Call For Papers - Hackfest 2024 - Quebec City, Canada
https://ift.tt/L6ygEOT
Submitted August 21, 2024 at 07:56PM by pathetiq
via reddit https://ift.tt/Ld5kP8K
https://ift.tt/L6ygEOT
Submitted August 21, 2024 at 07:56PM by pathetiq
via reddit https://ift.tt/Ld5kP8K
cfp.hackfest.ca
Hackfest 2024 - 16-bit Edition
Schedule, talks and talk submissions for Hackfest 2024 - 16-bit Edition
BLUUID: Firewallas, Diabetics, And… Bluetooth
https://ift.tt/bjV01Km
Submitted August 22, 2024 at 04:15AM by netsecfriends
via reddit https://ift.tt/5p2uglU
https://ift.tt/bjV01Km
Submitted August 22, 2024 at 04:15AM by netsecfriends
via reddit https://ift.tt/5p2uglU
GreyNoise Labs
GreyNoise Labs - BLUUID: Firewallas, Diabetics, And… Bluetooth
Where I introduce the subject of remotely identifying bluetooth devices, propose that healthcare device oversight is lacking, and exploit a firewall for no reason other than to prove a point.
Best MFA Tools for 2024: Top Picks for Stronger Security
https://ift.tt/ZCSue2f
Submitted August 22, 2024 at 01:27PM by Kapildev_Arulmozhi
via reddit https://ift.tt/zwYlkFJ
https://ift.tt/ZCSue2f
Submitted August 22, 2024 at 01:27PM by Kapildev_Arulmozhi
via reddit https://ift.tt/zwYlkFJ
www.infisign.ai
9 Best Multi-Factor Authentication (MFA) Software in 2024
In today's increasingly digital world, where cyber threats lurk around every corner, securing your online accounts is more important than ever. While passwords remain a cornerstone of security, they're no longer enough. This is where Multi-Factor Authentication…
Gotta cache 'em all: bending the rules of web cache exploitation
https://ift.tt/SNnop8A
Submitted August 22, 2024 at 05:16PM by albinowax
via reddit https://ift.tt/0Rw25Xf
https://ift.tt/SNnop8A
Submitted August 22, 2024 at 05:16PM by albinowax
via reddit https://ift.tt/0Rw25Xf
PortSwigger Research
Gotta cache 'em all: bending the rules of web cache exploitation
Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads. However, as CDNs became more popular, new discrepancies between propriet
Details about CVE-2024-22263: Spring Cloud Dataflow Arbitrary File Writing
https://ift.tt/qN86fQ9
Submitted August 22, 2024 at 07:56PM by SL7reach
via reddit https://ift.tt/D1fuaQJ
https://ift.tt/qN86fQ9
Submitted August 22, 2024 at 07:56PM by SL7reach
via reddit https://ift.tt/D1fuaQJ
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2024-22263: Spring Cloud Dataflow Arbitrary File Writing
Introduction Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes, is vulnerable to an arbitrary file write issue. The...
Apps falsos ameaçam dados bancários
https://ift.tt/MQaDknr
Submitted August 23, 2024 at 12:03AM by Securityboy09
via reddit https://ift.tt/nI1ACSF
https://ift.tt/MQaDknr
Submitted August 23, 2024 at 12:03AM by Securityboy09
via reddit https://ift.tt/nI1ACSF
Caveiratech
Apps falsos ameaçam dados bancários | CaveiraTech
Apps falsos ameaçam dados bancários: Cibercriminosos estão utilizando Progressive Web Applications (PWAs) para imitar aplicativos de bancos e roubar credenciais de usuários Android e iOS. Empregando táticas como chamadas automatizadas e malvertising, essas…
Splitting the email atom: exploiting parsers to bypass access controls
https://ift.tt/NGJQckp
Submitted August 23, 2024 at 12:20PM by garethheyes
via reddit https://ift.tt/AW5QJkX
https://ift.tt/NGJQckp
Submitted August 23, 2024 at 12:20PM by garethheyes
via reddit https://ift.tt/AW5QJkX
PortSwigger Research
Splitting the email atom: exploiting parsers to bypass access controls
Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser discrepancies critical. Predicting which domain an
GIAC Unoffical | Facebook
https://ift.tt/ldSWumN
Submitted August 23, 2024 at 01:15PM by LibrarianNext5732
via reddit https://ift.tt/D0xvRCw
https://ift.tt/ldSWumN
Submitted August 23, 2024 at 01:15PM by LibrarianNext5732
via reddit https://ift.tt/D0xvRCw
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
NTLM Credential Theft in Python Windows Applications – Horizon3.ai
https://ift.tt/9JlxTt0
Submitted August 23, 2024 at 07:23PM by scopedsecurity
via reddit https://ift.tt/5e8q6ZC
https://ift.tt/9JlxTt0
Submitted August 23, 2024 at 07:23PM by scopedsecurity
via reddit https://ift.tt/5e8q6ZC
Horizon3.ai
NTLM Credential Theft in Python Windows Applications
NTLM credential theft vulnerabilities in Python Windows applications: Jupyter Notebook CVE-2024-35178, Streamlit from Snowflake CVE-2024-42474 and Hugging Face Gradio CVE-2024-34510
How 1 Exposed Honeywell API Gave us Control Over an Internal Engineering System
https://ift.tt/ebHsku3
Submitted August 23, 2024 at 09:09PM by EatonZ
via reddit https://ift.tt/NX8oi4H
https://ift.tt/ebHsku3
Submitted August 23, 2024 at 09:09PM by EatonZ
via reddit https://ift.tt/NX8oi4H
www.traceable.ai
Traceable - Blog: How 1 Exposed Honeywell API Gave us Control Over an Internal Engineering System
APIs are essential for modern web applications, but they also introduce significant security challenges. Even large enterprises can fall prey to simple API vulnerabilities, as demonstrated by Traceable's discovery of a critical security flaw in Honeywell’s…
Vulnerabilities in Homepage Dashboard - Anvil Secure
https://ift.tt/A8Z2fO0
Submitted August 23, 2024 at 09:26PM by anvilventures
via reddit https://ift.tt/TKvPexj
https://ift.tt/A8Z2fO0
Submitted August 23, 2024 at 09:26PM by anvilventures
via reddit https://ift.tt/TKvPexj
Anvil Secure
Vulnerabilities in Homepage Dashboard - Anvil Secure
Homepage is an open-source dashboard with over 100 integrations. This article shows how multiple vulnerabilities were found and exploited in its latest version at that time (v0.8.13), for example, to achieve code execution in Jellyfin.
LLM01: Prompt Injection Explained With Practical Example: Protecting Your LLM from Malicious Input
https://ift.tt/cQYDkXm
Submitted August 24, 2024 at 07:56PM by Prestigious-Main1468
via reddit https://ift.tt/qrkVeCz
https://ift.tt/cQYDkXm
Submitted August 24, 2024 at 07:56PM by Prestigious-Main1468
via reddit https://ift.tt/qrkVeCz
Medium
LLM01: Prompt Injection Explained With Practical Example: Protecting Your LLM from Malicious Input
Prompt Injection in AI: Common Attack Scenarios and How to Mitigate Them
SLUBStick risk assessment for embedded systems
https://ift.tt/640IFpD
Submitted August 26, 2024 at 12:46AM by hardenedvault
via reddit https://ift.tt/Al42RbT
https://ift.tt/640IFpD
Submitted August 26, 2024 at 12:46AM by hardenedvault
via reddit https://ift.tt/Al42RbT
hardenedvault.net
SLUBStick risk assessment for embedded systems
SLUBStick risk assessment for embedded systems The Linux kernel is susceptible to memory safety vulnerabilities due to its size and complexity.
GNU/Linux Sandboxing - A Brief Review
https://ift.tt/O8JCsYf
Submitted August 26, 2024 at 07:31PM by citypw
via reddit https://ift.tt/Wl6NcS4
https://ift.tt/O8JCsYf
Submitted August 26, 2024 at 07:31PM by citypw
via reddit https://ift.tt/Wl6NcS4
hardenedlinux.org
GNU/Linux Sandboxing - A Brief Review
An incomplete review of the sandbox solutions on the GNU/Linux operating system.
POC for CVE-2024-38063 (RCE in Windows TCP/IP)
https://ift.tt/AsgHukB
Submitted August 25, 2024 at 06:13PM by goodbyeselene
via reddit https://ift.tt/JN4clam
https://ift.tt/AsgHukB
Submitted August 25, 2024 at 06:13PM by goodbyeselene
via reddit https://ift.tt/JN4clam
GitHub
GitHub - ynwarcs/CVE-2024-38063: poc for CVE-2024-38063 (RCE in tcpip.sys)
poc for CVE-2024-38063 (RCE in tcpip.sys). Contribute to ynwarcs/CVE-2024-38063 development by creating an account on GitHub.
Request Interceptor - A Lightweight Firefox Extension for intercepting/sending HTTP requests
https://ift.tt/glzWPjK
Submitted August 25, 2024 at 08:31AM by Nervous-Debate-4417
via reddit https://ift.tt/Tqd2iJo
https://ift.tt/glzWPjK
Submitted August 25, 2024 at 08:31AM by Nervous-Debate-4417
via reddit https://ift.tt/Tqd2iJo
addons.mozilla.org
Request Interceptor – Get this Extension for 🦊 Firefox (en-US)
Download Request Interceptor for Firefox. A Firefox extension that intercepts and edits HTTP requests, allowing you to view, customize, and send them directly from your browser. Incredibly easy and comfortable to use. Good for penetration testers and developers.
ShellSilo: state-of-the-art tool that converts custom C syntax to syscall assembly/shellcode.
https://ift.tt/WE9B5Je
Submitted August 25, 2024 at 04:28AM by Dismal-Ad-494
via reddit https://ift.tt/MtjzARh
https://ift.tt/WE9B5Je
Submitted August 25, 2024 at 04:28AM by Dismal-Ad-494
via reddit https://ift.tt/MtjzARh
GitHub
GitHub - nixpal/shellsilo: SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding…
SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning varia...
Automated Bug Hunting With Semgrep
https://ift.tt/A4KCrs7
Submitted August 26, 2024 at 11:38PM by somersetrecon
via reddit https://ift.tt/xc2LuRl
https://ift.tt/A4KCrs7
Submitted August 26, 2024 at 11:38PM by somersetrecon
via reddit https://ift.tt/xc2LuRl
Somerset Recon
Automated Bug Hunting With Semgrep — Somerset Recon
This presentation covers a static analysis tool Semgrep and how it can be leveraged to find different vulnerabilities in a variety of languages. We initially presented “Automated Bug Hunting with Semgrep” at a local event in San Diego. Due to the positive…
Back to School - Exploiting a Remote Code Execution Vulnerability in Moodle
https://ift.tt/ZsbH8QB
Submitted August 27, 2024 at 02:09PM by RedTeamPentesting
via reddit https://ift.tt/DcJjlA4
https://ift.tt/ZsbH8QB
Submitted August 27, 2024 at 02:09PM by RedTeamPentesting
via reddit https://ift.tt/DcJjlA4
RedTeam Pentesting - Blog
Back to School - Exploiting a Remote Code Execution Vulnerability in Moodle
Surprisingly often, implementations include functionality where user input is passed to dangerous functions like PHP’s eval() - despite clear warnings. Often, devs are somewhat aware of this danger and attempt to sanitize the input, but this approach …
Taking the Crossroads: The Versa Director Zero-Day Exploitation
https://ift.tt/fGMAd9J
Submitted August 27, 2024 at 08:24PM by YogiBerra88888
via reddit https://ift.tt/yXMk2mP
https://ift.tt/fGMAd9J
Submitted August 27, 2024 at 08:24PM by YogiBerra88888
via reddit https://ift.tt/yXMk2mP
Lumen Blog
Taking the Crossroads: The Versa Director Zero-Day Exploitation
Black Lotus Labs uncovered a zero-day exploit in Versa Director servers. Learn its impact on SD-WAN security and how to mitigate threats.
I found 14 CVEs by downloading every Wordpress plugin and scanning all of it with Semgrep - full dataset published if you want to do some sifting yourself, there's plenty of output I haven't looked at.
https://ift.tt/BJQv1iS
Submitted August 28, 2024 at 02:09AM by ezzzzz
via reddit https://ift.tt/uFs682D
https://ift.tt/BJQv1iS
Submitted August 28, 2024 at 02:09AM by ezzzzz
via reddit https://ift.tt/uFs682D
Research Blog | Project Black
CVE Hunting Made Easy
In just three Sunday afternoons, I discovered 14 CVEs - and you can too! CVE hunting is more accessible than many realise, and the methodology outlined here requires only a bit of coding knowledge.