16, 2023 at 08:24PM by adityatelange
via reddit https://ift.tt/yOXiGeV
https://ift.tt/rA7JlXD
Submitted August 16, 2023 at 08:24PM by adityatelange
via reddit https://ift.tt/yOXiGeV
adityatelange.in
Primer on HTTP Security Headers
Learn about HTTP security headers and how to configure them for securing web applications.
DEFCON Talk: Using ML Models for Red Teaming and Bug Bounty
https://ift.tt/qjNQPwa
Submitted August 16, 2023 at 09:02PM by Natural_Secret_5446
via reddit https://ift.tt/FPWh0IV
https://ift.tt/qjNQPwa
Submitted August 16, 2023 at 09:02PM by Natural_Secret_5446
via reddit https://ift.tt/FPWh0IV
Threlfall hax
Model Confusion - Weaponizing ML models for red teams and bounty hunters
How I hacked a bunch of companies via machine learning attacks.
Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
https://ift.tt/6RFXeC1
Submitted August 16, 2023 at 08:57PM by Due_Lengthiness_9329
via reddit https://ift.tt/GvVQKuX
https://ift.tt/6RFXeC1
Submitted August 16, 2023 at 08:57PM by Due_Lengthiness_9329
via reddit https://ift.tt/GvVQKuX
Palo Alto Networks Blog
Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
Secure GitHub Actions with new research showing high-risk practices and get expert tips to prevent overly permissive workflows in your CI/CD pipeline.
Researchers uncover long term Espionage against foreign diplomats in Belarus using DNS race conditions
https://ift.tt/Y8y3n9U
Submitted August 17, 2023 at 03:46PM by thehunter699
via reddit https://ift.tt/veSzLVF
https://ift.tt/Y8y3n9U
Submitted August 17, 2023 at 03:46PM by thehunter699
via reddit https://ift.tt/veSzLVF
Welivesecurity
MoustachedBouncer: Espionage against foreign diplomats in Belarus
A group noscriptd MoustachedBouncer committing espionage against foreign embassies in Belarus has been identified by ESET Research.
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
https://ift.tt/0J1cMws
Submitted August 17, 2023 at 06:35PM by MiguelHzBz
via reddit https://ift.tt/kI1ZYg5
https://ift.tt/0J1cMws
Submitted August 17, 2023 at 06:35PM by MiguelHzBz
via reddit https://ift.tt/kI1ZYg5
Sysdig
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
The Sysdig Threat Research Team recently discovered a new operation, dubbed LABRAT, a stealthy cryptojacking and proxyjacking campaign.
Shellcode with GCC and LD (Part 1)
https://ift.tt/gaxFkNy
Submitted August 17, 2023 at 10:22PM by shellspawn
via reddit https://ift.tt/m7a5pY0
https://ift.tt/gaxFkNy
Submitted August 17, 2023 at 10:22PM by shellspawn
via reddit https://ift.tt/m7a5pY0
Sh3llSp4wn’s Malware Conservatory
Offensive Tool Development - The Shellcode Compiler Was Right There All Along… (Part 1)
TLDR; Linker noscripts can be used to generate shellcode via C in a fairly platform agnostic way. This allows offensive developers to use the full capabilities of the Linux Toolchain, sans library code (until a dynamic loader for library calls can be devised)
AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
https://ift.tt/Ct3IBPH
Submitted August 17, 2023 at 09:58PM by adityatelange
via reddit https://ift.tt/y071scN
https://ift.tt/Ct3IBPH
Submitted August 17, 2023 at 09:58PM by adityatelange
via reddit https://ift.tt/y071scN
Google Online Security Blog
AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
Dongge Liu, Jonathan Metzman, Oliver Chang, Google Open Source Security Team Since 2016, OSS-Fuzz has been at the forefront of automated v...
Animated Video on Buffer Overflow Attacks and DeGoogled Phones
https://ift.tt/GoNOlSK
Submitted August 17, 2023 at 10:51PM by aka-18
via reddit https://ift.tt/zMZOxvJ
https://ift.tt/GoNOlSK
Submitted August 17, 2023 at 10:51PM by aka-18
via reddit https://ift.tt/zMZOxvJ
What Is Trusted Computing?
https://ift.tt/x1n6HIk
Submitted August 18, 2023 at 03:22AM by younom
via reddit https://ift.tt/7Th3HDa
https://ift.tt/x1n6HIk
Submitted August 18, 2023 at 03:22AM by younom
via reddit https://ift.tt/7Th3HDa
Podman API service listening on TCP can be used from websites
https://ift.tt/QY82j90
Submitted August 18, 2023 at 12:10PM by 11d_space
via reddit https://ift.tt/FLZUw57
https://ift.tt/QY82j90
Submitted August 18, 2023 at 12:10PM by 11d_space
via reddit https://ift.tt/FLZUw57
proofnet.de
proofnet - Podman API service listening on TCP can be used from websites
proofnet ist spezialisiert auf Security PenTests im Connected Car Umfeld.
Azerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connection
https://ift.tt/soYGACN
Submitted August 18, 2023 at 04:03PM by Repulsive_Size_849
via reddit https://ift.tt/ewzkLRp
https://ift.tt/soYGACN
Submitted August 18, 2023 at 04:03PM by Repulsive_Size_849
via reddit https://ift.tt/ewzkLRp
NEWS.am
Presidential advisor: Azerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connection
At 5:55pm Thursday, the Azerbaijani side cut the fiber optic cable of the internet near the illegal Azerbaijani checkpoint located in the Berdzor (Lachin) corridor, disrupting Artsakh's stable internet connection. Artak Beglaryan, advisor to the Artsakh (Nagorno…
Comparison of popular security benchmarks (and dangers associated with them)
https://ift.tt/5i4JvBk
Submitted August 18, 2023 at 06:27PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/OzTFAbf
https://ift.tt/5i4JvBk
Submitted August 18, 2023 at 06:27PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/OzTFAbf
GitHub
Comparison of security benchmarks
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
https://ift.tt/7P4enLF
Submitted August 18, 2023 at 06:16PM by bartukilic
via reddit https://ift.tt/G08StLX
https://ift.tt/7P4enLF
Submitted August 18, 2023 at 06:16PM by bartukilic
via reddit https://ift.tt/G08StLX
SOCRadar® Cyber Intelligence Inc.
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files - SOCRadar® Cyber Intelligence Inc.
In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a popular messaging platform
Richard Stallman on why GNU su didn't support the "wheel" group
https://ift.tt/zCMDG3X
Submitted August 18, 2023 at 07:33PM by cdrt
via reddit https://ift.tt/xMUrksY
https://ift.tt/zCMDG3X
Submitted August 18, 2023 at 07:33PM by cdrt
via reddit https://ift.tt/xMUrksY
ftp.gnu.org
22.5 su: Run a command with substitute user and group id
su allows one user to temporarily become another user. It runs a command (often an interactive shell) with the real and effective user id, group id, and supplemental groups of a given user. Synopsis:
One of our talented interns open sourced a log anonymizing tool - LogLicker
https://ift.tt/8YPosNG
Submitted August 18, 2023 at 09:23PM by randallvancity
via reddit https://ift.tt/5avl4R1
https://ift.tt/8YPosNG
Submitted August 18, 2023 at 09:23PM by randallvancity
via reddit https://ift.tt/5avl4R1
permiso.io
Intern Showcase: Anonymizing Logs Made Easy with LogLicker
LogLicker is a tool designed to simplify the process of anonymizing logs by replacing sensitive information with randomized placeholdersThis enables you to share logs more freely and perform analyses without compromising data privacy.
good primer into Windows Kernel Drivers
https://ift.tt/E0Li5oh
Submitted August 18, 2023 at 11:39PM by jeanc0re
via reddit https://ift.tt/DAuStP6
https://ift.tt/E0Li5oh
Submitted August 18, 2023 at 11:39PM by jeanc0re
via reddit https://ift.tt/DAuStP6
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…