Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch) | Kali Linux Blog
https://www.kali.org/blog/kali-linux-2021-3-release/
https://www.kali.org/blog/kali-linux-2021-3-release/
Kali Linux
Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch) | Kali Linux Blog
Today we have released the newest version of Kali Linux, 2021.3 (quarter #3), which is now ready for download or updating.
A summary of the changes since the 2021.2 release from June are:
OpenSSL - Wide compatibility by default - Keep reading for what that…
A summary of the changes since the 2021.2 release from June are:
OpenSSL - Wide compatibility by default - Keep reading for what that…
Attackers Impersonate U.S. Department of Transportation to Harvest Microsoft Credentials
https://www.inky.com/blog/attackers-impersonate-u.s.-department-of-transportation-to-harvest-microsoft-credentials
https://www.inky.com/blog/attackers-impersonate-u.s.-department-of-transportation-to-harvest-microsoft-credentials
Inky
Fresh Phish: Attackers Impersonate U.S. Department of Transportation to Harvest Microsoft Credentials
Between Aug. 16-18, INKY detected 41 phishing emails attempting to impersonate the U.S. Department of Transportation (USDOT). The basic pitch was, with a trillion dollars of government money flowing through the system, you, dear target, are being invited…
OWASP Top 10:2021 (DRAFT FOR PEER REVIEW)
What's changed in the Top 10 for 2021
https://owasp.org/Top10/
What's changed in the Top 10 for 2021
https://owasp.org/Top10/
MikroTik blog - Mēris botnet
https://blog.mikrotik.com/security/meris-botnet.html
https://blog.mikrotik.com/security/meris-botnet.html
Mikrotik
MikroTik makes networking hardware and software, which is used in nearly all countries of the world. Our mission is to make existing Internet technologies faster, more powerful and affordable to wider range of users.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Top 5 OSINT Sources for Penetration Testing and Bug Bounties
https://www.spiderfoot.net/top-5-osint-sources-for-penetration-testing-and-bug-bounties/
https://www.spiderfoot.net/top-5-osint-sources-for-penetration-testing-and-bug-bounties/
No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders
Attack to Windows through WSL:
https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/
Attack to Windows through WSL:
https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/
Lumen Blog
No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed as Stealth Windows Loaders
Black Lotus Labs recently identified several malicious files that were written in Python and compiled in the Linux binary format ELF.
AMD_PSP_Vulnerability_Report.pdf
313 KB
AMD Chipset Drivers Vulnerability
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
https://github.com/klezVirus/CVE-2021-40444
P.S. Thx for the link ✌️
https://github.com/klezVirus/CVE-2021-40444
P.S. Thx for the link ✌️
GitHub
GitHub - klezVirus/CVE-2021-40444: CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit - klezVirus/CVE-2021-40444
EMEA and APAC governments targeted in widespread credential harvesting campaign ⋆ Cyjax
https://www.cyjax.com/2021/09/16/emea-and-apac-governments-targeted-in-widespread-credential-harvesting-campaign/
P.S. в BLD адреса из новой phishing компании уже добавлены
https://www.cyjax.com/2021/09/16/emea-and-apac-governments-targeted-in-widespread-credential-harvesting-campaign/
P.S. в BLD адреса из новой phishing компании уже добавлены
CYJAX
EMEA and APAC governments targeted in widespread credential harvesting campaign
Cyjax analysts have uncovered a large credential harvesting campaign targeting multiple government departments in APAC and EMEA countries....
Report: Data Exposure discovered at EventBuilder company
https://clario.co/blog/eventbuilder-data-exposure/
https://clario.co/blog/eventbuilder-data-exposure/
clario.co
Report: Data Exposure discovered at EventBuilder, the Global Specialists in Webinar Conference Planning
Report: Data Exposure discovered at EventBuilder company
RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941)
https://codewhitesec.blogspot.com/2021/09/citrix-sharefile-rce-cve-2021-22941.html?m=1
P.S. thx for the link @Thatskriptkid ✌️
https://codewhitesec.blogspot.com/2021/09/citrix-sharefile-rce-cve-2021-22941.html?m=1
P.S. thx for the link @Thatskriptkid ✌️
Blogspot
CODE WHITE | Blog: RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941) – A Walk-Through
Citrix ShareFile Storage Zones Controller uses a fork of the third party library NeatUpload. Versions before 5.11.20 are affected by a rela...
Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)
https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html
https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html
VMware vCenter Server updates address multiple security vulnerabilities
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines
https://blog.talosintelligence.com/2021/09/tinyturla.html?m=1
https://blog.talosintelligence.com/2021/09/tinyturla.html?m=1
Cisco Talos Blog
TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines
News summary
* Cisco Talos recently discovered a new backdoor used by the Russian Turla APT group.
* We have seen infections in the U.S., Germany and, more recently, in Afghanistan.
* It is likely used as a stealth second-chance backdoor to keep access…
* Cisco Talos recently discovered a new backdoor used by the Russian Turla APT group.
* We have seen infections in the U.S., Germany and, more recently, in Afghanistan.
* It is likely used as a stealth second-chance backdoor to keep access…
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Как бесплатно задеплоить приложение в Cloudflare из GitHub репозитория
Некоторе время назад был анонсирован сервис Cloudflare Pages, а вскоре, после тестирования в узком кругу разработчиков был запущен сервис Pages Cloudflare, собственно в чем вся фишка - любой желающий может задеплоить / опубликовать свой web проект в данном сервисе, причем совершенно бесплатно
Собственно когда был SysConf’21 я в это время познакомился с VUE на который из обычного HTML и был перепилен сайт SysConf.io… Cейчас же, когда я стал в рамках BLD проекта пилить https://lab.sys-adm.in/, то было решено использовать для этих целей следующий стек:
* NuxtJS + VUE + Bulma
* Cloudflare pages
Кратко о том, как свести к минимому все действия по деплою апплюхи в клауд:
* https://sys-adm.in/systadm/965-kak-besplatno-zadeploit-prilozhenie-v-cloudflare-iz-github-repozitoriya.html
Некоторе время назад был анонсирован сервис Cloudflare Pages, а вскоре, после тестирования в узком кругу разработчиков был запущен сервис Pages Cloudflare, собственно в чем вся фишка - любой желающий может задеплоить / опубликовать свой web проект в данном сервисе, причем совершенно бесплатно
Собственно когда был SysConf’21 я в это время познакомился с VUE на который из обычного HTML и был перепилен сайт SysConf.io… Cейчас же, когда я стал в рамках BLD проекта пилить https://lab.sys-adm.in/, то было решено использовать для этих целей следующий стек:
* NuxtJS + VUE + Bulma
* Cloudflare pages
Кратко о том, как свести к минимому все действия по деплою апплюхи в клауд:
* https://sys-adm.in/systadm/965-kak-besplatno-zadeploit-prilozhenie-v-cloudflare-iz-github-repozitoriya.html
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
Nagios Vulnearbilities
Denoscriptions:
https://claroty.com/2021/09/21/blog-research-securing-network-management-systems-nagios-xi/
Denoscriptions:
https://claroty.com/2021/09/21/blog-research-securing-network-management-systems-nagios-xi/
Claroty
Securing Network Management Systems: Nagios XI
Claroty Team82’s latest research focuses on network management systems, starting with Nagios XI. Dive into the world of Nagios XI network management systems to learn....
Exchange.. Again
Исследователи кибербезопасности смогли получить сотни тысяч учетных данных домена и приложений Windows благодаря разработке и реализации протокола автообнаружения, используемого Microsoft Exchange
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
Исследователи кибербезопасности смогли получить сотни тысяч учетных данных домена и приложений Windows благодаря разработке и реализации протокола автообнаружения, используемого Microsoft Exchange
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
Akamai
Cloud Computing, Security, Content Delivery (CDN) | Akamai
Akamai is the cybersecurity and cloud computing company that powers and protects business online.
AWS WorkSpaces Remote Code Execution
https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/
https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/
Rhino Security Labs
CVE-2021-38112: AWS WorkSpaces Remote Code Execution
This blog post details a vulnerability Rhino Security Labs found in AWS WorkSpaces desktop client, tracked as CVE-2021-38112