Ransomware group breaches company, reports them to SEC for failure to disclose
https://ift.tt/AEfIlDa
Submitted November 16, 2023 at 07:51AM by AviN456
via reddit https://ift.tt/T4yolzG
https://ift.tt/AEfIlDa
Submitted November 16, 2023 at 07:51AM by AviN456
via reddit https://ift.tt/T4yolzG
www.databreaches.net
AlphV files an SEC complaint against MeridianLink for not disclosing a breach to the SEC (2)
Earlier today, AlphV added MeridianLink to their leak site. MeridianLink (MLNK) is the provider of a loan origination system and digital lending platform for...
Accessing Azure Kubernetes Service as Guest and Cross-Tenant
https://ift.tt/EDS946p
Submitted November 16, 2023 at 08:11PM by cbagdude
via reddit https://ift.tt/5xtWZTB
https://ift.tt/EDS946p
Submitted November 16, 2023 at 08:11PM by cbagdude
via reddit https://ift.tt/5xtWZTB
Binary Security AS
Accessing Azure Kubernetes Service as Guest and Cross-Tenant
In our research, Binary Security found a weakness in Azure Kubernetes Service (AKS) that allows Guest users or third-party apps to access the AKS API without getting assigned any specific roles. Microsoft originally responded that it “does not meet the definition…
From email to phone number, a new OSINT approach - Martin Vigo
https://ift.tt/iZwpGNW
Submitted November 16, 2023 at 09:40PM by n3w57ake
via reddit https://ift.tt/CYyUS7s
https://ift.tt/iZwpGNW
Submitted November 16, 2023 at 09:40PM by n3w57ake
via reddit https://ift.tt/CYyUS7s
Martin Vigo
From email to phone number, a new OSINT approach - Martin Vigo
How to find out someone's phone number if you just know their email address and how it can be automated using a new OSINT tool: email2phonenumber
AI-Exploits: Repo of exploits for multiple critical unauth'd RCEs in AI tools
https://ift.tt/hypLiu2
Submitted November 16, 2023 at 10:16PM by FlyingTriangle
via reddit https://ift.tt/cHrYXQd
https://ift.tt/hypLiu2
Submitted November 16, 2023 at 10:16PM by FlyingTriangle
via reddit https://ift.tt/cHrYXQd
GitHub
GitHub - protectai/ai-exploits: A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities - GitHub - protectai/ai-exploits: A collection of real world AI/ML exploits for responsibly disclosed vulnerabil...
I analyzed Stack Overflow for leaks
https://ift.tt/NjhHxFA
Submitted November 16, 2023 at 09:51PM by matan-h
via reddit https://ift.tt/isCHd6J
https://ift.tt/NjhHxFA
Submitted November 16, 2023 at 09:51PM by matan-h
via reddit https://ift.tt/isCHd6J
Matan-h
I analyzed stackoverflow
I analyzed stackoverflow for secrets and leaks.
Plundering Postman with Porch Pirate
https://ift.tt/8NXPEak
Submitted November 17, 2023 at 12:01AM by EffectiveEmpty5618
via reddit https://ift.tt/7GsRZHB
https://ift.tt/8NXPEak
Submitted November 17, 2023 at 12:01AM by EffectiveEmpty5618
via reddit https://ift.tt/7GsRZHB
Mand Consulting Group
Plundering Postman with Porch Pirate - Mand Consulting Group Inc.
Porch Pirate is a Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to public workspaces, collections, requests, users and teams. Porch Pirate can be used as a client…
CrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
Converge Technology Solutions
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
Zero-day vulnerabilities chain in CrushFTP (CVE-20-23-43177) uncovered by Converge Red Team requires immediate attention with these remediation steps.
Analyzing the security posture of thousands of AWS, Azure and Google Cloud environments
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
Datadog
State of Cloud Security | Datadog
We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
HavocC2 Exploit
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
GitHub
GitHub - syncwithali/HavocExploit: A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.
A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc. - syncwithali/HavocExploit
DIALStranger: my research about DIAL protocol vulnerabilities is public after 4 years
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
GitHub
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
details about DIAL protocol vulnerabilities . Contribute to yunuscadirci/DIALStranger development by creating an account on GitHub.
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
Sonarsource
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
We took a look at the security of the most popular code editor, Visual Studio Code! This blog post covers vulnerabilities our researchers discovered in third-party extensions.
Building a Free Burp Collaborator with Cloudflare Workers
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
blog.gbrls.space
gbrls's blog
gbrls's hacking blog
Mockingjay revisisted - Process stomping on an executable's RWX section and loading beacon with sRDI
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
Naksyn’s blog
Mockingjay revisisted - Process stomping and loading beacon with sRDI
Executables with RWX sections can be abused using a variation of a Process Overwriting technique dubbed Process Stomping. Using (a modified) sRDI and leveraging the new features of Cobalt Strike 4.9 has been possible to load beacon in the RWX section itself…
CVE-2023-45878: Vulnerability in Gibbon Edu Leads to Unauthenticated RCE
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
usd HeroLab
usd-2023-0025 - usd HeroLab
Advisory ID: usd-2023-0025 (CVE-2023-45878) | Product: Gibbon Edu | Vulnerability Type: Arbitrary File Write (CWE-434)
Persistence - Scheduled Task Tampering
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
Penetration Testing Lab
Persistence – Scheduled Task Tampering
Windows Task Scheduler enables windows users and administrators to perform automated tasks at specific time intervals. Scheduled tasks has been commonly abused as a method of persistence by threat …
WithSecure Elements vulnerability to isolate a complete company
https://ift.tt/ZBlUdz7
Submitted November 20, 2023 at 04:27PM by security_aaudit
via reddit https://ift.tt/U6Z8lh2
https://ift.tt/ZBlUdz7
Submitted November 20, 2023 at 04:27PM by security_aaudit
via reddit https://ift.tt/U6Z8lh2
baldur.dk
How we could exploit a vulnerability in WithSecure Elements EDR to shut down a company network through malicious isolation.
Enriched Trivy database with Vulners data released and free for all
https://ift.tt/w3sTAh2
Submitted November 20, 2023 at 04:12PM by isox_xx
via reddit https://ift.tt/imVUp5b
https://ift.tt/w3sTAh2
Submitted November 20, 2023 at 04:12PM by isox_xx
via reddit https://ift.tt/imVUp5b
GitHub
GitHub - vulnersCom/trivy-plugin-vulners-db
Contribute to vulnersCom/trivy-plugin-vulners-db development by creating an account on GitHub.
sterrasec/genpatch: genpatch is IDA plugin that generates a python noscript for patching binary
https://ift.tt/fse8i0c
Submitted November 20, 2023 at 07:25PM by tkmru
via reddit https://ift.tt/UIqY3Ej
https://ift.tt/fse8i0c
Submitted November 20, 2023 at 07:25PM by tkmru
via reddit https://ift.tt/UIqY3Ej
GitHub
GitHub - sterrasec/genpatch: genpatch is IDA plugin that generates a python noscript for patching binary
genpatch is IDA plugin that generates a python noscript for patching binary - sterrasec/genpatch
Avoiding kernel triggered memory scans for process injection
https://ift.tt/g5wd3XH
Submitted November 20, 2023 at 11:26PM by S3cur3Th1sSh1t
via reddit https://ift.tt/rhbAVDe
https://ift.tt/g5wd3XH
Submitted November 20, 2023 at 11:26PM by S3cur3Th1sSh1t
via reddit https://ift.tt/rhbAVDe
www.r-tec.net
Process Injection: Avoiding Kernel Triggered Memory Scans
This Blog will show a novel way to avoid detections for Process Injection triggered by ETWti from Kernel.
OMGCICD - Attacking GitLab CI/CD via Shared Runners
https://ift.tt/Q7vg4sd
Submitted November 21, 2023 at 06:15AM by MysteriousHotel3017
via reddit https://ift.tt/y2AlRUQ
https://ift.tt/Q7vg4sd
Submitted November 21, 2023 at 06:15AM by MysteriousHotel3017
via reddit https://ift.tt/y2AlRUQ
Pulse Security
OMGCICD - Attacking GitLab CI/CD via Shared Runners
This article discusses compromising shared CI/CD runner infrastructure, and how an attacker can escalate their privileges from basic source-repository access to compromising the environments the wider system is deploying.
Can I get some help in relation to interpreting a log/data
https://ift.tt/4T7wQyi
Submitted November 21, 2023 at 05:47AM by Fai057
via reddit https://ift.tt/KikWD28
https://ift.tt/4T7wQyi
Submitted November 21, 2023 at 05:47AM by Fai057
via reddit https://ift.tt/KikWD28