New free 10h OpenSecurityTraining2 class: "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov is now released
https://ost2.fyi/TC1102
Submitted October 06, 2024 at 05:08PM by OpenSecurityTraining
via reddit https://ift.tt/vmGjH8c
https://ost2.fyi/TC1102
Submitted October 06, 2024 at 05:08PM by OpenSecurityTraining
via reddit https://ift.tt/vmGjH8c
p.ost2.fyi
Intermediate Trusted Platform Module (TPM) usage
Learning how to use the most popular complex functions of Trusted Platform Modules (TPMs)
Hacking Windows through iTunes - Local Privilege Escalation 0-day (CVE-2024–44193)
https://ift.tt/2Ly61rN
Submitted October 07, 2024 at 05:29PM by Titokhan
via reddit https://ift.tt/uoT4Pv0
https://ift.tt/2Ly61rN
Submitted October 07, 2024 at 05:29PM by Titokhan
via reddit https://ift.tt/uoT4Pv0
GitHub
GitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes - Local Privilege Escalation 0-day
Hacking Windows through iTunes - Local Privilege Escalation 0-day - mbog14/CVE-2024-44193
Monocle on Chronicles - Talkback automated infosec aggregator with a newsletter
https://ift.tt/Tac7pen
Submitted October 08, 2024 at 02:47PM by AnimalStrange
via reddit https://ift.tt/c3doK96
https://ift.tt/Tac7pen
Submitted October 08, 2024 at 02:47PM by AnimalStrange
via reddit https://ift.tt/c3doK96
Elttam
A Monocle on Chronicles - elttam
elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments.
Docker Zombie Layers: Why Deleted Layers Can Still Haunt You
https://ift.tt/4LROQvZ
Submitted October 08, 2024 at 04:44PM by guedou
via reddit https://ift.tt/jWY5gE3
https://ift.tt/4LROQvZ
Submitted October 08, 2024 at 04:44PM by guedou
via reddit https://ift.tt/jWY5gE3
GitGuardian Blog - Take Control of Your Secrets Security
Docker Zombie Layers: Why Deleted Layers Can Still Haunt You
Docker Zombie Layers are unreferenced image layers that continue to exist for weeks in registries, even after being removed from a manifest. In this hands-on deep dive, we explore how these layers can persist in registries and why ensuring the immediate revocation…
Open Sourcing Venator – a kubernetes-native threat detection system
https://ift.tt/zTjVHva
Submitted October 08, 2024 at 04:38PM by No_Piccolo_6303
via reddit https://ift.tt/6QrbD8s
https://ift.tt/zTjVHva
Submitted October 08, 2024 at 04:38PM by No_Piccolo_6303
via reddit https://ift.tt/6QrbD8s
Medium
Open Sourcing Venator
a kubernetes-native threat detection system
Launched Today: The NHI Index
https://non-human.id
Submitted October 08, 2024 at 09:10PM by shlumper3
via reddit https://ift.tt/ZJvjBay
https://non-human.id
Submitted October 08, 2024 at 09:10PM by shlumper3
via reddit https://ift.tt/ZJvjBay
Clutch
NHI Index
The NHI Index is a centralized resource for understanding, managing, and securing Non-Human Identities like API keys, tokens, secrets, and service accounts. Explore mapping of 360+ NHIs and access essential resources to enhance security.
EKUwu: Not just another AD CS ESC
https://ift.tt/4iaVvnx
Submitted October 08, 2024 at 11:57PM by AlmondOffSec
via reddit https://ift.tt/cpNA2Jz
https://ift.tt/4iaVvnx
Submitted October 08, 2024 at 11:57PM by AlmondOffSec
via reddit https://ift.tt/cpNA2Jz
TrustedSec
EKUwu: Not just another AD CS ESC
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…
Ivanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)
https://ift.tt/d5xhWLf
Submitted October 08, 2024 at 11:56PM by AlmondOffSec
via reddit https://ift.tt/yXfw1KO
https://ift.tt/d5xhWLf
Submitted October 08, 2024 at 11:56PM by AlmondOffSec
via reddit https://ift.tt/yXfw1KO
Amberwolf
Ivanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)
Today, we are releasing the details of CVE-2024-37404, a zero-day vulnerability in the Ivanti Connect Secure product. This vulnerability allows an authenticated administrator to execute arbitrary code with `root` privileges on the underlying system.
How to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
https://ift.tt/LxrKBvW
Submitted October 09, 2024 at 02:49AM by MegaManSec2
via reddit https://ift.tt/sLihfdp
https://ift.tt/LxrKBvW
Submitted October 09, 2024 at 02:49AM by MegaManSec2
via reddit https://ift.tt/sLihfdp
Sonarsource
Why Code Security Matters - Even in Hardened Environments
This blog post showcases why fundamental code security is essential for an application despite all hardening measures applied in the underlying infrastructure.
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3
https://ift.tt/G6zLdgB
Submitted October 09, 2024 at 06:36PM by 0xdea
via reddit https://ift.tt/uIl6ay0
https://ift.tt/G6zLdgB
Submitted October 09, 2024 at 06:36PM by 0xdea
via reddit https://ift.tt/uIl6ay0
hn security
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3 - hn security
In the previous part of the […]
MITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter plugin
https://ift.tt/gO4tkNL
Submitted October 09, 2024 at 05:54PM by L015H4CK
via reddit https://ift.tt/fPsiyJZ
https://ift.tt/gO4tkNL
Submitted October 09, 2024 at 05:54PM by L015H4CK
via reddit https://ift.tt/fPsiyJZ
Medium
Emulating complete, realistic cyber attack chains with the new Caldera Bounty Hunter plugin
Authors: Louis Hackländer-Jansen
Palo Alto Expedition: From N-Day to Full Compromise – Horizon3.ai
https://ift.tt/yHX0qvI
Submitted October 09, 2024 at 10:29PM by scopedsecurity
via reddit https://ift.tt/ezXtkOT
https://ift.tt/yHX0qvI
Submitted October 09, 2024 at 10:29PM by scopedsecurity
via reddit https://ift.tt/ezXtkOT
Horizon3.ai
Palo Alto Expedition: From N-Day to Full Compromise
Technical analysis and indicators of compromise for Palo Alto Expedition CVE-2024-5910, CVE-2024-9464, CVE-2024-9465, and CVE-2024-9466 leading to system compromise and credential exposure.
Axis Camera takeover alternative
https://ift.tt/cM6GIFJ
Submitted October 10, 2024 at 01:21AM by S3cur3Th1sSh1t
via reddit https://ift.tt/xSgrGA5
https://ift.tt/cM6GIFJ
Submitted October 10, 2024 at 01:21AM by S3cur3Th1sSh1t
via reddit https://ift.tt/xSgrGA5
www.r-tec.net
Blog Axis Camera APP takeover
r-tec recently analysed an Axis IP Camera of the model F9111 in a penetrationtest for one of our customers.
Measuring Detection Coverage
https://ift.tt/QYEvKxD
Submitted October 10, 2024 at 01:20PM by netbiosX
via reddit https://ift.tt/qk6AEJs
https://ift.tt/QYEvKxD
Submitted October 10, 2024 at 01:20PM by netbiosX
via reddit https://ift.tt/qk6AEJs
Purple Team
Measuring Detection Coverage
Purple Teaming and Detection Engineering even though that as a concept exist in the information security industry for years lack of specific standardization, models and metrics. The absence of dedi…
Can You Get Root With Only a Cigarette Lighter?
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
Redefining Ransomware Attacks on AWS using AWS KMS XKS
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
Medium
Perfecting Ransomware on AWS — Using ‘keys to the kingdom’ to change the locks
I unveil a new post exploit attack vector that allows devastating ransomware attacks on compromised AWS account along with preventive…
Aw, Sugar. Critical Vulnerabilities in SugarWOD
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
SOC in 5 minutes! 🚀🔒 Set up your SOC with Wazuh, SOCFortress CoPilot, and Velociraptor #SOCSetup #blueteam #redteam
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
GitHub
GitHub - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy: Java Android Magisk Burp Objection Root Emulator Easy…
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE) - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
CSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilities
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
GitHub
GitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT). - doyensec/CSPTPlayground
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
Gist
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md
Tool for File Analysis
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
Top 10 Nhà cái uy tín
Top 10+ Nhà Cái Uy Tín Nhất Việt Nam 2025 - Đã Xác Thực 100%
Khám phá top 10+ nhà cái uy tín được kiểm định và xác thực 100% từ các chuyên gia cá cược, đảm bảo trải nghiệm cá cược tốt nhất cho người chơi