Snapshot fuzzing direct composition with WTF https://blog.talosintelligence.com/snapshot-fuzzing-direct-composition-with-wtf/
Cisco Talos Blog
Snapshot fuzzing direct composition with WTF
Although there is public research on Direct Composition, only a few discuss fuzzing this feature, and none, to our knowledge, that covers snapshot fuzzing.
The single-packet attack: making remote race-conditions 'local' https://portswigger.net/research/the-single-packet-attack-making-remote-race-conditions-local
PortSwigger Research
The single-packet attack: making remote race-conditions 'local'
The single-packet attack is a new technique for triggering web race conditions. It works by completing multiple HTTP/2 requests with a single TCP packet, which effectively eliminates network jitter an
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
Microsoft News
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability
Microsoft has observed North Korean threat actors Diamond Sleet and Onyx Sleet exploiting Jet Brains TeamCity CVE-2023-42793 vulnerability.
Hardware Hacking to Bypass BIOS Passwords https://cybercx.co.nz/blog/bypassing-bios-password/
CyberCX
Hardware Hacking to Bypass BIOS Passwords
A beginners hardware hacking journey of performing a BIOS password bypass on Lenovo laptops. In this article we identify what the problem is, how to identify a vulnerable chip, how to bypass a vulnerable chip, and finally identify why this attack works and…
EDR Evasion Techniques Using Syscalls https://hadess.io/edr-evasion-techniques-using-syscalls/
HADESS
EDR Evasion Techniques Using Syscalls - HADESS
In the age of DevOps and rapid software development cycles, Jenkins has emerged as a beacon of automation, aiding organizations in efficiently building, deploying, and automating their projects. Yet, as with any popular software, its wide adoption has also…
CVE-2023-38600: Story of an innocent Apple Safari copyWithin gone (way) outside https://www.zerodayinitiative.com/blog/2023/10/17/cve-2023-38600-story-of-an-innocent-apple-safari-copywithin-gone-way-outside
Zero Day Initiative
Zero Day Initiative — CVE-2023-38600: Story of an innocent Apple Safari copyWithin gone (way) outside
In May 2023, we received a vulnerability report from an anonymous researcher regarding a vulnerability in Apple Safari. It turned out to be an interesting classic integer underflow vulnerability. Apple assigned CVE-2023-38600 to this issue and fixed it in…
MATA malware framework exploits EDR in attacks on defense firms https://www.bleepingcomputer.com/news/security/mata-malware-framework-exploits-edr-in-attacks-on-defense-firms/
BleepingComputer
MATA malware framework exploits EDR in attacks on defense firms
An updated version of the MATA backdoor framework was spotted in attacks between August 2022 and May 2023, targeting oil and gas firms and the defense industry in Eastern Europe.
Uncovering RPC Servers through Windows API Analysis https://posts.specterops.io/uncovering-rpc-servers-through-windows-api-analysis-5d23c0459db6
SpecterOps
Uncovering RPC Servers through Windows API Analysis - SpecterOps
This article serves as a hand-holding walkthrough and documents how I analyzed a simple Win32 API: LogonUserA. Learn how to use some of IDA’s most common features.
👍1
Getting RCE in Chrome with incomplete object initialization in the Maglev compiler https://github.blog/2023-10-17-getting-rce-in-chrome-with-incomplete-object-initialization-in-the-maglev-compiler/
The GitHub Blog
Getting RCE in Chrome with incomplete object initialization in the Maglev compiler
In this post, I'll exploit CVE-2023-4069, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information https://blog.cloudflare.com/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/
The Cloudflare Blog
Malicious “RedAlert - Rocket Alerts” application targets Israeli phone calls, SMS, and user information
On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware of a malicious Google Android application impersonating the real-time rocket alert app, Red Alert, which provides real-time rocket alerts for Israeli citizens
CVE-2023-45727: Proself Zero-Day Security Vulnerability https://securityonline.info/cve-2023-45727-proself-zero-day-security-vulnerability/
Cybersecurity News
CVE-2023-45727: Proself Zero-Day Security Vulnerability
attackers can exploit CVE-2023-45727 to transmit Proself account data externally, potentially enabling unauthorized access to Proself.
TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments https://thehackernews.com/2023/10/tetrisphantom-cyber-espionage-via.html
Detecting and preventing LSASS credential dumping attacks https://www.microsoft.com/en-us/security/blog/2022/10/05/detecting-and-preventing-lsass-credential-dumping-attacks/
Microsoft News
Detecting and preventing LSASS credential dumping attacks
LSASS credential dumping is becoming prevalent, especially with the rise of human-operated ransomware. In May 2022, Microsoft participated in an evaluation conducted by AV-Comparatives specifically on detecting and blocking this attack technique and we’re…
Breaking Fortinet Firmware Encryption https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
Bishop Fox
Breaking Fortinet Firmware Encryption
Review our latest Fortinet analysis that breaks encryption on firmware images, leading to improved detection, fingerprinting, and exploit development.
Directory Listing to RCE https://blog.hks.ec/posts/directory-listing-to-rce/
Hakisec
Directory Listing to RCE | Hakisec
Beyond Quantum: MemComputing ASICs Could Shatter 2048-bit RSA Encryption https://www.securityweek.com/beyond-quantum-memcomputing-asics-could-shatter-2048-bit-rsa-encryption/
SecurityWeek
Beyond Quantum: MemComputing ASICs Could Shatter 2048-bit RSA Encryption
The feared ‘cryptopocalypse’ (the death of current encryption) might be sooner than expected – caused by in-memory computing ASICs rather than quantum computers.
vmlinux-to-elf: A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms) https://github.com/marin-m/vmlinux-to-elf
GitHub
GitHub - marin-m/vmlinux-to-elf: A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol…
A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms) - marin-m/vmlinux-to-elf
Protobuf Magic: extension for Burp Suite designed to intuitively handle Protobuf (Protocol Buffers) messages, even in the absence of complete .proto definitions https://github.com/DeiteriyLab/protobuf-magic
GitHub
GitHub - DeiteriyLab/protobuf-magic
Contribute to DeiteriyLab/protobuf-magic development by creating an account on GitHub.
Exploiting Zenbleed from Chrome https://vu.ls/blog/exploiting-zenbleed-from-chrome/
👌1