Identifying Container Image Vulnerabilities with Docker Scout
https://ift.tt/UhDG47S
Submitted June 04, 2024 at 03:31PM by pliutau
via reddit https://ift.tt/MAqg9BR
https://ift.tt/UhDG47S
Submitted June 04, 2024 at 03:31PM by pliutau
via reddit https://ift.tt/MAqg9BR
packagemain.tech
Identifying Container Image Vulnerabilities with Docker Scout
A guide on how to maintain a more secure containerized software.
PHISHING LIKE A PRO: A GUIDE FOR PENTESTERS TO ADD SPF, DMARC, DKIM AND MX RECORDS TO EVILGINX
https://ift.tt/utx2CpE
Submitted June 04, 2024 at 03:11PM by adrian_rt
via reddit https://ift.tt/r6bxQXu
https://ift.tt/utx2CpE
Submitted June 04, 2024 at 03:11PM by adrian_rt
via reddit https://ift.tt/r6bxQXu
Cyber Security Services - London
Phishing Like a Pro: A Guide for Pentesters to Add SPF, DMARC, DKIM and MX records to Evilginx
Master phishing: Add SPF, DMARC, DKIM, and MX records to Evilginx to boost your sender's reputation and ensure email deliverability.
CVE-2023-48788: Revisiting Fortinet FortiClient EMS to Exploit 7.2.X
https://ift.tt/oxNJ0Ug
Submitted June 04, 2024 at 05:46PM by scopedsecurity
via reddit https://ift.tt/C3u84jf
https://ift.tt/oxNJ0Ug
Submitted June 04, 2024 at 05:46PM by scopedsecurity
via reddit https://ift.tt/C3u84jf
Horizon3.ai
CVE-2023-48788: Revisiting Fortinet FortiClient EMS to Exploit 7.2.X
Revisiting CVE-2023-48788, a SQL injection in Fortinet FortiClient EMS Server. This blog details bypassing several restrictions to achieve arbitrary command execution as SYSTEM.
Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938
https://ift.tt/VnT45Iy
Submitted June 04, 2024 at 05:36PM by poltess0
via reddit https://ift.tt/ZDFw5r3
https://ift.tt/VnT45Iy
Submitted June 04, 2024 at 05:36PM by poltess0
via reddit https://ift.tt/ZDFw5r3
Withgoogle
Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938 - Android Offensive Security Blog
At OffensiveCon 2024, the Android Red Team gave a presentation (slides) on finding and exploiting CVE-2023-20938, a use-after-free vulnerability in the Android Binder device driver. This post will provide technical details about this vulnerability and how…
Securing the Building Blocks: A Deep Dive into Dependency Security
https://ift.tt/9FQD4Wv
Submitted June 04, 2024 at 06:07PM by imaibou
via reddit https://ift.tt/xmSAXfb
https://ift.tt/9FQD4Wv
Submitted June 04, 2024 at 06:07PM by imaibou
via reddit https://ift.tt/xmSAXfb
Devsecurely
Securing the Building Blocks: A Deep Dive into Dependency Security | Devsecurely
When the foundations break, the building crumbles. Applications are no different. When building an application, you need to choose the best building blocs. They need to be durable and...
Malwarebytes Firewall
https://ift.tt/XN8vVtC
Submitted June 05, 2024 at 12:32AM by kelsey_41375
via reddit https://ift.tt/jCaoZvT
https://ift.tt/XN8vVtC
Submitted June 05, 2024 at 12:32AM by kelsey_41375
via reddit https://ift.tt/jCaoZvT
Malwarebytes Forums
[ RESOLVED ] Firewall question
I just installed Malwarebytes 4.6.13 Trial version and in Trusted Advisor General Settings it says Firewall Protection is ON. I already had Norton 360 running it's Firewall, you can't have two Firewalls at same time correct? I don't see anywhere in Malwarebytes…
In-memory sleeping technique using threads created in suspended state and timers that work with the ResumeThread function after context is set for execution. Each workers has its own stack and no need to modify the list of valid indirect call targets in CFG. Use case: Swappala with Reflective DLL
https://ift.tt/vUhdF16
Submitted June 05, 2024 at 12:28PM by oldboy21
via reddit https://ift.tt/XhfeKZp
https://ift.tt/vUhdF16
Submitted June 05, 2024 at 12:28PM by oldboy21
via reddit https://ift.tt/XhfeKZp
oldboy21.github.io
SLE(A)PING Issues: SWAPPALA and Reflective DLL Friends Forever
Here we go again, hello everyone! Sorry I am on a roll this period, can’t really sle(a)p well when I have something still to solve and I had some leftovers from the previous SWAPPALA adventure.
What we going to talk about today?
Well, lots of failures but…
What we going to talk about today?
Well, lots of failures but…
Hey there! I stumbled upon a fresh sample of Formbook info-stealer malware. During analysis I found this malware hides its payload into a vulnerable WordPress website.Read the article to know more.#FormBook #Stealer #MalwareAnalysis #MalwareResearch #CTI #ThreatIntel #InfoSec
https://ift.tt/9uYklqP
Submitted June 05, 2024 at 07:40PM by _r4n4
via reddit https://ift.tt/A0cX7Sb
https://ift.tt/9uYklqP
Submitted June 05, 2024 at 07:40PM by _r4n4
via reddit https://ift.tt/A0cX7Sb
Ashish Rana
FormBook Malware - The Uninvited Guest of WordPress
Introduction
Analysis of CVE-2024-2738 Apache HugeGraph
https://ift.tt/McKAQLD
Submitted June 05, 2024 at 07:24PM by SL7reach
via reddit https://ift.tt/NdKvPOU
https://ift.tt/McKAQLD
Submitted June 05, 2024 at 07:24PM by SL7reach
via reddit https://ift.tt/NdKvPOU
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Analysis of CVE-2024-27348 Apache HugeGraph
Introduction CVE-2024-27348 is a Remote Code Execution (RCE) vulnerability that exists in Apache HugeGraph Server in versions before 1.3.0. An attacker can bypass the sandbox restrictions and...
Frida 16.3 is out with CoreDevice/RemoteXPC support, new Service API, and many other improvements
https://ift.tt/h3B04iR
Submitted June 05, 2024 at 10:02PM by oleavr
via reddit https://ift.tt/XYbaKRU
https://ift.tt/h3B04iR
Submitted June 05, 2024 at 10:02PM by oleavr
via reddit https://ift.tt/XYbaKRU
Frida • A world-class dynamic instrumentation toolkit
Frida 16.3.0 Released
Observe and reprogram running programs on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX
How to Achieve Eternal Persistence Part 3: How to access and recover replicated secrets
https://ift.tt/DsgR4dz
Submitted June 07, 2024 at 03:26AM by One-Assistance-8552
via reddit https://ift.tt/PjQiAwI
https://ift.tt/DsgR4dz
Submitted June 07, 2024 at 03:26AM by One-Assistance-8552
via reddit https://ift.tt/PjQiAwI
Huntandhackett
How to Achieve Eternal Persistence Part 3: How to access and recover replicated secrets
Learn how to access and recover replicated secrets in order to achieve eternal persistence in an Active Directory environment. Understand the steps involved in decoding replication traffic and understanding RPC calls.
No Way, PHP Strikes Again! (CVE-2024-4577) - watchTowr Labs
https://ift.tt/sGqACOa
Submitted June 07, 2024 at 01:58PM by dx7r__
via reddit https://ift.tt/3hjvonC
https://ift.tt/sGqACOa
Submitted June 07, 2024 at 01:58PM by dx7r__
via reddit https://ift.tt/3hjvonC
watchTowr Labs
No Way, PHP Strikes Again! (CVE-2024-4577)
Orange Tsai tweeted a few hours ago about “One of [his] PHP vulnerabilities, which affects XAMPP by default”, and we were curious to say the least. XAMPP is a very popular way for administrators and developers to rapidly deploy Apache, PHP, and a bunch of…
Create your own C# Obfuscator to evade Static Analysis - Blog
https://ift.tt/CvEpJPa
Submitted June 09, 2024 at 07:28PM by PersonalState343
via reddit https://ift.tt/aHB8Xfd
https://ift.tt/CvEpJPa
Submitted June 09, 2024 at 07:28PM by PersonalState343
via reddit https://ift.tt/aHB8Xfd
Thinking in states to handle information security complexities
https://ift.tt/QWFamvZ
Submitted June 09, 2024 at 11:12PM by Over-Amoeba2779
via reddit https://ift.tt/97WHi4P
https://ift.tt/QWFamvZ
Submitted June 09, 2024 at 11:12PM by Over-Amoeba2779
via reddit https://ift.tt/97WHi4P
Random Access Memory
State Thinking
Thinking in states to handle information security complexities
Unsecure time-based secret and Sandwich Attack - Analysis of my research and release of the "Reset Tolkien" tool
https://ift.tt/seKd5M3
Submitted June 10, 2024 at 09:53AM by _PentesterLab_
via reddit https://ift.tt/9chNHCL
https://ift.tt/seKd5M3
Submitted June 10, 2024 at 09:53AM by _PentesterLab_
via reddit https://ift.tt/9chNHCL
Detection as Code
https://ift.tt/OcVHmGN
Submitted June 10, 2024 at 12:37PM by netbiosX
via reddit https://ift.tt/j2o3fPb
https://ift.tt/OcVHmGN
Submitted June 10, 2024 at 12:37PM by netbiosX
via reddit https://ift.tt/j2o3fPb
Substack
Detection as Code
A guide for detection engineers to establish their workflows & methodologies
Uncovering a Critical Vulnerability in Authentik's PKCE Implementation (CVE-2023-48228) | Offensity
https://ift.tt/irVHTCw
Submitted June 10, 2024 at 02:51PM by Offensity
via reddit https://ift.tt/rwagQvh
https://ift.tt/irVHTCw
Submitted June 10, 2024 at 02:51PM by Offensity
via reddit https://ift.tt/rwagQvh
Offensity
Uncovering a Critical Vulnerability in Authentik's PKCE Implementation (CVE-2023-48228) | Offensity
Security reports: efficient and straightforward. The simplest way to detect and fix vulnerabilities
How to prevent domain verification bypasses of your server certificate
https://ift.tt/uJtq9VA
Submitted June 10, 2024 at 03:47PM by fr0r
via reddit https://ift.tt/o53JhWp
https://ift.tt/uJtq9VA
Submitted June 10, 2024 at 03:47PM by fr0r
via reddit https://ift.tt/o53JhWp
Pentagrid AG
How to prevent domain verification bypasses of your server certificate
Denoscription of the CAA accounturi binding to mitigate or prevent domain verification bypasses and monitoring approaches like certificate transparency log analysis.
Create your own VPN Service with Cableguard VPN and NEAR Protocol
https://ift.tt/KRoNQIU
Submitted June 10, 2024 at 04:55PM by alanesmizi
via reddit https://ift.tt/ROv3ZCI
https://ift.tt/KRoNQIU
Submitted June 10, 2024 at 04:55PM by alanesmizi
via reddit https://ift.tt/ROv3ZCI
Medium
Create your own VPN Service with Cableguard VPN and NEAR Protocol
It is easy!
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
https://ift.tt/dpzvPLh
Submitted June 10, 2024 at 05:58PM by TheDFIRReport
via reddit https://ift.tt/QMAsjKZ
https://ift.tt/dpzvPLh
Submitted June 10, 2024 at 05:58PM by TheDFIRReport
via reddit https://ift.tt/QMAsjKZ
The DFIR Report
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…
Bypassing Veeam Authentication CVE-2024-29849
https://ift.tt/KwGF5XR
Submitted June 10, 2024 at 05:44PM by scopedsecurity
via reddit https://ift.tt/LuhoxRk
https://ift.tt/KwGF5XR
Submitted June 10, 2024 at 05:44PM by scopedsecurity
via reddit https://ift.tt/LuhoxRk
Summoning Team
Bypassing Veeam Authentication CVE-2024-29849
An interesting authentication bypass exploit in Veeam Backup Enterprise Manager