cKure Red – Telegram
cKure Red
2.33K subscribers
69 photos
31 videos
21 files
444 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
🇰🇵Bybit hack technical analysis of the Hack by Lazarus group, North Korean state spinsored hacking group (as calimed by the FBI, United States 🇺🇸).
Please open Telegram to view this post
VIEW IN TELEGRAM
🤩1
20250306_195000.jpg
558.9 KB
Ransomware Archive
🆕 No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298.

https://www.hackers-arise.com/post/new-no-click-critical-vulnerability-in-microsoft-windows-cve-2025-21298
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1😁1🤡1
🌐 Yet another website: sploitify.haxx.it [interactive public exploit cheat sheet]
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1🔥1
📣 Oracle quietly confirms public cloud data breach, customer data stolen.

The attacker exploited a vulnerability in Oracle Access Manager to breach Oracle-hosted servers. The vulnerability is tracked as CVE-2021-35587 and was assigned a critical severity score 9.8/10. It was patched in mid-January 2022, raising questions over whether Oracle kept its own servers vulnerable to a flaw it fixed more than three years ago.

CrowdStrike is investigating the incident along FBI.


https://www.techradar.com/pro/security/oracle-quietly-confirms-public-cloud-data-breach-customer-data-stolen
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥31
🔤 SQLMap from Waybackurls.

waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"

Credits: Zlatan H
Please open Telegram to view this post
VIEW IN TELEGRAM
31🔥1
📍Everyone knows your location: Tracking myself down through in-app ads.

https://timsh.org/tracking-myself-down-through-in-app-ads/

📍Everyone knows your location, Part 2: Try it yourself and share the results.

https://timsh.org/everyone-knows-your-location-part-2-try-it-yourself/



analyse-ad-traffic l: A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.

https://github.com/tim-sha256/analyse-ad-traffic
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4🤡1
🟥Microsoft Zero-Day drop:
Server MS-TNAP Authentication Bypass [RCE 0day]
A critical 0-click remote authentication bypass vulnerability in Microsoft Telnet Server that allows attackers to gain access as any user, including Administrator, without requiring valid credentials. The vulnerability exploits a misconfiguration in the NTLM Authentication processes of the Telnet MS-TNAP extension allowing remote unauthenticated attackers to bypass authentication completely.


Unconfirmed code
https://github.com/hackerhouse-opensource/hfwintelnet
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2👍1👌11
🌐 Pwning the Ladybird browser.

https://jessie.cafe/posts/pwning-ladybirds-libjs/
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍11
❤️ Running code on Tesla security ECU from tire: dlDetails on new CVE-2025-2082 vulnerability.

Security researchers Thomas Imbert, Vincent Dehors, and David Bérard found and responsibly disclosed recently a remote code execution (RCE) vulnerability in Tesla's VCSEC ECU.

Technical overview: By manipulating the response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow and execute code in the context of the VCSEC module. This gives the attacker the ability to send arbitrary messages to the vehicle's CAN bus.

More details: "0-click RCE on Tesla Model 3 through TPMS Sensors" [PDF]:
https://www.synacktiv.com/sites/default/files/2024-10/hexacon_0_click_rce_on_tesla_model_3_through_tpms_sensors_light.pdf

Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-265/

Under Pressure: Exploring a Zero-Click RCE Vulnerability in Tesla's TPMS:
https://vicone.com/blog/under-pressure-exploring-a-zero-click-rce-vulnerability-in-teslas-tpms
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🆒11
🍏 CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS.

An out-of-bounds write vulnerability has been reported in macOS. The vulnerability is due to the lack of proper validation of “lutAToBType” and “lutBToAType” tag types.

A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. A successful attack may result in code execution on the victim's machine in the context of the running process.


https://www.zerodayinitiative.com/blog/2025/5/7/cve-2024-44236-remote-code-execution-vulnerability-in-apple-macos
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🔒Bypassing CrowdStrike Falcon using PowerShel.

Simulated scenario where a PowerShell noscript is used to silently bypass a CrowdStrike Falcon endpoint and establish a reverse shell all while the sensor is running
Objective: Demonstrate how threat actors may abuse trusted noscripting environments and highlight the importance of layered defence and behavioural detection.

Source: Linkedin Bibek Sapkota
Please open Telegram to view this post
VIEW IN TELEGRAM
👻5👍32