Microsoft Defender flags Tor Browser as a Trojan and removes it from the system
https://ift.tt/Hwzpqik
Submitted October 02, 2023 at 08:07PM by nareksays
via reddit https://ift.tt/dpR2UIb
https://ift.tt/Hwzpqik
Submitted October 02, 2023 at 08:07PM by nareksays
via reddit https://ift.tt/dpR2UIb
root with a single command: sudo logrotate
https://ift.tt/67L1quM
Submitted October 03, 2023 at 04:16PM by MegaManSec2
via reddit https://ift.tt/XJ3EGfu
https://ift.tt/67L1quM
Submitted October 03, 2023 at 04:16PM by MegaManSec2
via reddit https://ift.tt/XJ3EGfu
Joshua.Hu
root with a single command: sudo logrotate
The scenario is this: a brand new Ubuntu 22.04 server has an account which is restricted to running sudo logrotate *. Can we get root? Short answer: Yes. I couldn’t find much online about this type of exploitation of logrotate, so let’s document something…
Exploiting Edge Routers Acting as IoT Gateways
https://ift.tt/JyKzPgV
Submitted October 03, 2023 at 06:43PM by derp6996
via reddit https://ift.tt/5md3l19
https://ift.tt/JyKzPgV
Submitted October 03, 2023 at 06:43PM by derp6996
via reddit https://ift.tt/5md3l19
Claroty
The Path to the Cloud is Filled with Holes: Exploiting 4G Edge Routers
Retired Server called Home — A server decommissioning failure
https://ift.tt/YzbfrcU
Submitted October 03, 2023 at 06:36PM by oherrala
via reddit https://ift.tt/Nb9Tkgn
https://ift.tt/YzbfrcU
Submitted October 03, 2023 at 06:36PM by oherrala
via reddit https://ift.tt/Nb9Tkgn
Medium
Retired Device called Home
We were told a story which piqued our curiosity. Our customer’s security team started to get a flood of Beacon alerts from one of their…
Cloudflare Protection Bypass Vulnerability on Threat Actors' Radar
https://ift.tt/ErIafvZ
Submitted October 03, 2023 at 06:25PM by ziyahanalbeniz
via reddit https://ift.tt/lMI3ZjV
https://ift.tt/ErIafvZ
Submitted October 03, 2023 at 06:25PM by ziyahanalbeniz
via reddit https://ift.tt/lMI3ZjV
SOCRadar® Cyber Intelligence Inc.
Cloudflare Protection Bypass Vulnerability on Threat Actors' Radar
Cloudflare, a leading cybersecurity provider, faces a security challenge due to vulnerabilities that could put its customer environments...
Let’s Go into the rabbit hole (part 1) — the challenges of dynamically hooking Golang programs
https://ift.tt/1SXZIDE
Submitted October 03, 2023 at 09:05PM by guedou
via reddit https://ift.tt/t4wKfki
https://ift.tt/1SXZIDE
Submitted October 03, 2023 at 09:05PM by guedou
via reddit https://ift.tt/t4wKfki
Quarkslab
Let’s Go into the rabbit hole (part 1) — the challenges of dynamically hooking Golang programs
Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement
https://ift.tt/RlQMsvr
Submitted October 03, 2023 at 10:35PM by SCI_Rusher
via reddit https://ift.tt/H4aFPKU
https://ift.tt/RlQMsvr
Submitted October 03, 2023 at 10:35PM by SCI_Rusher
via reddit https://ift.tt/H4aFPKU
Microsoft Security Blog
Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement | Microsoft Security Blog
Microsoft security researchers recently identified an attack where attackers attempted to move laterally to a cloud environment through a SQL Server instance. The attackers initially exploited a SQL injection vulnerability in an application within the target’s…
[QubesOS] Disarm BusKill Dead Man Switch with Keyboard Shortcut (Guide)
https://ift.tt/7BrenmR
Submitted October 03, 2023 at 09:51PM by maltfield
via reddit https://ift.tt/EImobu9
https://ift.tt/7BrenmR
Submitted October 03, 2023 at 09:51PM by maltfield
via reddit https://ift.tt/EImobu9
BusKill
Disarm BusKill in QubesOS - BusKill
Keyboard shortcuts in QubesOS to arm & disarm (pause) the BusKill laptop kill cord -- so you can go to the bathroom without your laptop self-destruct triggering
PETEP: Open source tool for Penetration Testing of non-HTTP protocols (TCP, UDP) through graphical UI or code, also supports using Burp/Zaproxy by wrapping the binary traffic into HTTP.
https://ift.tt/1a0jg95
Submitted October 03, 2023 at 11:40PM by vutmajk
via reddit https://ift.tt/gXHqSOt
https://ift.tt/1a0jg95
Submitted October 03, 2023 at 11:40PM by vutmajk
via reddit https://ift.tt/gXHqSOt
GitHub
GitHub - Warxim/petep: PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification…
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of ap...
Remote Code Execution In PyTorch Model Server TorchServe
https://ift.tt/vsFRSd8
Submitted October 04, 2023 at 12:42AM by BigBother59
via reddit https://ift.tt/peXQ0oq
https://ift.tt/vsFRSd8
Submitted October 04, 2023 at 12:42AM by BigBother59
via reddit https://ift.tt/peXQ0oq
GitHub
GHSA-4mqg-h5jf-j9m7 - GitHub Advisory Database
TorchServe Pre-Auth Remote Code Execution
Exploring the STSAFE-A110
https://ift.tt/Mcpu5oJ
Submitted October 04, 2023 at 11:28AM by thinkV
via reddit https://ift.tt/EIrk6aS
https://ift.tt/Mcpu5oJ
Submitted October 04, 2023 at 11:28AM by thinkV
via reddit https://ift.tt/EIrk6aS
Elttam
Exploring the STSAFE-A110
elttam is an independent security company providing research-driven security assessment services. We combine pragmatism and deep technical insight to help our customers secure their most important assets.
Exim ZDI 0days -90s Vulns In 90s Software, Is the Sky Falling?
https://ift.tt/UymSuJa
Submitted October 02, 2023 at 05:42PM by dx7r__
via reddit https://ift.tt/OdURpKH
https://ift.tt/UymSuJa
Submitted October 02, 2023 at 05:42PM by dx7r__
via reddit https://ift.tt/OdURpKH
watchTowr Labs - Blog
90s Vulns In 90s Software (Exim) - Is the Sky Falling?
A few days ago, ZDI went public with no less than six 0days in the popular mail server Exim. Ranging from ‘potentially world-ending' through to ‘a bit of a damp squib’, these bugs were apparently discovered way back in June 2022 (!) - but naturally got caught…
cURL maintainers are cutting the release cycle short and will release curl 8.4.0 on October 11, including a fix for a severity HIGH CVE. Buckle up.
https://daniel.haxx.se/
Submitted October 04, 2023 at 03:19PM by Pineapple_Expressed
via reddit https://ift.tt/qOZpUg4
https://daniel.haxx.se/
Submitted October 04, 2023 at 03:19PM by Pineapple_Expressed
via reddit https://ift.tt/qOZpUg4
Reddit
cURL maintainers are cutting the release cycle short and will release curl 8.4.0 on October 11, including a fix for a severity…
484K subscribers in the netsec community. /r/netsec is a community-curated aggregator of technical information security content. Our mission is to…
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
https://ift.tt/vXmkh4q
Submitted October 04, 2023 at 10:06PM by theowni
via reddit https://ift.tt/Zt0xP8f
https://ift.tt/vXmkh4q
Submitted October 04, 2023 at 10:06PM by theowni
via reddit https://ift.tt/Zt0xP8f
Medium
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
Crucial part of utilising a full potential of Software Bill of Materials is automation. This article covers automated projects tracking…
PoC exploit for CVE-2023-4911 "Looney Tunables"
https://ift.tt/jmhbYUA
Submitted October 05, 2023 at 12:18AM by netsec_burn
via reddit https://ift.tt/4cUyVEG
https://ift.tt/jmhbYUA
Submitted October 05, 2023 at 12:18AM by netsec_burn
via reddit https://ift.tt/4cUyVEG
GitHub
GitHub - leesh3288/CVE-2023-4911: PoC for CVE-2023-4911
PoC for CVE-2023-4911. Contribute to leesh3288/CVE-2023-4911 development by creating an account on GitHub.
/r/netsec's Q4 2023 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 05, 2023 at 12:11AM by netsec_burn
via reddit https://ift.tt/qVAoDt6
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 05, 2023 at 12:11AM by netsec_burn
via reddit https://ift.tt/qVAoDt6
Binarly REsearch - Multiple Critical Vulnerabilities in Supermicro BMCs
https://ift.tt/tYpduzv
Submitted October 05, 2023 at 01:49AM by netsec_burn
via reddit https://ift.tt/itdZDYw
https://ift.tt/tYpduzv
Submitted October 05, 2023 at 01:49AM by netsec_burn
via reddit https://ift.tt/itdZDYw
Critical Provesc Zero Day in Confluence
https://ift.tt/Wq2blu4
Submitted October 05, 2023 at 02:48AM by Cubensis-n-sanpedro
via reddit https://ift.tt/kYrVjCf
https://ift.tt/Wq2blu4
Submitted October 05, 2023 at 02:48AM by Cubensis-n-sanpedro
via reddit https://ift.tt/kYrVjCf
X.Org Hit By New Security Vulnerabilities - Two Date Back To 1988 With X11R2 - Hack Liberty
https://ift.tt/bjxYZ3I
Submitted October 05, 2023 at 05:40AM by DR_Kek-on-twitter
via reddit https://ift.tt/wUytB6r
https://ift.tt/bjxYZ3I
Submitted October 05, 2023 at 05:40AM by DR_Kek-on-twitter
via reddit https://ift.tt/wUytB6r
Pitfalls of relying on eBPF for security monitoring (and some solutions)
https://ift.tt/42Qlfng
Submitted October 05, 2023 at 12:23PM by sanitybit
via reddit https://ift.tt/t9aLo06
https://ift.tt/42Qlfng
Submitted October 05, 2023 at 12:23PM by sanitybit
via reddit https://ift.tt/t9aLo06
Trail of Bits Blog
Pitfalls of relying on eBPF for security monitoring (and some solutions)
By Artem Dinaburg eBPF (extended Berkeley Packet Filter) has emerged as the de facto Linux standard for security monitoring and endpoint observability. It is used by technologies such as BPFTrace, …
Introducing cmloot.py - New tooling for attacking Configuration Manager
https://ift.tt/jHtKn9y
Submitted October 05, 2023 at 03:11PM by ivxrehc
via reddit https://ift.tt/dt0M7G1
https://ift.tt/jHtKn9y
Submitted October 05, 2023 at 03:11PM by ivxrehc
via reddit https://ift.tt/dt0M7G1
Shelltrail - Swedish offensive security experts
Introducing cmloot.py - New tooling for attacking Configuration Manager | Shelltrail - Swedish offensive security experts
cmloot.py introduces new angles to exploit Configuration Manager, which has become the new black in internal security assessments of Active Directory environments.