Engineering Learnings from the CrowdStrike Falcon Outage
https://ift.tt/9WQmNrX
Submitted July 30, 2024 at 08:24AM by mazen160
via reddit https://ift.tt/lqcXLMk
https://ift.tt/9WQmNrX
Submitted July 30, 2024 at 08:24AM by mazen160
via reddit https://ift.tt/lqcXLMk
Mazin Ahmed
Engineering Learnings from the CrowdStrike Falcon Outage
Lesson from the Hotjar vulnerability: HTTP-Only (XSS protection) is not effective if you have OAuth
https://ift.tt/UXNYyun
Submitted July 30, 2024 at 12:27AM by MoreMoreMoreM
via reddit https://ift.tt/PyX0HBd
https://ift.tt/UXNYyun
Submitted July 30, 2024 at 12:27AM by MoreMoreMoreM
via reddit https://ift.tt/PyX0HBd
salt.security
Over 1 Million websites are at risk of sensitive information leakage
What better way to showcase a new attack technique than with real-world examples? This blog post will do just that.
Uncovering Hardcoded Root Password in VStarcam CB73 Security Camera
https://ift.tt/btiTnfI
Submitted July 29, 2024 at 02:20AM by mattbrwn0
via reddit https://ift.tt/rtZiThI
https://ift.tt/btiTnfI
Submitted July 29, 2024 at 02:20AM by mattbrwn0
via reddit https://ift.tt/rtZiThI
Extending Burp Suite for fun and profit - The Montoya way - Part 6 - Burp Scanner
https://ift.tt/aNQYli9
Submitted July 30, 2024 at 07:32PM by 0xdea
via reddit https://ift.tt/e2Kxlrj
https://ift.tt/aNQYli9
Submitted July 30, 2024 at 07:32PM by 0xdea
via reddit https://ift.tt/e2Kxlrj
hn security
Extending Burp Suite for fun and profit - The Montoya way - Part 6 - hn security
Setting up the environment + Hello […]
Bloodhound Community Edition issue
https://ift.tt/AL2GaQJ
Submitted July 30, 2024 at 07:02PM by TheIron47Wolf
via reddit https://ift.tt/7cSN25E
https://ift.tt/AL2GaQJ
Submitted July 30, 2024 at 07:02PM by TheIron47Wolf
via reddit https://ift.tt/7cSN25E
Medium
The Ultimate Guide for BloodHound Community Edition (BHCE)
I’ve run into many interested hackers who want to learn how to use BloodHound, but struggle to get started. Here’s how to be effective!
Credential Disclosure in LastPass
https://ift.tt/kl34V0E
Submitted July 31, 2024 at 02:01PM by Acrobatic-Pen-9949
via reddit https://ift.tt/rq3VEn9
https://ift.tt/kl34V0E
Submitted July 31, 2024 at 02:01PM by Acrobatic-Pen-9949
via reddit https://ift.tt/rq3VEn9
MITMing the Xbox 360 Dashboard for Fun and RCE
https://ift.tt/7h28GKk
Submitted July 31, 2024 at 10:27PM by anxxa
via reddit https://ift.tt/DrsC213
https://ift.tt/7h28GKk
Submitted July 31, 2024 at 10:27PM by anxxa
via reddit https://ift.tt/DrsC213
landaire.net
MITMing the Xbox 360 Dashboard for Fun and RCE
The golden era of man-in-the-middle attacks
Create your own custom implant for Initial Access - Blog
https://ift.tt/oKEXy7A
Submitted July 31, 2024 at 11:42PM by PersonalState343
via reddit https://ift.tt/BykVJSp
https://ift.tt/oKEXy7A
Submitted July 31, 2024 at 11:42PM by PersonalState343
via reddit https://ift.tt/BykVJSp
Ribbit-ing Cybersecurity
Create your own custom implant
A few days ago I read a fantastic blog post by Forrest Kalser that piqued my curiosity. In the blog post, noscriptd ‘Deep Sea Phishing Pt.1’, Kalser ar
Patching client-side React JS to gain admin access to a Siemens cloud application
https://ift.tt/qL6ic7n
Submitted August 01, 2024 at 02:28AM by EatonZ
via reddit https://ift.tt/qcwNUAW
https://ift.tt/qL6ic7n
Submitted August 01, 2024 at 02:28AM by EatonZ
via reddit https://ift.tt/qcwNUAW
The New Stack
Plug Security Holes in React Apps That Can Lead to API Exploitation
Understanding the Risks of Client-Side Authentication: Why relying on client-side security isn’t enough.
From Limited file read to full access on Jenkins (CVE-2024-23897)
https://ift.tt/EbxS6Le
Submitted August 01, 2024 at 03:54PM by xkarezma
via reddit https://ift.tt/bHlrqQe
https://ift.tt/EbxS6Le
Submitted August 01, 2024 at 03:54PM by xkarezma
via reddit https://ift.tt/bHlrqQe
Ahmed Sherif
From Limited file read to full access on Jenkins (CVE-2024-23897)
TL;DR:
Wristband launches multi-tenant auth platform today. They are offering free SSO, RBAC and MFA.
https://ift.tt/lNEFdfg
Submitted August 01, 2024 at 06:57PM by jardiohead
via reddit https://ift.tt/mecYQFq
https://ift.tt/lNEFdfg
Submitted August 01, 2024 at 06:57PM by jardiohead
via reddit https://ift.tt/mecYQFq
Product Hunt
Wristband - Product Information, Latest Updates, and Reviews 2024 | Product Hunt
Wristband makes it fast and easy for B2B startups and SMBs to build multi-tenant customer authentication and access controls into their app.
Windows AppLocker Driver LPE Vulnerability - CVE-2024-21338
https://ift.tt/9Te7Aba
Submitted August 01, 2024 at 08:49PM by Void_Sec
via reddit https://ift.tt/4za0qNO
https://ift.tt/9Te7Aba
Submitted August 01, 2024 at 08:49PM by Void_Sec
via reddit https://ift.tt/4za0qNO
Crowdfense
Windows AppLocker Driver LPE Vulnerability - CVE-2024-21338 - Crowdfense
In-depth analysis of CVE-2024-21338, a Windows Kernel Elevation of Privileges vulnerability, its root cause, exploitation challenges and POC
Bypassing Rockwell Automation Logix Controllers’ Local Chassis Security Protection
https://ift.tt/Ma7ZYxH
Submitted August 01, 2024 at 10:37PM by sh0n1z
via reddit https://ift.tt/gVrP1BO
https://ift.tt/Ma7ZYxH
Submitted August 01, 2024 at 10:37PM by sh0n1z
via reddit https://ift.tt/gVrP1BO
Claroty
Bypassing Rockwell Automation Logix Controllers’ Local Chassis Security Protection
Team82 has uncovered a security bypass vulnerability in a Rockwell Automation ControlLogix 1756 local chassis security feature called the trusted slot, which is designed to deny untrusted communication from untrusted network cards on the chassis plane.
Auditing Atlassian Plugins, 53 0-Days Later| Atlassian Research Part 1
https://ift.tt/m08BZHL
Submitted August 02, 2024 at 03:16PM by _cydave
via reddit https://ift.tt/gZqO9C4
https://ift.tt/m08BZHL
Submitted August 02, 2024 at 03:16PM by _cydave
via reddit https://ift.tt/gZqO9C4
Cyllective
Auditing Atlassian Plugins, 53 0-Days Later
Explaining the process and tooling behind our way of auditing Atlassian plugins, 53 0Days later.
GitHub - mlcsec/huntsman: Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io
https://ift.tt/13qxZEW
Submitted July 31, 2024 at 10:43PM by Frequent_Passenger82
via reddit https://ift.tt/o71qZcV
https://ift.tt/13qxZEW
Submitted July 31, 2024 at 10:43PM by Frequent_Passenger82
via reddit https://ift.tt/o71qZcV
GitHub
GitHub - mlcsec/huntsman: Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io
Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io - mlcsec/huntsman
Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
https://ift.tt/rdn2FKV
Submitted August 02, 2024 at 08:33PM by toyojuni
via reddit https://ift.tt/5J2K6xc
https://ift.tt/rdn2FKV
Submitted August 02, 2024 at 08:33PM by toyojuni
via reddit https://ift.tt/5J2K6xc
GMO Flatt Security Research
Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
Introduction
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
In 2023, James Kettle
of PortSwigger published an excellent paper
noscriptd Smashing the state machine: the true potential of web race conditions.
In the paper, he introduced…
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
In 2023, James Kettle
of PortSwigger published an excellent paper
noscriptd Smashing the state machine: the true potential of web race conditions.
In the paper, he introduced…
Why You Should Treat Large Language Models as Potential Attackers
https://ift.tt/wW9NQj3
Submitted August 02, 2024 at 11:51PM by jat0369
via reddit https://ift.tt/2ocyAgk
https://ift.tt/wW9NQj3
Submitted August 02, 2024 at 11:51PM by jat0369
via reddit https://ift.tt/2ocyAgk
Cyberark
AI Treason: The Enemy Within
tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...
Polyfill Supply Chain Attack
https://ift.tt/nJ7dT4P
Submitted August 04, 2024 at 08:57PM by FreshConversation639
via reddit https://ift.tt/xjwmHTk
https://ift.tt/nJ7dT4P
Submitted August 04, 2024 at 08:57PM by FreshConversation639
via reddit https://ift.tt/xjwmHTk
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Polyfill Supply Chain Attack
A supply chain attack via Polyfill, a common open-source library written in JavaScript, used in web development to provide modern functionality on older browsers like IE7 that did not support it...
Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 2 : AS REP Roasting
https://ift.tt/NQVpXxy
Submitted August 05, 2024 at 02:34PM by -vzh-
via reddit https://ift.tt/zuhT7JX
https://ift.tt/NQVpXxy
Submitted August 05, 2024 at 02:34PM by -vzh-
via reddit https://ift.tt/zuhT7JX
Cybersécurité - INTRINSEC
Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team – Part 2 : AS_REP Roasting
Explore essential OPSEC practices for Red Teams and advanced detection strategies for Blue Teams, focusing on the Kerberos protocol
CTI Research
https://ift.tt/9ZYAhjc
Submitted August 05, 2024 at 02:17PM by Cyber-Constable-247
via reddit https://ift.tt/bXSVhPJ
https://ift.tt/9ZYAhjc
Submitted August 05, 2024 at 02:17PM by Cyber-Constable-247
via reddit https://ift.tt/bXSVhPJ
Qualtrics
Non-technical methods of sharing Cyber Threat Intelligence: The Professional's view
I'm inviting you to participate in a brief (approx. 10 minutes) online survey to explore how trust in a consortium influences information sharing behaviour.
Supply Chain Security Harm Reduction with 3TOFU
https://ift.tt/LDA8CHQ
Submitted August 05, 2024 at 08:41PM by maltfield
via reddit https://ift.tt/iKLZ86v
https://ift.tt/LDA8CHQ
Submitted August 05, 2024 at 08:41PM by maltfield
via reddit https://ift.tt/iKLZ86v
Michael Altfield's Tech Blog
3TOFU: Verifying Unsigned Releases - Michael Altfield's Tech Blog
Introducing 3TOFU -- a Harm-Reduction process to Supply Chain Security when downloading software that cannot be verified cryptographically