Feeld dating app - Your nudes and data were publicly available
https://ift.tt/lmiPkrc
Submitted September 11, 2024 at 12:55PM by adrian_rt
via reddit https://ift.tt/v9DYFIX
https://ift.tt/lmiPkrc
Submitted September 11, 2024 at 12:55PM by adrian_rt
via reddit https://ift.tt/v9DYFIX
Cyber Security Services - London
Feeld dating app - Your nudes and data were publicly available
Discover critical Feeld app vulnerabilities from our pentest. See how flaws in security controls expose personal data and learn key fixes.
The Security Canary Maturity Model
https://ift.tt/69xoD8p
Submitted September 11, 2024 at 01:57PM by tracebit
via reddit https://ift.tt/vjZMBVw
https://ift.tt/69xoD8p
Submitted September 11, 2024 at 01:57PM by tracebit
via reddit https://ift.tt/vjZMBVw
Tracebit
The Security Canary Maturity Model | Tracebit
We layout the different levels of maturity your organization may be at in their Security Canary Maturity, as well as discussing the value in maturity models themselves.
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labs
https://ift.tt/LY6Hxwl
Submitted September 11, 2024 at 04:15PM by dx7r__
via reddit https://ift.tt/VKFCN3p
https://ift.tt/LY6Hxwl
Submitted September 11, 2024 at 04:15PM by dx7r__
via reddit https://ift.tt/VKFCN3p
watchTowr Labs
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
A new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labs
https://ift.tt/WCXab4G
Submitted September 11, 2024 at 05:24PM by f3d_0x0
via reddit https://ift.tt/kMRpqfz
https://ift.tt/WCXab4G
Submitted September 11, 2024 at 05:24PM by f3d_0x0
via reddit https://ift.tt/kMRpqfz
Cleafy
A new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labs
Explore Cleafy's analysis of a newly discovered TrickMo variant, revealing enhanced malware capabilities and critical endpoints used for storing stolen credentials and data from victims. Here is the latest threat analyst report.
Why Django’s [DEBUG=True] is a Goldmine for Hackers
https://ift.tt/nLPQF0M
Submitted September 11, 2024 at 08:22PM by Justin_coco
via reddit https://ift.tt/awStuKk
https://ift.tt/nLPQF0M
Submitted September 11, 2024 at 08:22PM by Justin_coco
via reddit https://ift.tt/awStuKk
Medium
Why Django’s [DEBUG=True] is a Goldmine for Hackers
Misconfigurations are often the weakest link in an otherwise secure environment. One of the most dangerous yet easily overlooked…
SSH Keystroke Obfuscation Bypass
https://ift.tt/cXjya97
Submitted September 12, 2024 at 01:25AM by netsec_burn
via reddit https://ift.tt/QZ8UxjK
https://ift.tt/cXjya97
Submitted September 12, 2024 at 01:25AM by netsec_burn
via reddit https://ift.tt/QZ8UxjK
crzphil.github.io
SSH Keystroke Obfuscation Bypass
A disclosure for an OpenSSH keystroke obfuscation bypass affecting current OpenSSH versions after 9.4.
Blog Post: Intelligent Adversary Emulation with the Bounty Hunter
https://ift.tt/z0LinYb
Submitted September 12, 2024 at 02:53PM by L015H4CK
via reddit https://ift.tt/hT36u7J
https://ift.tt/z0LinYb
Submitted September 12, 2024 at 02:53PM by L015H4CK
via reddit https://ift.tt/hT36u7J
lolcads tech blog
Adversary Emulation is a Complicated Profession - Intelligent Cyber Adversary Emulation with the Bounty Hunter
This blog post introduces the Bounty Hunter - a novel Caldera plugin for intelligent cyber adversary emulation. Its main contribution is the emulation of complete, realistic cyber attack chains. The Plugin is available on [**GitHub**](https://github.com/fkie…
CVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection tool
https://ift.tt/olB5XMs
Submitted September 12, 2024 at 08:08PM by 0x9000
via reddit https://ift.tt/5W2ICMk
https://ift.tt/olB5XMs
Submitted September 12, 2024 at 08:08PM by 0x9000
via reddit https://ift.tt/5W2ICMk
SEC Consult
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Repair functions of Microsoft Windows MSI installers can be vulnerable in several ways, for instance allowing local attackers to escalate their privileges to SYSTEM rights. This vulnerability is referenced as CVE-2024-38014.
AlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreter
https://ift.tt/aeAH4uq
Submitted September 12, 2024 at 09:26PM by Traditional_Steak841
via reddit https://ift.tt/b7t0eql
https://ift.tt/aeAH4uq
Submitted September 12, 2024 at 09:26PM by Traditional_Steak841
via reddit https://ift.tt/b7t0eql
deda.lol
AlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreter
Gamedevs of the world, unite! Your favourite language is in danger -- the l33t wrongdoers have figured out how to BYOB (Bring Your Own Bytecode) and pwn the Lua v5.4 interpreter!
CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.ai
https://ift.tt/MGqi2U6
Submitted September 13, 2024 at 08:13PM by scopedsecurity
via reddit https://ift.tt/D4OhawG
https://ift.tt/MGqi2U6
Submitted September 13, 2024 at 08:13PM by scopedsecurity
via reddit https://ift.tt/D4OhawG
Horizon3.ai
CVE-2023-28324 Deep Dive: Ivanti Endpoint Manager AgentPortal Improper Input Validation
CVE-2023-28324 Ivanti Endpoint Manager AgentPortal Improper Input Validation Remote Code Execution Vulnerability.
Exploring Deserialization Attacks and Their Effects
https://ift.tt/Kh1oLWl
Submitted September 13, 2024 at 10:39PM by HayMiz
via reddit https://ift.tt/qW6uDtj
https://ift.tt/Kh1oLWl
Submitted September 13, 2024 at 10:39PM by HayMiz
via reddit https://ift.tt/qW6uDtj
haymiz@kali:~/blog$
Exploring Deserialization Attacks and Their Effects
Uncover how deserialization attacks work with real-world example and learn how to mitigate their risks.
Acquiring Malicious Browser Extension Samples on a Shoestring Budget
https://ift.tt/vnlcRJE
Submitted September 14, 2024 at 06:14PM by dashboard_monkey
via reddit https://ift.tt/9dO3bBG
https://ift.tt/vnlcRJE
Submitted September 14, 2024 at 06:14PM by dashboard_monkey
via reddit https://ift.tt/9dO3bBG
pepe berba
Acquiring Malicious Browser Extension Samples on a Shoestring Budget
Cracking the simple encryption scheme used by Genesis Market to hunt for malicious browser extensions
Attacking PowerShell CLIXML Deserialization
https://ift.tt/9dqRcJ4
Submitted September 15, 2024 at 10:16PM by 19829381
via reddit https://ift.tt/LwzXFgy
https://ift.tt/9dqRcJ4
Submitted September 15, 2024 at 10:16PM by 19829381
via reddit https://ift.tt/LwzXFgy
Truesec
Attacking PowerShell CLIXML Deserialization
In this article, we will learn that using PowerShell's CLIXML deserialization could lead to undesired effects, including remote code execution.
Escalating from Reader to Contributor in Azure API Management
https://ift.tt/xrOIoyt
Submitted September 15, 2024 at 09:43PM by piraterapper
via reddit https://ift.tt/QRa8ft6
https://ift.tt/xrOIoyt
Submitted September 15, 2024 at 09:43PM by piraterapper
via reddit https://ift.tt/QRa8ft6
Binary Security AS
Escalating from Reader to Contributor in Azure API Management
This blog post shows how a user with Reader-level access to an Azure API Management resource actually had the equivalent of Contributor-level access, allowing the user to read, modify and even delete configurations of the resource via the Direct Management…
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)
https://ift.tt/ikZKWP0
Submitted September 16, 2024 at 06:42PM by CyberSecurityIs
via reddit https://ift.tt/LWQudJV
https://ift.tt/ikZKWP0
Submitted September 16, 2024 at 06:42PM by CyberSecurityIs
via reddit https://ift.tt/LWQudJV
Csacyber
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)
In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which is the central driver behind AppLocker, the application whitelisting technology built into Windows.
Hacking the Planet - A DEFCON ICS CTF 2024 Retrospective
https://ift.tt/4hG5vC6
Submitted September 16, 2024 at 08:41PM by mdulin2
via reddit https://ift.tt/P7YeN18
https://ift.tt/4hG5vC6
Submitted September 16, 2024 at 08:41PM by mdulin2
via reddit https://ift.tt/P7YeN18
Strikeout Security Blog
Hacking the Planet - A DEFCON ICS CTF 2024 Retrospective
Red Alert ICS CTF Review. Winning a black badge and breaking smart cities.
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability
https://ift.tt/MDL5Xnd
Submitted September 16, 2024 at 09:18PM by scopedsecurity
via reddit https://ift.tt/T1ihELv
https://ift.tt/MDL5Xnd
Submitted September 16, 2024 at 09:18PM by scopedsecurity
via reddit https://ift.tt/T1ihELv
Horizon3.ai
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability and Indicators of Compromise
SmuggleSheild - Basic protection against HTML smuggling attempts.
https://ift.tt/6HgpDM0
Submitted September 17, 2024 at 12:02AM by SkyFallRobin
via reddit https://ift.tt/zFnbX9c
https://ift.tt/6HgpDM0
Submitted September 17, 2024 at 12:02AM by SkyFallRobin
via reddit https://ift.tt/zFnbX9c
GitHub
GitHub - RootUp/SmuggleShield: Protection against HTML smuggling attempts.
Protection against HTML smuggling attempts. Contribute to RootUp/SmuggleShield development by creating an account on GitHub.
A vulnerability in LANCOM LCOS web interface (usually listening on port 443) allows a remote attacker to trigger a heap overflow in the service listening on this port
https://ift.tt/Ezbh8VN
Submitted September 17, 2024 at 03:13PM by SSDisclosure
via reddit https://ift.tt/1HuVEGD
https://ift.tt/Ezbh8VN
Submitted September 17, 2024 at 03:13PM by SSDisclosure
via reddit https://ift.tt/1HuVEGD
SSD Secure Disclosure
SSD Advisory - LANCOM LCOS Heap Overflow - SSD Secure Disclosure
Summary A vulnerability in LANCOM LCOS web interface (usually listening on port 443) allows a remote attacker to trigger a heap overflow in the service listening on this port. Credit An independent security researcher working with SSD Secure Disclosure Vendor…
Direct Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryption
https://ift.tt/WH750xU
Submitted September 17, 2024 at 08:24PM by CyberSecurityIs
via reddit https://ift.tt/IjBO639
https://ift.tt/WH750xU
Submitted September 17, 2024 at 08:24PM by CyberSecurityIs
via reddit https://ift.tt/IjBO639
SureCloud Cyber Services
Direct Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryption | Blog | SureCloud…
Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a password/logon screen that you would like to hack into easily? Well Direct Memory Access (DMA) attacks can easily bypass these security…
Taking over Train infrastructure / Traction power substation and lighting systems in Europe
https://ift.tt/0hoMfzm
Submitted September 17, 2024 at 08:08PM by bertinjoseb
via reddit https://ift.tt/WKefT5q
https://ift.tt/0hoMfzm
Submitted September 17, 2024 at 08:08PM by bertinjoseb
via reddit https://ift.tt/WKefT5q
Medium
Taking over Train infrastructure in Poland /Traction power substation and lighting systems
(6 Months later CZAT 7 Server is offline or changed to another ip address , this post was written 6 months ago, published today 9/2/2024)