The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
Claroty
The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
Team82 researched the security of the OvrC cloud platform, which is used by businesses and consumers to remotely manage IoT devices. We uncovered 10 different vulnerabilities that, when chained, allow attackers to execute code on OvrC cloud-connected devices…
The cost of a NAND chip off attack is 170.83€
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
Attestations: A new generation of signatures on PyPI
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
The Trail of Bits Blog
Attestations: A new generation of signatures on PyPI
For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These attestations improve on traditional PGP signatures (which have been…
The Definitive Guide to Linux Process Injection
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
Akamai
The Definitive Guide to Linux Process Injection | Akamai
In this blog post, we document Linux process injection techniques, and explain how to detect and mitigate them.
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 - watchTowr Labs
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
watchTowr Labs
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
It’s been a tricky time for Fortinet (and their customers) lately - arguably, even more so than usual. Adding to the steady flow of vulnerabilities in appliances recently was a nasty CVSS 9.8 vulnerability in FortiManager, their tool for central management…
PAN-SA-2024-0015 Critical Security Bulletin: Ensure Access to Management Interface is Secured
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
Palo Alto Networks Product Security Assurance
CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perfor...
Reproducing CVE-2024-10979: A Step-by-Step Guide
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
RedRays - Your SAP Security Solution
Reproducing CVE-2024-10979: A Step-by-Step Guide
Discover how to reproduce CVE-2024-10979, a vulnerability in PostgreSQL's trusted PL/Perl, through this detailed step-by-step guide. Learn about the security implications and the importance of applying patches to safeguard your database systems.
TCL substitution of global parameter values in Gaia Portal
https://ift.tt/kibXSAW
Submitted November 15, 2024 at 06:37PM by Mission_Detail_8153
via reddit https://ift.tt/PK8bGIX
https://ift.tt/kibXSAW
Submitted November 15, 2024 at 06:37PM by Mission_Detail_8153
via reddit https://ift.tt/PK8bGIX
Zeronvll
TCL substitution of global parameter values in Gaia Portal
Authenticated Gaia users, at least read-only privilege, can inject code or commands by global variables through HTTP requests.
Open-Source PowerHuntShares.v2 - Find Shares, Extract Passwords, and Fingerprint with LLM
https://ift.tt/StzhCbp
Submitted November 15, 2024 at 07:46PM by Nullbind
via reddit https://ift.tt/7ZiDszW
https://ift.tt/StzhCbp
Submitted November 15, 2024 at 07:46PM by Nullbind
via reddit https://ift.tt/7ZiDszW
NetSPI
Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0
Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.
Unpatched Remote Code Execution in Gogs
https://ift.tt/ESRy9xD
Submitted November 16, 2024 at 02:15AM by fysac2
via reddit https://ift.tt/OFqrZL5
https://ift.tt/ESRy9xD
Submitted November 16, 2024 at 02:15AM by fysac2
via reddit https://ift.tt/OFqrZL5
Vulnerability research and more
Unpatched Remote Code Execution in Gogs
The Gogs self-hosted Git service is vulnerable to symbolic link path traversal that enables remote code execution (CVE-2024-44625). The latest version at the time of writing (0.13.0) is affected. This vulnerability is exploitable against a default install…
🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!
https://ift.tt/uCWxaps
Submitted November 17, 2024 at 04:20PM by Straight-Zombie-646
via reddit https://ift.tt/UcBHOqd
https://ift.tt/uCWxaps
Submitted November 17, 2024 at 04:20PM by Straight-Zombie-646
via reddit https://ift.tt/UcBHOqd
Exploring the DOMPurify library: Bypasses and Fixes
https://ift.tt/dI0ToO2
Submitted November 17, 2024 at 09:36PM by albinowax
via reddit https://ift.tt/JRBNOsI
https://ift.tt/dI0ToO2
Submitted November 17, 2024 at 09:36PM by albinowax
via reddit https://ift.tt/JRBNOsI
mizu.re
Exploring the DOMPurify library: Bypasses and Fixes (1/2). Tags:Article - Article - Web - mXSS
Redis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability
https://ift.tt/0zQS9fq
Submitted November 18, 2024 at 08:54AM by vah_13
via reddit https://ift.tt/niQXpm3
https://ift.tt/0zQS9fq
Submitted November 18, 2024 at 08:54AM by vah_13
via reddit https://ift.tt/niQXpm3
RedRays - Your SAP Security Solution
Redis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability
Learn about Redis CVE-2024-31449, a critical Lua vulnerability allowing remote code execution. Discover steps to protect your system, reproduce the PoC, and update Redis to mitigate risks.
Reverse Engineering iOS 18 Inactivity Reboot
https://ift.tt/3xZ0KgI
Submitted November 18, 2024 at 02:55PM by albinowax
via reddit https://ift.tt/CSxOeny
https://ift.tt/3xZ0KgI
Submitted November 18, 2024 at 02:55PM by albinowax
via reddit https://ift.tt/CSxOeny
Blogspot
Reverse Engineering iOS 18 Inactivity Reboot
Wireless and firmware hacking, PhD life, Technology
Salamander/MIME – Just because it's encrypted doesn't mean it's secure | Lutra Security
https://ift.tt/AYE4Oi5
Submitted November 18, 2024 at 05:36PM by lutrasecurity
via reddit https://ift.tt/PAbcj1l
https://ift.tt/AYE4Oi5
Submitted November 18, 2024 at 05:36PM by lutrasecurity
via reddit https://ift.tt/PAbcj1l
Lutrasecurity
Salamander/MIME – Lutra Security
If you remember kobold letters, you already know not to blindly trust emails. But it’s not just HTML emails that can be deceiving. In this article, we’ll take a look at S/MIME and how we can use the concept of invisible salamanders to craft messages that…
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers
https://ift.tt/BvMYaiL
Submitted November 19, 2024 at 12:22AM by Ancient_Title_1860
via reddit https://ift.tt/wml1RIH
https://ift.tt/BvMYaiL
Submitted November 19, 2024 at 12:22AM by Ancient_Title_1860
via reddit https://ift.tt/wml1RIH
Laburity - Cyber Security Services
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers - Laburity
Software supply chains are complex ecosystems where even a single vulnerability can lead to widely spread security issues. This blog focuses on supply chain account takeovers, particularly in NPM packages, and explains how attackers exploit expired email…
OpenBMC Remote OS Deployment: A Simplified Approach
https://ift.tt/QlP7wWp
Submitted November 19, 2024 at 10:43AM by hardenedvault
via reddit https://ift.tt/4rCmKOi
https://ift.tt/QlP7wWp
Submitted November 19, 2024 at 10:43AM by hardenedvault
via reddit https://ift.tt/4rCmKOi
hardenedvault.net
OpenBMC Remote OS Deployment: A Simplified Approach
OpenBMC Remote OS Deployment: A Simplified Approach Many BMC implementations can accept a disk image and present it as a read-only USB mass storage device inserted into the host machine, allowing the host machine to boot from this “disk” for remote installation…
Extending Burp Suite for fun and profit - The Montoya way - Part 7 (Using the Collaborator)
https://ift.tt/y1vo6HK
Submitted November 19, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/VX1HlBi
https://ift.tt/y1vo6HK
Submitted November 19, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/VX1HlBi
HN Security
Extending Burp Suite for fun and profit - The Montoya way - Part 7 - HN Security
Setting up the environment + Hello World Inspecting and tampering HTTP requests and responses Inspecting and tampering WebSocket messages Creating […]
Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 - watchTowr Labs
https://ift.tt/eZ4LJQA
Submitted November 19, 2024 at 03:07PM by dx7r__
via reddit https://ift.tt/9gNleQc
https://ift.tt/eZ4LJQA
Submitted November 19, 2024 at 03:07PM by dx7r__
via reddit https://ift.tt/9gNleQc
watchTowr Labs
Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474
It'll be no surprise that 2024, 2023, 2022, and every other year of humanities' existence has been tough for SSLVPN appliances.
Anyhow, there are new vulnerabilities (well, two of them) that are being exploited in the Palo Alto Networks firewall and SSLVPN…
Anyhow, there are new vulnerabilities (well, two of them) that are being exploited in the Palo Alto Networks firewall and SSLVPN…
Remediation for CVE-2024-20767 and CVE-2024-21216 Potential Exploitable Bugs
https://ift.tt/KIeV5xT
Submitted November 20, 2024 at 05:09AM by SL7reach
via reddit https://ift.tt/GpxBMKm
https://ift.tt/KIeV5xT
Submitted November 20, 2024 at 05:09AM by SL7reach
via reddit https://ift.tt/GpxBMKm
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild
CVE-2024-20767- ColdFusion Path Traversal can lead to reading important data. CVE-2024-20767 is a vulnerability in ColdFusion versions 2023.6, 2021.12, and earlier. These versions are affected by...
Extracting Plaintext Credentials from Palo Alto Global Protect
https://ift.tt/S71F29N
Submitted November 19, 2024 at 09:55PM by AlmondOffSec
via reddit https://ift.tt/sWI1Hi6
https://ift.tt/S71F29N
Submitted November 19, 2024 at 09:55PM by AlmondOffSec
via reddit https://ift.tt/sWI1Hi6
Shells.Systems
Extracting Plaintext Credentials from Palo Alto Global Protect - Shells.Systems
Estimated Reading Time: 5 minutesOn a recent Red Team engagement, I was poking around having a look at different files and trying to see if I could extract any information that would allow me to move laterally through the network. I was hopeful, as always…