New OpenSecurityTraining2 class: "Architecture 1005: RISC-V Assembly" by Xeno Kovah (~28 hours)
https://ift.tt/5jdC6mR
Submitted March 25, 2024 at 04:58PM by OpenSecurityTraining
via reddit https://ift.tt/2DapSPc
https://ift.tt/5jdC6mR
Submitted March 25, 2024 at 04:58PM by OpenSecurityTraining
via reddit https://ift.tt/2DapSPc
p.ost2.fyi
Architecture 1005: RISC-V Assembly
This class teaches RISC-V assembly language. It requires you know C programming.
Metasploit Framework 6.4 Released
https://ift.tt/qVmgu76
Submitted March 25, 2024 at 08:16PM by Fugitif
via reddit https://ift.tt/h08xUsw
https://ift.tt/qVmgu76
Submitted March 25, 2024 at 08:16PM by Fugitif
via reddit https://ift.tt/h08xUsw
Rapid7
Metasploit Framework 6.4 Released | Rapid7 Blog
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms
https://ift.tt/UQzLIy4
Submitted March 26, 2024 at 05:49AM by netsec_burn
via reddit https://ift.tt/FVMvgqE
https://ift.tt/UQzLIy4
Submitted March 26, 2024 at 05:49AM by netsec_burn
via reddit https://ift.tt/FVMvgqE
Computer Security Group
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms - Computer Security Group
Our work shows that it is possible to trigger Rowhammer bit flips on DDR4 devices on AMD Zen 2 and Zen 3 systems despite deployed TRR mitigations. This result proves that AMD systems are equally vulnerable to Rowhammer as Intel systems, which greatly increases…
GitHub - TracecatHQ/tracecat: 😼 The AI-native, open source alternative to Tines / Splunk SOAR.
https://ift.tt/iy1a2cv
Submitted March 26, 2024 at 08:03AM by supernetworks
via reddit https://ift.tt/pqE8Qv2
https://ift.tt/iy1a2cv
Submitted March 26, 2024 at 08:03AM by supernetworks
via reddit https://ift.tt/pqE8Qv2
GitHub
GitHub - TracecatHQ/tracecat: All-in-one AI automation platform (workflows, agents, cases, tables) for security and IT teams.
All-in-one AI automation platform (workflows, agents, cases, tables) for security and IT teams. - TracecatHQ/tracecat
Frida on Java applications and applets in 2024
https://ift.tt/woZ8Rqp
Submitted March 26, 2024 at 02:57PM by 0xdea
via reddit https://ift.tt/s9Qke5J
https://ift.tt/woZ8Rqp
Submitted March 26, 2024 at 02:57PM by 0xdea
via reddit https://ift.tt/s9Qke5J
hn security
Frida on Java applications and applets in 2024 - hn security
As explained in Federico‘s latest article, […]
Inside the shadowy global battle to tame the world’s most dangerous technology
https://ift.tt/xuCwV6N
Submitted March 26, 2024 at 02:44PM by enkrstic
via reddit https://ift.tt/Tz4W89f
https://ift.tt/xuCwV6N
Submitted March 26, 2024 at 02:44PM by enkrstic
via reddit https://ift.tt/Tz4W89f
POLITICO
US and EU don’t agree on AI rules. Will China step in? – POLITICO
Can anyone control AI?
Glitching in 3D: Low Cost EMFI Attacks
https://ift.tt/X5jezWR
Submitted March 26, 2024 at 05:09PM by wrongbaud
via reddit https://ift.tt/mopdCbe
https://ift.tt/X5jezWR
Submitted March 26, 2024 at 05:09PM by wrongbaud
via reddit https://ift.tt/mopdCbe
ShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wild
https://ift.tt/BbnimS2
Submitted March 26, 2024 at 04:42PM by cov_id19
via reddit https://ift.tt/VCRA62b
https://ift.tt/BbnimS2
Submitted March 26, 2024 at 04:42PM by cov_id19
via reddit https://ift.tt/VCRA62b
www.oligo.security
ShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wild | Oligo Security
The Oligo research team discovered a live crypto miner campaign targeting a vulnerability in Ray, a widely used open-source AI framework.
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
https://ift.tt/WwbHJ9Q
Submitted March 26, 2024 at 04:40PM by barakadua131
via reddit https://ift.tt/BE3zWqp
https://ift.tt/WwbHJ9Q
Submitted March 26, 2024 at 04:40PM by barakadua131
via reddit https://ift.tt/BE3zWqp
Mobile Hacker
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
BlueDucky solves the problem of auto device discovery, locally stores found Bluetooth devices and utilized Rubber Ducky noscripts that are injected from separated
Linux kernel privesc proof of concept CVE-2024-1086, working on ubuntu and debian
https://ift.tt/LOpsjlv
Submitted March 26, 2024 at 07:59PM by ThePyGuru
via reddit https://ift.tt/X3z5Swq
https://ift.tt/LOpsjlv
Submitted March 26, 2024 at 07:59PM by ThePyGuru
via reddit https://ift.tt/X3z5Swq
GitHub
GitHub - Notselwyn/CVE-2024-1086: Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most…
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9...
Preventing Cross-Service UDP Loops in QUIC
https://ift.tt/8GI74ti
Submitted March 26, 2024 at 09:21PM by albinowax
via reddit https://ift.tt/5E7xw2z
https://ift.tt/8GI74ti
Submitted March 26, 2024 at 09:21PM by albinowax
via reddit https://ift.tt/5E7xw2z
Google
Blog: Preventing Cross-Service UDP Loops in QUIC
Infinite loops between servers can lead to performance degradation or network overload. In this blog, we'll take a look at how we prevented cross-service UDP loops in QUIC and share some general conclusions.
Releasing Substation v1.0
https://ift.tt/1AMEVQ9
Submitted March 26, 2024 at 10:58PM by jshlbrdd
via reddit https://ift.tt/Rwuhz58
https://ift.tt/1AMEVQ9
Submitted March 26, 2024 at 10:58PM by jshlbrdd
via reddit https://ift.tt/Rwuhz58
Medium
Releasing Substation v1.0
Brex has released Substation v1.0, the next evolution of our cloud-native, event-driven data pipeline toolkit. Read on for a retrospective.
Abusing MiniFilter Altitude to blind EDR
https://ift.tt/G1laKyQ
Submitted March 27, 2024 at 08:09AM by clod81
via reddit https://ift.tt/4SNXMUD
https://ift.tt/G1laKyQ
Submitted March 27, 2024 at 08:09AM by clod81
via reddit https://ift.tt/4SNXMUD
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
https://ift.tt/oA30QhP
Submitted March 27, 2024 at 10:15AM by Soggy_Sally
via reddit https://ift.tt/wISFybh
https://ift.tt/oA30QhP
Submitted March 27, 2024 at 10:15AM by Soggy_Sally
via reddit https://ift.tt/wISFybh
Pwning Tech
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even having to recompile the exploit for different kernel targets…
Reversing a vulnerability in the Ichitaro Office Suite and Leveraging it into an FP overwrite for Silent Code Execution (RE walkthrough)
https://ift.tt/dkKfQht
Submitted March 27, 2024 at 06:43PM by arizvisa
via reddit https://ift.tt/kmAQNy9
https://ift.tt/dkKfQht
Submitted March 27, 2024 at 06:43PM by arizvisa
via reddit https://ift.tt/kmAQNy9
Cisco Talos Blog
Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word
Research conducted by Cisco Talos last year uncovered multiple vulnerabilities rated as low severity despite their ability to allow for full arbitrary code execution.
31 Round SHA256 Collision Proof of Concept
https://ift.tt/L5CtyjK
Submitted March 27, 2024 at 05:58PM by netsec_burn
via reddit https://ift.tt/rZ9sCFK
https://ift.tt/L5CtyjK
Submitted March 27, 2024 at 05:58PM by netsec_burn
via reddit https://ift.tt/rZ9sCFK
Gist
31_round_sha256_poc.py
GitHub Gist: instantly share code, notes, and snippets.
Malwarebytes adds AI functionality to ThreatDown Security Advisor
https://ift.tt/WIqT8v5
Submitted March 27, 2024 at 07:41PM by gragordyrb
via reddit https://ift.tt/7v8VPAk
https://ift.tt/WIqT8v5
Submitted March 27, 2024 at 07:41PM by gragordyrb
via reddit https://ift.tt/7v8VPAk
Help Net Security
Malwarebytes adds AI functionality to ThreatDown Security Advisor - Help Net Security
The AI-powered capabilities in Security Advisor will help streamline the process for ThreatDown administrators to access crucial information.
ANSI Escape sequence injection in wall (util-linux)
https://ift.tt/H17dScj
Submitted March 27, 2024 at 08:49PM by sky0023
via reddit https://ift.tt/2jhK8BF
https://ift.tt/H17dScj
Submitted March 27, 2024 at 08:49PM by sky0023
via reddit https://ift.tt/2jhK8BF
GitHub
GitHub - skyler-ferrante/CVE-2024-28085: WallEscape vulnerability in util-linux
WallEscape vulnerability in util-linux. Contribute to skyler-ferrante/CVE-2024-28085 development by creating an account on GitHub.
Zero-days exploited in the wild jumped 50% in 2023, fueled by spyware vendors
https://ift.tt/TDWjHg6
Submitted March 27, 2024 at 08:35PM by armpergo
via reddit https://ift.tt/0HKqGcP
https://ift.tt/TDWjHg6
Submitted March 27, 2024 at 08:35PM by armpergo
via reddit https://ift.tt/0HKqGcP
therecord.media
Zero-days exploited in the wild jumped 50% in 2023, fueled by spyware vendors
Cybersecurity experts are warning that zero-day exploits, which can be used to compromise devices before anyone is aware they’re vulnerable, have become more common as nation-state hackers and cybercriminals find sophisticated ways to carry out their attacks.
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
https://ift.tt/RleF3ZJ
Submitted March 27, 2024 at 10:00PM by pinpepnet
via reddit https://ift.tt/TX13cN8
https://ift.tt/RleF3ZJ
Submitted March 27, 2024 at 10:00PM by pinpepnet
via reddit https://ift.tt/TX13cN8
Medium
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation
By Oleg Zaytsev (Guardio Labs)
11 year old security bug in util-linux (Leak user passwords on Ubuntu)
https://ift.tt/z08aWOb
Submitted March 27, 2024 at 11:11PM by sky0023
via reddit https://ift.tt/sWbR631
https://ift.tt/z08aWOb
Submitted March 27, 2024 at 11:11PM by sky0023
via reddit https://ift.tt/sWbR631