Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Top 5 OSINT Sources for Penetration Testing and Bug Bounties
https://www.spiderfoot.net/top-5-osint-sources-for-penetration-testing-and-bug-bounties/
https://www.spiderfoot.net/top-5-osint-sources-for-penetration-testing-and-bug-bounties/
No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders
Attack to Windows through WSL:
https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/
Attack to Windows through WSL:
https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/
Lumen Blog
No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed as Stealth Windows Loaders
Black Lotus Labs recently identified several malicious files that were written in Python and compiled in the Linux binary format ELF.
AMD_PSP_Vulnerability_Report.pdf
313 KB
AMD Chipset Drivers Vulnerability
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
https://github.com/klezVirus/CVE-2021-40444
P.S. Thx for the link ✌️
https://github.com/klezVirus/CVE-2021-40444
P.S. Thx for the link ✌️
GitHub
GitHub - klezVirus/CVE-2021-40444: CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit - klezVirus/CVE-2021-40444
EMEA and APAC governments targeted in widespread credential harvesting campaign ⋆ Cyjax
https://www.cyjax.com/2021/09/16/emea-and-apac-governments-targeted-in-widespread-credential-harvesting-campaign/
P.S. в BLD адреса из новой phishing компании уже добавлены
https://www.cyjax.com/2021/09/16/emea-and-apac-governments-targeted-in-widespread-credential-harvesting-campaign/
P.S. в BLD адреса из новой phishing компании уже добавлены
CYJAX
EMEA and APAC governments targeted in widespread credential harvesting campaign
Cyjax analysts have uncovered a large credential harvesting campaign targeting multiple government departments in APAC and EMEA countries....
Report: Data Exposure discovered at EventBuilder company
https://clario.co/blog/eventbuilder-data-exposure/
https://clario.co/blog/eventbuilder-data-exposure/
clario.co
Report: Data Exposure discovered at EventBuilder, the Global Specialists in Webinar Conference Planning
Report: Data Exposure discovered at EventBuilder company
RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941)
https://codewhitesec.blogspot.com/2021/09/citrix-sharefile-rce-cve-2021-22941.html?m=1
P.S. thx for the link @Thatskriptkid ✌️
https://codewhitesec.blogspot.com/2021/09/citrix-sharefile-rce-cve-2021-22941.html?m=1
P.S. thx for the link @Thatskriptkid ✌️
Blogspot
CODE WHITE | Blog: RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941) – A Walk-Through
Citrix ShareFile Storage Zones Controller uses a fork of the third party library NeatUpload. Versions before 5.11.20 are affected by a rela...
Unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware (CVE-2021-36260)
https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html
https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html
VMware vCenter Server updates address multiple security vulnerabilities
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
https://www.vmware.com/security/advisories/VMSA-2021-0020.html
TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines
https://blog.talosintelligence.com/2021/09/tinyturla.html?m=1
https://blog.talosintelligence.com/2021/09/tinyturla.html?m=1
Cisco Talos Blog
TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines
News summary
* Cisco Talos recently discovered a new backdoor used by the Russian Turla APT group.
* We have seen infections in the U.S., Germany and, more recently, in Afghanistan.
* It is likely used as a stealth second-chance backdoor to keep access…
* Cisco Talos recently discovered a new backdoor used by the Russian Turla APT group.
* We have seen infections in the U.S., Germany and, more recently, in Afghanistan.
* It is likely used as a stealth second-chance backdoor to keep access…
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Как бесплатно задеплоить приложение в Cloudflare из GitHub репозитория
Некоторе время назад был анонсирован сервис Cloudflare Pages, а вскоре, после тестирования в узком кругу разработчиков был запущен сервис Pages Cloudflare, собственно в чем вся фишка - любой желающий может задеплоить / опубликовать свой web проект в данном сервисе, причем совершенно бесплатно
Собственно когда был SysConf’21 я в это время познакомился с VUE на который из обычного HTML и был перепилен сайт SysConf.io… Cейчас же, когда я стал в рамках BLD проекта пилить https://lab.sys-adm.in/, то было решено использовать для этих целей следующий стек:
* NuxtJS + VUE + Bulma
* Cloudflare pages
Кратко о том, как свести к минимому все действия по деплою апплюхи в клауд:
* https://sys-adm.in/systadm/965-kak-besplatno-zadeploit-prilozhenie-v-cloudflare-iz-github-repozitoriya.html
Некоторе время назад был анонсирован сервис Cloudflare Pages, а вскоре, после тестирования в узком кругу разработчиков был запущен сервис Pages Cloudflare, собственно в чем вся фишка - любой желающий может задеплоить / опубликовать свой web проект в данном сервисе, причем совершенно бесплатно
Собственно когда был SysConf’21 я в это время познакомился с VUE на который из обычного HTML и был перепилен сайт SysConf.io… Cейчас же, когда я стал в рамках BLD проекта пилить https://lab.sys-adm.in/, то было решено использовать для этих целей следующий стек:
* NuxtJS + VUE + Bulma
* Cloudflare pages
Кратко о том, как свести к минимому все действия по деплою апплюхи в клауд:
* https://sys-adm.in/systadm/965-kak-besplatno-zadeploit-prilozhenie-v-cloudflare-iz-github-repozitoriya.html
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
Nagios Vulnearbilities
Denoscriptions:
https://claroty.com/2021/09/21/blog-research-securing-network-management-systems-nagios-xi/
Denoscriptions:
https://claroty.com/2021/09/21/blog-research-securing-network-management-systems-nagios-xi/
Claroty
Securing Network Management Systems: Nagios XI
Claroty Team82’s latest research focuses on network management systems, starting with Nagios XI. Dive into the world of Nagios XI network management systems to learn....
Exchange.. Again
Исследователи кибербезопасности смогли получить сотни тысяч учетных данных домена и приложений Windows благодаря разработке и реализации протокола автообнаружения, используемого Microsoft Exchange
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
Исследователи кибербезопасности смогли получить сотни тысяч учетных данных домена и приложений Windows благодаря разработке и реализации протокола автообнаружения, используемого Microsoft Exchange
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
Akamai
Cloud Computing, Security, Content Delivery (CDN) | Akamai
Akamai is the cybersecurity and cloud computing company that powers and protects business online.
AWS WorkSpaces Remote Code Execution
https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/
https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/
Rhino Security Labs
CVE-2021-38112: AWS WorkSpaces Remote Code Execution
This blog post details a vulnerability Rhino Security Labs found in AWS WorkSpaces desktop client, tracked as CVE-2021-38112
Analyzing a large-scale phishing-as-a-service operation
https://www.microsoft.com/security/blog/2021/09/21/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation/
https://www.microsoft.com/security/blog/2021/09/21/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation/
Microsoft News
Catching the big fish: Analyzing a large-scale phishing-as-a-service operation
With over 100 available phishing templates that mimic known brands and services, the BulletProofLink operation is responsible for many of the phishing campaigns that impact enterprises today. We are sharing these findings so the broader community can build…
Mama Always Told Me Not to Trust Strangers without Certificates
https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html
Netgear Security Advisory for Remote Code Execution on Some Routers, PSV-2021-0204
https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204
https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html
Netgear Security Advisory for Remote Code Execution on Some Routers, PSV-2021-0204
https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204
Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74581
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74581
About the security content of iOS 12.5.5 - Apple Support
https://support.apple.com/en-us/HT212824
https://support.apple.com/en-us/HT212824
Apple Support
About the security content of iOS 12.5.5
This document describes the security content of iOS 12.5.5.