SAP Security: Vulnerabilities Analysis By RedRays
https://ift.tt/Q2oJnHE
Submitted August 16, 2023 at 07:06PM by vah_13
via reddit https://ift.tt/2zLA6Tu
https://ift.tt/Q2oJnHE
Submitted August 16, 2023 at 07:06PM by vah_13
via reddit https://ift.tt/2zLA6Tu
RedRays - Your SAP Security Solution
SAP Security: Vulnerability Analysis By RedRays
RedRays' comprehensive SAP security analysis reveals critical vulnerabilities across 10,000 public IP addresses. Discover the severity distribution, insights into the most pressing vulnerabilities, and RedRays' innovative, accessible solutions for SAP security.
Primer on HTTP Security Headers
https://ift.tt/rA7JlXD
Submitted August 16, 2023 at 08:24PM by adityatelange
via reddit https://ift.tt/yOXiGeV
https://ift.tt/rA7JlXD
Submitted August 16, 2023 at 08:24PM by adityatelange
via reddit https://ift.tt/yOXiGeV
adityatelange.in
Primer on HTTP Security Headers
Learn about HTTP security headers and how to configure them for securing web applications.
DEFCON Talk: Using ML Models for Red Teaming and Bug Bounty
https://ift.tt/qjNQPwa
Submitted August 16, 2023 at 09:02PM by Natural_Secret_5446
via reddit https://ift.tt/FPWh0IV
https://ift.tt/qjNQPwa
Submitted August 16, 2023 at 09:02PM by Natural_Secret_5446
via reddit https://ift.tt/FPWh0IV
Threlfall hax
Model Confusion - Weaponizing ML models for red teams and bounty hunters
How I hacked a bunch of companies via machine learning attacks.
Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
https://ift.tt/6RFXeC1
Submitted August 16, 2023 at 08:57PM by Due_Lengthiness_9329
via reddit https://ift.tt/GvVQKuX
https://ift.tt/6RFXeC1
Submitted August 16, 2023 at 08:57PM by Due_Lengthiness_9329
via reddit https://ift.tt/GvVQKuX
Palo Alto Networks Blog
Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
Secure GitHub Actions with new research showing high-risk practices and get expert tips to prevent overly permissive workflows in your CI/CD pipeline.
Researchers uncover long term Espionage against foreign diplomats in Belarus using DNS race conditions
https://ift.tt/Y8y3n9U
Submitted August 17, 2023 at 03:46PM by thehunter699
via reddit https://ift.tt/veSzLVF
https://ift.tt/Y8y3n9U
Submitted August 17, 2023 at 03:46PM by thehunter699
via reddit https://ift.tt/veSzLVF
Welivesecurity
MoustachedBouncer: Espionage against foreign diplomats in Belarus
A group noscriptd MoustachedBouncer committing espionage against foreign embassies in Belarus has been identified by ESET Research.
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
https://ift.tt/0J1cMws
Submitted August 17, 2023 at 06:35PM by MiguelHzBz
via reddit https://ift.tt/kI1ZYg5
https://ift.tt/0J1cMws
Submitted August 17, 2023 at 06:35PM by MiguelHzBz
via reddit https://ift.tt/kI1ZYg5
Sysdig
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
The Sysdig Threat Research Team recently discovered a new operation, dubbed LABRAT, a stealthy cryptojacking and proxyjacking campaign.
Shellcode with GCC and LD (Part 1)
https://ift.tt/gaxFkNy
Submitted August 17, 2023 at 10:22PM by shellspawn
via reddit https://ift.tt/m7a5pY0
https://ift.tt/gaxFkNy
Submitted August 17, 2023 at 10:22PM by shellspawn
via reddit https://ift.tt/m7a5pY0
Sh3llSp4wn’s Malware Conservatory
Offensive Tool Development - The Shellcode Compiler Was Right There All Along… (Part 1)
TLDR; Linker noscripts can be used to generate shellcode via C in a fairly platform agnostic way. This allows offensive developers to use the full capabilities of the Linux Toolchain, sans library code (until a dynamic loader for library calls can be devised)
AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
https://ift.tt/Ct3IBPH
Submitted August 17, 2023 at 09:58PM by adityatelange
via reddit https://ift.tt/y071scN
https://ift.tt/Ct3IBPH
Submitted August 17, 2023 at 09:58PM by adityatelange
via reddit https://ift.tt/y071scN
Google Online Security Blog
AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
Dongge Liu, Jonathan Metzman, Oliver Chang, Google Open Source Security Team Since 2016, OSS-Fuzz has been at the forefront of automated v...
Animated Video on Buffer Overflow Attacks and DeGoogled Phones
https://ift.tt/GoNOlSK
Submitted August 17, 2023 at 10:51PM by aka-18
via reddit https://ift.tt/zMZOxvJ
https://ift.tt/GoNOlSK
Submitted August 17, 2023 at 10:51PM by aka-18
via reddit https://ift.tt/zMZOxvJ
What Is Trusted Computing?
https://ift.tt/x1n6HIk
Submitted August 18, 2023 at 03:22AM by younom
via reddit https://ift.tt/7Th3HDa
https://ift.tt/x1n6HIk
Submitted August 18, 2023 at 03:22AM by younom
via reddit https://ift.tt/7Th3HDa
Podman API service listening on TCP can be used from websites
https://ift.tt/QY82j90
Submitted August 18, 2023 at 12:10PM by 11d_space
via reddit https://ift.tt/FLZUw57
https://ift.tt/QY82j90
Submitted August 18, 2023 at 12:10PM by 11d_space
via reddit https://ift.tt/FLZUw57
proofnet.de
proofnet - Podman API service listening on TCP can be used from websites
proofnet ist spezialisiert auf Security PenTests im Connected Car Umfeld.
Azerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connection
https://ift.tt/soYGACN
Submitted August 18, 2023 at 04:03PM by Repulsive_Size_849
via reddit https://ift.tt/ewzkLRp
https://ift.tt/soYGACN
Submitted August 18, 2023 at 04:03PM by Repulsive_Size_849
via reddit https://ift.tt/ewzkLRp
NEWS.am
Presidential advisor: Azerbaijan cut fiber optic internet cable, disrupting Karabakh's stable internet connection
At 5:55pm Thursday, the Azerbaijani side cut the fiber optic cable of the internet near the illegal Azerbaijani checkpoint located in the Berdzor (Lachin) corridor, disrupting Artsakh's stable internet connection. Artak Beglaryan, advisor to the Artsakh (Nagorno…
Comparison of popular security benchmarks (and dangers associated with them)
https://ift.tt/5i4JvBk
Submitted August 18, 2023 at 06:27PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/OzTFAbf
https://ift.tt/5i4JvBk
Submitted August 18, 2023 at 06:27PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/OzTFAbf
GitHub
Comparison of security benchmarks
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
https://ift.tt/7P4enLF
Submitted August 18, 2023 at 06:16PM by bartukilic
via reddit https://ift.tt/G08StLX
https://ift.tt/7P4enLF
Submitted August 18, 2023 at 06:16PM by bartukilic
via reddit https://ift.tt/G08StLX
SOCRadar® Cyber Intelligence Inc.
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files - SOCRadar® Cyber Intelligence Inc.
In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a popular messaging platform
Richard Stallman on why GNU su didn't support the "wheel" group
https://ift.tt/zCMDG3X
Submitted August 18, 2023 at 07:33PM by cdrt
via reddit https://ift.tt/xMUrksY
https://ift.tt/zCMDG3X
Submitted August 18, 2023 at 07:33PM by cdrt
via reddit https://ift.tt/xMUrksY
ftp.gnu.org
22.5 su: Run a command with substitute user and group id
su allows one user to temporarily become another user. It runs a command (often an interactive shell) with the real and effective user id, group id, and supplemental groups of a given user. Synopsis:
One of our talented interns open sourced a log anonymizing tool - LogLicker
https://ift.tt/8YPosNG
Submitted August 18, 2023 at 09:23PM by randallvancity
via reddit https://ift.tt/5avl4R1
https://ift.tt/8YPosNG
Submitted August 18, 2023 at 09:23PM by randallvancity
via reddit https://ift.tt/5avl4R1
permiso.io
Intern Showcase: Anonymizing Logs Made Easy with LogLicker
LogLicker is a tool designed to simplify the process of anonymizing logs by replacing sensitive information with randomized placeholdersThis enables you to share logs more freely and perform analyses without compromising data privacy.
good primer into Windows Kernel Drivers
https://ift.tt/E0Li5oh
Submitted August 18, 2023 at 11:39PM by jeanc0re
via reddit https://ift.tt/DAuStP6
https://ift.tt/E0Li5oh
Submitted August 18, 2023 at 11:39PM by jeanc0re
via reddit https://ift.tt/DAuStP6
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…
Abyss Locker Ransomware strikes from the depths
https://ift.tt/wr24Lup
Submitted August 19, 2023 at 06:35AM by ShadowStackRE
via reddit https://ift.tt/4idXCT8
https://ift.tt/wr24Lup
Submitted August 19, 2023 at 06:35AM by ShadowStackRE
via reddit https://ift.tt/4idXCT8
ShadowStackRE
Abyss Locker Ransomware strikes from the depths — ShadowStackRE
Abyss Locker Ransomware malware analysis
Search Engines for Researchers
https://ift.tt/HkhX4tc
Submitted August 19, 2023 at 07:16PM by seyyid_
via reddit https://ift.tt/UqmFlTK
https://ift.tt/HkhX4tc
Submitted August 19, 2023 at 07:16PM by seyyid_
via reddit https://ift.tt/UqmFlTK
Google Docs
Search Engines for Cybersecurity Researchers
Sheet1
Search Engines for Cybersecurity Researchers
Published : onhexgroup.ir | Telegram: onhex_ir| Twitter : onhexgroup
Address,Denoscription,API
<a href="https://www.dehashed.com/">https://www.dehashed.com/</a>,View leaked credentials,YES
<a href="https://www.exploit…
Search Engines for Cybersecurity Researchers
Published : onhexgroup.ir | Telegram: onhex_ir| Twitter : onhexgroup
Address,Denoscription,API
<a href="https://www.dehashed.com/">https://www.dehashed.com/</a>,View leaked credentials,YES
<a href="https://www.exploit…
Security Researcher Creates an Open Source Security Research Sharing Platform
https://ift.tt/wYvqLlB
Submitted August 19, 2023 at 10:39PM by RoseSec_
via reddit https://ift.tt/X5GtI8i
https://ift.tt/wYvqLlB
Submitted August 19, 2023 at 10:39PM by RoseSec_
via reddit https://ift.tt/X5GtI8i
i think i solved deepfakes? poke holes in this please
https://ift.tt/0GXTjvV
Submitted August 20, 2023 at 02:41AM by endless
via reddit https://ift.tt/UMVXyZ1
https://ift.tt/0GXTjvV
Submitted August 20, 2023 at 02:41AM by endless
via reddit https://ift.tt/UMVXyZ1
Twitter
pad on X
i solved deepfakes years ago
msig qr codes in the corner of a live broadcast — with real time scrolling text output of a prepared speech
prominent mainstream figures could perform a type of bft (byzantine fault tolerance) in such a way that it certifies…
msig qr codes in the corner of a live broadcast — with real time scrolling text output of a prepared speech
prominent mainstream figures could perform a type of bft (byzantine fault tolerance) in such a way that it certifies…