Adobe, снова - Security update available for Adobe Acrobat and Reader
https://helpx.adobe.com/security/products/acrobat/apsb21-51.html
https://helpx.adobe.com/security/products/acrobat/apsb21-51.html
Adobe
Adobe Security Bulletin
Security update available for Adobe Acrobat and Reader | APSB21-51
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31979
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31979
Анализ угрозы watering hole («атака на водопое») в государственном секторе Казахстана
https://tntsecure.kz/en/article_7.html
https://tntsecure.kz/en/article_7.html
Mitigate Windows Print Spooler Service Vulnerability
CISA Emergency Warns:
https://cyber.dhs.gov/ed/21-04/
CISA Emergency Warns:
https://cyber.dhs.gov/ed/21-04/
Multiple vulnerabilities in VMware ESXi
https://www.vmware.com/security/advisories/VMSA-2021-0014.html
https://www.vmware.com/security/advisories/VMSA-2021-0014.html
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
https://www.mdpi.com/2624-800X/1/3/21
Эмпирическая оценка систем обнаружения конечных точек и реагирования на современные постоянные угрозы векторов атакhttps://www.mdpi.com/2624-800X/1/3/21
MDPI
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
Advanced persistent threats pose a significant challenge for blue teams as they apply various attacks over prolonged periods, impeding event correlation and their detection. In this work, we leverage various diverse attack scenarios to assess the efficacy…
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
SigNoz/signoz: SigNoz helps developers monitor their applications & troubleshoot problems, an open-source alternative to DataDog, NewRelic, etc. 🔥 🖥
https://github.com/SigNoz/signoz
https://github.com/SigNoz/signoz
GitHub
GitHub - SigNoz/signoz: SigNoz is an open-source observability platform native to OpenTelemetry with logs, traces and metrics in…
SigNoz is an open-source observability platform native to OpenTelemetry with logs, traces and metrics in a single application. An open-source alternative to DataDog, NewRelic, etc. 🔥 🖥. 👉 Open s...
Etherpad 1.8.13 - Code Execution Vulnerabilities
https://blog.sonarsource.com/etherpad-code-execution-vulnerabilities
https://blog.sonarsource.com/etherpad-code-execution-vulnerabilities
Sonarsource
Etherpad 1.8.13 - Code Execution Vulnerabilities
We discovered two code execution vulnerabilities that affected Etherpad servers and data. Learn more about the technical details and how to avoid such coding issues.
Urgent Security Notice: Critical Risk to Unpatched End-of-Life SRA & SMA 8.x Remote Access Devices | SonicWall
https://www.sonicwall.com/support/product-notification/urgent-security-notice-critical-risk-to-unpatched-end-of-life-sra-sma-8-x-remote-access-devices/210713105333210/
https://www.sonicwall.com/support/product-notification/urgent-security-notice-critical-risk-to-unpatched-end-of-life-sra-sma-8-x-remote-access-devices/210713105333210/
Joker Is Still No Laughing Matter
Рост вариаций Joker, под что маскируется, цепочка атак:
https://blog.zimperium.com/joker-is-still-no-laughing-matter/
Joker trojans are malicious Android applicationsРост вариаций Joker, под что маскируется, цепочка атак:
https://blog.zimperium.com/joker-is-still-no-laughing-matter/
How we protect users from 0-day attacks
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/amp/
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/amp/
Google
How we protect users from 0-day attacks
Google’s Threat Analysis Group (TAG) actively works to detect hacking attempts and influence operations to protect users from digital attacks, this includes hunting for 0-day vulnerabilities because they can be particularly dangerous when exploited and have…
Отчет о прошедшем Open SysConf’21
Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на полученный фидбек, анализ прошедшего мероприятия, организационные аспекты.
• https://docs.google.com/document/d/1uIRJFHdDoBORmM4DpwejoHKc7EToyY_nftQsWe-NMO4/edit?usp=sharing
Доп. ссылки:
• Оставить фидбек можно здесь - https://docs.google.com/forms/d/e/1FAIpQLScixOHh5pCNJseuRT4a04B1703vC8ux5Btrba2rismJ-lUwJA/viewform?usp=sf_link
• Стрим был здесь - https://news.1rj.ru/str/sysadm_in_channel/3199
• Сайт - https://sysconf.io
Всем Peace ✌️
Отчет о прошедшем Open SysConf’21
Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на полученный фидбек, анализ прошедшего мероприятия, организационные аспекты.
• https://docs.google.com/document/d/1uIRJFHdDoBORmM4DpwejoHKc7EToyY_nftQsWe-NMO4/edit?usp=sharing
Доп. ссылки:
• Оставить фидбек можно здесь - https://docs.google.com/forms/d/e/1FAIpQLScixOHh5pCNJseuRT4a04B1703vC8ux5Btrba2rismJ-lUwJA/viewform?usp=sf_link
• Стрим был здесь - https://news.1rj.ru/str/sysadm_in_channel/3199
• Сайт - https://sysconf.io
Всем Peace ✌️
Sys-Admin InfoSec pinned « Отчет о прошедшем Open SysConf’21 Открытая идея, как продолжение идеи Open SysConf, которая направлена на шаринг знаний, awareness в области ИТ всех заинтересованных людей, инициировало создание данного документа, в котором формально выражены ответы на…»
Getting Started with Podman on Fedora
https://fedoramagazine.org/getting-started-with-podman-in-fedora/
https://fedoramagazine.org/getting-started-with-podman-in-fedora/
Fedora Magazine
Getting Started with Podman on Fedora Linux - Fedora Magazine
Podman is a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. In this article, we will introduce podman and how to use it with a small application build using nodejs. The app will be very simple and clean.…
NaaS никогда не сталкивался, но оказывается есть и такое (Network as a Service Enables)
Со слов IDC довольно востребовано:
https://idcdocserv.com/US47128521
Со слов IDC довольно востребовано:
https://idcdocserv.com/US47128521
Critical WooCommerce SQL Injection Vulnerability Details
https://patchstack.com/woocommerce-sql-injection-vulnerability/
https://patchstack.com/woocommerce-sql-injection-vulnerability/
Patchstack
Critical WooCommerce SQL Injection Vulnerability Details - Patchstack
This security advisory is written about the WooCommerce SQL Injection vulnerability. Patchstack users are safe from the vulnerability.
Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software Release 7.0.0 IPsec Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Adaptive%20Security%20Appliance%20Software%20Release%209.16.1%20and%20Cisco%20Firepower%20Threat%20Defense%20Software%20Release%207.0.0%20IPsec%20Denial%20of%20Service%20Vulnerability&vs_k=1
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ipsec-dos-TFKQbgWC?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Adaptive%20Security%20Appliance%20Software%20Release%209.16.1%20and%20Cisco%20Firepower%20Threat%20Defense%20Software%20Release%207.0.0%20IPsec%20Denial%20of%20Service%20Vulnerability&vs_k=1
Cisco
Cisco Security Advisory: Cisco Adaptive Security Appliance Software Release 9.16.1 and Cisco Firepower Threat Defense Software…
A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker or an unauthenticated attacker in a man-in-the-middle position…
Remote code execution in cdnjs of Cloudflare
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
https://blog.ryotak.me/post/cdnjs-remote-code-execution-en/
blog.ryotak.net
Remote code execution in cdnjs of Cloudflare
Preface
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
(日本語版も公開されています。)
Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments.
This article describes vulnerabilities reported through this program and published…
Bypassing Windows Hello Without Masks or Plastic Surgery
https://www.cyberark.com/resources/threat-research-blog/bypassing-windows-hello-without-masks-or-plastic-surgery
https://www.cyberark.com/resources/threat-research-blog/bypassing-windows-hello-without-masks-or-plastic-surgery
Cyberark
Bypassing Windows Hello Without Masks or Plastic Surgery
Biometric authentication is beginning to see rapid adoption across the enterprise as organizations look to incorporate passwordless solutions to help mitigate the numerous security risks inherent...
Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
https://blog.talosintelligence.com/2021/07/vuln-spotlight-d-link.html
P.S. Thx for link @Thatskriptkid ✌️
Cisco Talos Blog
Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040
Dave McDaniel discovered these vulnerabilities. Blog by Jon Munshaw.
Cisco Talos recently discovered multiple vulnerabilities in the D-LINK DIR-3040 wireless router.
The DIR-3040 is an AC3000-based wireless internet router. These vulnerabilities could allow…
Cisco Talos recently discovered multiple vulnerabilities in the D-LINK DIR-3040 wireless router.
The DIR-3040 is an AC3000-based wireless internet router. These vulnerabilities could allow…
Microsoft Windows Print Spooler Point and Print allows installation of arbitrary queue-specific files
https://kb.cert.org/vuls/id/131152
P.S. что в их Linux'e будет твориться, если в своей же системе разобраться не могут..?
https://kb.cert.org/vuls/id/131152
P.S. что в их Linux'e будет твориться, если в своей же системе разобраться не могут..?
kb.cert.org
CERT/CC Vulnerability Note VU#131152
Microsoft Windows Print Spooler Point and Print allows installation of arbitrary queue-specific files