Call stack spoofing explained using APT41 malware
https://ift.tt/AnPL4oq
Submitted October 17, 2024 at 06:25PM by CyberMasterV
via reddit https://ift.tt/328ALJZ
https://ift.tt/AnPL4oq
Submitted October 17, 2024 at 06:25PM by CyberMasterV
via reddit https://ift.tt/328ALJZ
ONBUILD COPY . /var/www/pwned/
https://ift.tt/UOlpH7F
Submitted October 18, 2024 at 06:11AM by david-song
via reddit https://ift.tt/x5aZbt4
https://ift.tt/UOlpH7F
Submitted October 18, 2024 at 06:11AM by david-song
via reddit https://ift.tt/x5aZbt4
1-click Exploit in South Korea's biggest mobile chat app
https://ift.tt/OHps6dm
Submitted October 20, 2024 at 08:59PM by AlmondOffSec
via reddit https://ift.tt/mZMhwck
https://ift.tt/OHps6dm
Submitted October 20, 2024 at 08:59PM by AlmondOffSec
via reddit https://ift.tt/mZMhwck
stulle123
1-click Exploit in South Korea's biggest mobile chat app
Stealing another KakaoTalk user’s chat messages with a simple 1-click exploit.
Attacking APIs using JSON Injection
https://ift.tt/S9qmDX4
Submitted October 21, 2024 at 07:27AM by alt69785
via reddit https://ift.tt/IlfTYPQ
https://ift.tt/S9qmDX4
Submitted October 21, 2024 at 07:27AM by alt69785
via reddit https://ift.tt/IlfTYPQ
Dana Epp's Blog
Attacking APIs using JSON Injection
Learn how to use JSON injection to manipulate API payloads to control the flow of data and business logic within an API.
SELinux bypasses
https://ift.tt/5G3m8ZC
Submitted October 23, 2024 at 11:46AM by ffyns
via reddit https://ift.tt/AXVFWKq
https://ift.tt/5G3m8ZC
Submitted October 23, 2024 at 11:46AM by ffyns
via reddit https://ift.tt/AXVFWKq
Klecko Blog
SELinux bypasses
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
SQL Injection Polyglots / nastystereo.com
https://ift.tt/klmhEXL
Submitted October 23, 2024 at 11:45AM by ffyns
via reddit https://ift.tt/Tfi74PU
https://ift.tt/klmhEXL
Submitted October 23, 2024 at 11:45AM by ffyns
via reddit https://ift.tt/Tfi74PU
The EMBA binary analyzer addresses SBOMs with new release - SBOMdorado v1.5.0 is available
https://ift.tt/aYuBhCq
Submitted October 22, 2024 at 10:38PM by _m-1-k-3_
via reddit https://ift.tt/pixUqf4
https://ift.tt/aYuBhCq
Submitted October 22, 2024 at 10:38PM by _m-1-k-3_
via reddit https://ift.tt/pixUqf4
GitHub
Release EMBA v1.5.0 - SBOMdorado · e-m-b-a/emba
The main goal of EMBA was always to get an accurate real life overview of the threats of a firmware image. While a few years ago the target audience were only pentesters, in today’s EMBA world also...
Auth RCE in multiple Xerox printer series
https://ift.tt/vHUcquo
Submitted October 23, 2024 at 02:20PM by 0x9000
via reddit https://ift.tt/uVWgnHj
https://ift.tt/vHUcquo
Submitted October 23, 2024 at 02:20PM by 0x9000
via reddit https://ift.tt/uVWgnHj
SEC Consult
Authenticated Remote Code Execution in multiple Xerox printers
Multiple Xerox printers (EC80xx, AltaLink, VersaLink, WorkCentre) were affected by an authenticated remote code execution vulnerability which allowed an attacker with administrative web credentials to fully compromise the devices with root privileges on the…
Using Nix to Fuzz Test a PDF Parser
https://ift.tt/NnhycRG
Submitted October 23, 2024 at 08:28PM by mtlynch
via reddit https://ift.tt/udDFf9t
https://ift.tt/NnhycRG
Submitted October 23, 2024 at 08:28PM by mtlynch
via reddit https://ift.tt/udDFf9t
mtlynch.io
Using Nix to Fuzz Test a PDF Parser (Part One)
Fuzz testing is a technique for automatically uncovering bugs in software. The problem is that it’s a pain to set up. Read any fuzz testing tutorial, and the first task is an hour of building tools from source and chasing down dependencies upon dependencies.…
China's Quantum Tunneling Breakthrough: The Future of Encryption is at Risk
https://ift.tt/yvN0L3q
Submitted October 24, 2024 at 06:40AM by Xaerr
via reddit https://ift.tt/qWXCcEs
https://ift.tt/yvN0L3q
Submitted October 24, 2024 at 06:40AM by Xaerr
via reddit https://ift.tt/qWXCcEs
Natto Thoughts
The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper
A September paper, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way
Lazarus APT steals cryptocurrency and user data via a decoy MOBA game
https://ift.tt/WOoJxyP
Submitted October 24, 2024 at 02:21PM by rootsh_
via reddit https://ift.tt/HXBknUM
https://ift.tt/WOoJxyP
Submitted October 24, 2024 at 02:21PM by rootsh_
via reddit https://ift.tt/HXBknUM
Securelist
Lazarus APT steals cryptocurrency and user data via a decoy MOBA game
Kaspersky GReAT experts break down the new campaign of Lazarus APT which uses social engineering and exploits a zero-day vulnerability in Google Chrome for financial gain.
AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover
https://ift.tt/NdCWqDt
Submitted October 24, 2024 at 06:40PM by Pale_Fly_2673
via reddit https://ift.tt/FxZet0n
https://ift.tt/NdCWqDt
Submitted October 24, 2024 at 06:40PM by Pale_Fly_2673
via reddit https://ift.tt/FxZet0n
Aqua
AWS CDK Risk: Exploiting a Missing S3 Bucket Allowed Account Takeover
We uncovered a security issue related to the AWS Cloud Development Kit (CDK), covering over 38,000 account IDs, identified where users were susceptible.
Sysdig 2024 Threat Report
https://ift.tt/5nwJUQC
Submitted October 24, 2024 at 08:41PM by MiguelHzBz
via reddit https://ift.tt/ESg9RGf
https://ift.tt/5nwJUQC
Submitted October 24, 2024 at 08:41PM by MiguelHzBz
via reddit https://ift.tt/ESg9RGf
Sysdig
Sysdig 2024 Global Threat Report | Sysdig
We know that cloud attacks happen very quickly. Our 2024 global threat year-in-review, the third annual threat report from the Sysdig Threat Research Team
How it is possible to locate smartphones using Advertising ID without spyware or exploit
https://ift.tt/9aGQ17E
Submitted October 25, 2024 at 01:27PM by barakadua131
via reddit https://ift.tt/WacuZgB
https://ift.tt/9aGQ17E
Submitted October 25, 2024 at 01:27PM by barakadua131
via reddit https://ift.tt/WacuZgB
Mobile Hacker
Locate smartphones using Advertising ID without spyware or exploit
I explain how it is possible to locate Google and Apple smartphones legally by misusing device unique Advertising ID and stream of data collected by advertising plugins. These plugins are part of thousands of popular and legitimate apps.
A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11
https://ift.tt/va5ubMF
Submitted October 25, 2024 at 02:53PM by SSDisclosure
via reddit https://ift.tt/82SBT7w
https://ift.tt/va5ubMF
Submitted October 25, 2024 at 02:53PM by SSDisclosure
via reddit https://ift.tt/82SBT7w
SSD Secure Disclosure
SSD Advisory - Common Log File System (CLFS) driver PE - SSD Secure Disclosure
Summary A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11. The vulnerability is in the CClfsBaseFilePersisted::WriteMetadataBlock function, and is due to return value of ClfsDecodeBlock…
Bench Press: Leaking Text Nodes with CSS
https://ift.tt/fH0lwYd
Submitted October 25, 2024 at 04:02PM by albinowax
via reddit https://ift.tt/R5iXeP2
https://ift.tt/fH0lwYd
Submitted October 25, 2024 at 04:02PM by albinowax
via reddit https://ift.tt/R5iXeP2
pspaul
Bench Press: Leaking Text Nodes with CSS
Some time ago, while reading up on new CSS features, I asked myself: Is it possible to leak the entire content of an HTML text node only using CSS? The answer is yes! Well, kinda. I found a technique
Multiple vulnerabilities in the Realtek card reader driver. Affects Dell, Lenovo, etc
https://ift.tt/QSu7eUX
Submitted October 26, 2024 at 03:30AM by zwclose
via reddit https://ift.tt/cifUAQI
https://ift.tt/QSu7eUX
Submitted October 26, 2024 at 03:30AM by zwclose
via reddit https://ift.tt/cifUAQI
ZwClose
Vulnerabilities of Realtek SD card reader driver, part 1
I discovered multiple vulnerabilities in RtsPer.sys, an SD card reader driver developed by Realtek. These vulnerabilities enable non-privileged users to leak the contents of kernel pool and kernel stack, write to arbitrary kernel memory, and, the most interesting…
LLM Security: Playing with ChatGPT code execution capability (Part 1).
https://ift.tt/Hs5iEl0
Submitted October 26, 2024 at 02:54AM by beyonderdabas
via reddit https://ift.tt/r0LZTlj
https://ift.tt/Hs5iEl0
Submitted October 26, 2024 at 02:54AM by beyonderdabas
via reddit https://ift.tt/r0LZTlj
Mohit Dabas's Blog
LLM Security: Playing with ChatGPT code execution capability (Part 1).
So we all know about the ChatGPT4 code execution capability. Now the question is can I execute a little bit offensive code like running netstat to see internal connections? I tried to run ‘ne…
CVE-2024-26926 Binder n-day analysis
https://ift.tt/pjTdZID
Submitted October 25, 2024 at 01:51AM by pwntheplanet
via reddit https://ift.tt/PzVnYSv
https://ift.tt/pjTdZID
Submitted October 25, 2024 at 01:51AM by pwntheplanet
via reddit https://ift.tt/PzVnYSv
GitHub
LinuxKernel-nday/CVE-2024-26926/CVE_2024_26926_Analysis.pdf at main · MaherAzzouzi/LinuxKernel-nday
Linux Kernel N-day Exploit/Analysis. Contribute to MaherAzzouzi/LinuxKernel-nday development by creating an account on GitHub.
Retrofitting encrypted firmware is a Bad Idea™
https://ift.tt/TLVFvIx
Submitted October 27, 2024 at 06:10PM by AlmondOffSec
via reddit https://ift.tt/DjAQ16x
https://ift.tt/TLVFvIx
Submitted October 27, 2024 at 06:10PM by AlmondOffSec
via reddit https://ift.tt/DjAQ16x
haxx.in
Retrofitting encrypted firmware is a Bad Idea™
Lexmark decided to frustrate vulnerability researchers last minute. Let’s have a look at their new root filesystem encryption.
Akamai and Kyndryl partner for Zero Trust Segmentation defence
https://ift.tt/KhzrYfG
Submitted October 27, 2024 at 07:23PM by vrebtimaj
via reddit https://ift.tt/QuF4ZJM
https://ift.tt/KhzrYfG
Submitted October 27, 2024 at 07:23PM by vrebtimaj
via reddit https://ift.tt/QuF4ZJM
CRN
Akamai and Kyndryl partner for Zero Trust Segmentation cyber defence
Using Akamai's Guardicore Segmentation platform.