Presentations from HEXACON 2024
https://www.youtube.com/playlist?list=PLiEHUFG7koLvk72LC2xGCn65M535-vIEC
Submitted November 08, 2024 at 04:46PM by albinowax
via reddit https://ift.tt/ENaUyhG
https://www.youtube.com/playlist?list=PLiEHUFG7koLvk72LC2xGCn65M535-vIEC
Submitted November 08, 2024 at 04:46PM by albinowax
via reddit https://ift.tt/ENaUyhG
A New Era of macOS Sandbox Escapes: Overlooked Attack Surface, 10+ New Vulns
https://ift.tt/PJhexuU
Submitted November 08, 2024 at 06:57PM by netsec_burn
via reddit https://ift.tt/rsCPXBW
https://ift.tt/PJhexuU
Submitted November 08, 2024 at 06:57PM by netsec_burn
via reddit https://ift.tt/rsCPXBW
jhftss.github.io
A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities
This is a blog post for my presentation at the conference POC2024. The slides are uploaded here.
Why Falco’s new response engine is a game changer for open source cloud native security
https://ift.tt/0u4QRIq
Submitted November 08, 2024 at 09:45PM by Hallow_Rose
via reddit https://ift.tt/r1wyh9U
https://ift.tt/0u4QRIq
Submitted November 08, 2024 at 09:45PM by Hallow_Rose
via reddit https://ift.tt/r1wyh9U
CNCF
Why Falco’s new response engine is a game changer for open source cloud native security
Project post by the Falco Team and Nigel Douglas Falco achieved CNCF Graduation status on February 29, 2024. Following the celebration of this significant milestone at KubeCon EU in Paris earlier this…
Microsoft Bookings – Facilitating Impersonation
https://ift.tt/BkDvE8S
Submitted November 08, 2024 at 10:33PM by nopslider
via reddit https://ift.tt/dk7VtEX
https://ift.tt/BkDvE8S
Submitted November 08, 2024 at 10:33PM by nopslider
via reddit https://ift.tt/dk7VtEX
Cyberis Limited
Microsoft Bookings – Facilitating Impersonation
Microsoft Bookings introduces a significant security risk by allowing end users to create fully functional Entra accounts without administrative oversight. These accounts, tied to shared Booking pages, can be exploited for impersonation, phishing, and email…
Beyond RCE: Autonomous Code Execution in Agentic AI
https://ift.tt/cdulMhq
Submitted November 09, 2024 at 03:30AM by crustysecurity
via reddit https://ift.tt/5ZTAWEG
https://ift.tt/cdulMhq
Submitted November 09, 2024 at 03:30AM by crustysecurity
via reddit https://ift.tt/5ZTAWEG
www.securityrunners.io
Beyond RCE: Autonomous Code Execution in Agentic AI
This blog post explores how agentic AI systems, specifically the "Computer Use" feature, can be manipulated through prompt injections and phishing techniques to execute arbitrary commands.
Reverse Engineering the Parrot Anafi Drone: Control Start/Land via PC
https://ift.tt/2YLKTQf
Submitted November 11, 2024 at 02:13AM by f3nter
via reddit https://ift.tt/s7PuYkB
https://ift.tt/2YLKTQf
Submitted November 11, 2024 at 02:13AM by f3nter
via reddit https://ift.tt/s7PuYkB
www.hardbreak.wiki
Parrot Anafi Drone Reverse Engineering | HardBreak
Red Team and Pentest anecdotes
https://ift.tt/YWTMBSZ
Submitted November 11, 2024 at 04:14PM by _kawhl
via reddit https://ift.tt/0Ne67Ay
https://ift.tt/YWTMBSZ
Submitted November 11, 2024 at 04:14PM by _kawhl
via reddit https://ift.tt/0Ne67Ay
therealunicornsecurity.github.io
Tales of the Crimson Foes
The Tales of the Crimson Foes
A compilation of red team and pentest stories
A compilation of red team and pentest stories
Bypass GuardDuty Pentest Findings for the AWS CLI
https://ift.tt/NAy1SFv
Submitted November 11, 2024 at 09:21PM by RedTermSession
via reddit https://ift.tt/iA6NBWr
https://ift.tt/NAy1SFv
Submitted November 11, 2024 at 09:21PM by RedTermSession
via reddit https://ift.tt/iA6NBWr
hackingthe.cloud
Bypass GuardDuty Pentest Findings for the AWS CLI - Hacking The Cloud
Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string when using the AWS CLI.
Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1
https://ift.tt/rZOb70t
Submitted November 12, 2024 at 08:13PM by onlinereadme
via reddit https://ift.tt/khyHoXe
https://ift.tt/rZOb70t
Submitted November 12, 2024 at 08:13PM by onlinereadme
via reddit https://ift.tt/khyHoXe
Medium
Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1
In this 2-part “Everyday Ghidra” series post, we’ll walk through creating custom Ghidra data types by parsing C header files. In Everyday…
System Prompt Exposure: How AI Image Generators May Leak Sensitive Instructions
https://ift.tt/mOJWR29
Submitted November 12, 2024 at 09:32PM by Ok_Information1453
via reddit https://ift.tt/yFWYvP1
https://ift.tt/mOJWR29
Submitted November 12, 2024 at 09:32PM by Ok_Information1453
via reddit https://ift.tt/yFWYvP1
Invicti
System Prompt Exposure: How AI Image Generators May Leak Sensitive Instructions
Recraft's image generation service uses a unique architecture combining an LLM (Claude) with a diffusion model. Learn what led to the discovery that carefully crafted prompts could expose the system's internal instructions.
Citrix Virtual Apps and Desktops (XEN) Unauthenticated Remote Code execution
https://ift.tt/X8RlmsY
Submitted November 12, 2024 at 10:38PM by TheL0singEdge
via reddit https://ift.tt/1EfxHBC
https://ift.tt/X8RlmsY
Submitted November 12, 2024 at 10:38PM by TheL0singEdge
via reddit https://ift.tt/1EfxHBC
watchTowr Labs
Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE-2024-8068 and CVE-2024-8069)
Well, we’re back again, with yet another fresh-off-the-press bug chain (and associated Interactive Artifact Generator). This time, it’s in Citrix’s “Virtual Apps and Desktops” offering.
This is a tech stack that enables end-users (and likely, your friendly…
This is a tech stack that enables end-users (and likely, your friendly…
Announcing a New Probely Chapter, As We Join Snyk's Family
https://ift.tt/hjivM6Z
Submitted November 13, 2024 at 06:51AM by petermal67
via reddit https://ift.tt/csPYk8n
https://ift.tt/hjivM6Z
Submitted November 13, 2024 at 06:51AM by petermal67
via reddit https://ift.tt/csPYk8n
https://probely.com
Announcing a New Probely Chapter, As We Join Snyk's Family
Probely has been acquired by Snyk, an industry leader in developer security. Learn more about the acquisition in this article.
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight
https://ift.tt/qskEWY0
Submitted November 13, 2024 at 09:08AM by Smooth-Loquat-4954
via reddit https://ift.tt/57osZyd
https://ift.tt/qskEWY0
Submitted November 13, 2024 at 09:08AM by Smooth-Loquat-4954
via reddit https://ift.tt/57osZyd
Workos
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight — WorkOS
On September 10th, 2024, a critical security flaw was disclosed in the Ruby-SAML and OmniAuth-SAML libraries, exposing a vulnerability that allows complete authentication bypass. This flaw, CVE-2024-45409, earned the highest possible score of 10 on GitHub's…
Fault Injection - Down the Rabbit Hole
https://ift.tt/wfrkPG1
Submitted November 13, 2024 at 02:58PM by 0xdea
via reddit https://ift.tt/0qpyf5J
https://ift.tt/wfrkPG1
Submitted November 13, 2024 at 02:58PM by 0xdea
via reddit https://ift.tt/0qpyf5J
HN Security
Fault Injection - Down the Rabbit Hole - HN Security
Intro This series of articles describes fault injection attack techniques in order to understand their real potential by testing their […]
The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
Claroty
The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
Team82 researched the security of the OvrC cloud platform, which is used by businesses and consumers to remotely manage IoT devices. We uncovered 10 different vulnerabilities that, when chained, allow attackers to execute code on OvrC cloud-connected devices…
The cost of a NAND chip off attack is 170.83€
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
Attestations: A new generation of signatures on PyPI
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
The Trail of Bits Blog
Attestations: A new generation of signatures on PyPI
For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These attestations improve on traditional PGP signatures (which have been…
The Definitive Guide to Linux Process Injection
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
Akamai
The Definitive Guide to Linux Process Injection | Akamai
In this blog post, we document Linux process injection techniques, and explain how to detect and mitigate them.
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 - watchTowr Labs
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
watchTowr Labs
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
It’s been a tricky time for Fortinet (and their customers) lately - arguably, even more so than usual. Adding to the steady flow of vulnerabilities in appliances recently was a nasty CVSS 9.8 vulnerability in FortiManager, their tool for central management…
PAN-SA-2024-0015 Critical Security Bulletin: Ensure Access to Management Interface is Secured
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
Palo Alto Networks Product Security Assurance
CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perfor...
Reproducing CVE-2024-10979: A Step-by-Step Guide
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
RedRays - Your SAP Security Solution
Reproducing CVE-2024-10979: A Step-by-Step Guide
Discover how to reproduce CVE-2024-10979, a vulnerability in PostgreSQL's trusted PL/Perl, through this detailed step-by-step guide. Learn about the security implications and the importance of applying patches to safeguard your database systems.