Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
awesome-security-hardening
A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
https://github.com/decalage2/awesome-security-hardening
A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
https://github.com/decalage2/awesome-security-hardening
GitHub
GitHub - decalage2/awesome-security-hardening: A collection of awesome security hardening guides, tools and other resources
A collection of awesome security hardening guides, tools and other resources - decalage2/awesome-security-hardening
/ A new secret stash for “fileless” malware
https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/
https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/
Securelist
A new secret stash for “fileless” malware
We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign.
/ Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM...
Critical
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9
Critical
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9
Cisco
Cisco Security Advisory: Cisco Enterprise NFV Infrastructure Software Vulnerabilities
Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to…
/ Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
Newst updated document frim NIST
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf
Newst updated document frim NIST
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1.pdf
/ Vulnerabilities in Avast And AVG Put Millions At Risk
https://www.sentinelone.com/labs/vulnerabilities-in-avast-and-avg-put-millions-at-risk/
https://www.sentinelone.com/labs/vulnerabilities-in-avast-and-avg-put-millions-at-risk/
SentinelOne
Vulnerabilities in Avast And AVG Put Millions At Risk
Two high-severity flaws in popular end user security tools allow attackers to elevate privileges and compromise devices.
/ Raspberry Robin gets the worm early
Red Canary is tracking a worm spread by external drives that leverages Windows Installer to reach out to QNAP-associated domains and download a malicious DLL:
https://redcanary.com/blog/raspberry-robin/
Red Canary is tracking a worm spread by external drives that leverages Windows Installer to reach out to QNAP-associated domains and download a malicious DLL:
https://redcanary.com/blog/raspberry-robin/
Red Canary
Raspberry Robin gets the worm early
Raspberry Robin is a worm spread by external drives that leverages Windows Installer to download a malicious DLL.
BLD DNS Project Status Update (May 2022)
At the this Q2 2022, BLD has some good updates and news!
🪴 BLD Service updates
- Anti-flood Security Implementations and Improvements
- Optimized Debian based distros will change CentOS based
- Regex-supporting implementation
- New overlimits regulations and improvement performance
- Current month num of requests to BLD DNS 10M+ exceeded and the infrastructure withstood such a load, despite the minimal configuration of virtual servers 🥳
- BLD Project Site updates (Adaptive support for mobile devices, Multilingual support: EN, RU, BLD how to setup instructions: EN, RU )
🧩 New servers, resources and locations
At the last few months BLD infrastructure was updated:
- GoHost.kz - Nur-Sultan Server
- Unihost.kz - Almaty Server
- X-RDP - Monreal Server
🤝 BLD receive some supporting from:
- G-Core Labs - Cloud resources
- JetBrains - Open source license to BLD project
⚠️ Deprecation/Changing notises
- ! doh.sys-adm.in will be deprecated, please change your settings to bld.sys-adm.in
At the this Q2 2022, BLD has some good updates and news!
🪴 BLD Service updates
- Anti-flood Security Implementations and Improvements
- Optimized Debian based distros will change CentOS based
- Regex-supporting implementation
- New overlimits regulations and improvement performance
- Current month num of requests to BLD DNS 10M+ exceeded and the infrastructure withstood such a load, despite the minimal configuration of virtual servers 🥳
- BLD Project Site updates (Adaptive support for mobile devices, Multilingual support: EN, RU, BLD how to setup instructions: EN, RU )
🧩 New servers, resources and locations
At the last few months BLD infrastructure was updated:
- GoHost.kz - Nur-Sultan Server
- Unihost.kz - Almaty Server
- X-RDP - Monreal Server
🤝 BLD receive some supporting from:
- G-Core Labs - Cloud resources
- JetBrains - Open source license to BLD project
⚠️ Deprecation/Changing notises
- ! doh.sys-adm.in will be deprecated, please change your settings to bld.sys-adm.in
/ Microsoft Windows LSA Spoofing vulneravility
Windows LSA spoofing vulnerability provides a opprtunity for attackers to authenticate to domain controllers
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925
Windows LSA spoofing vulnerability provides a opprtunity for attackers to authenticate to domain controllers
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925
/ Security Advisory: Insufficient Tenant Separation in Azure Synapse Service
https://orca.security/resources/blog/azure-synapse-analytics-security-advisory/
https://orca.security/resources/blog/azure-synapse-analytics-security-advisory/
Orca Security
Azure Synapse Security Advisory | Orca Research Pod
Learn about how the Orca Research Pod discovered an Azure Synapse Security Advisory, now called Synlapse, in the use of the Microsoft Azure Synapse service.
Сегодня в Алматы состоится сходка нескольких ИТ-комьюнити с докладами и не только (Lenore Pub, 19:00)
Движуху двигают r0crewKZ совместно с SolveChat, будет куча докладов (и я там тоже буду)
1. Александр Ошлаков - "Пишем код в функциональном стиле. Как и главное Зачем"
2. Евгения Цыбренко - "Гибридные Криптобиржи: взгляд изнутри"
3. Thatskriptkid - "Решаем андроид крякми с помощью IDA"
4. novitoll - "gnuradio: Eins, zwei (G), Polizei, Drei (G), vier (G), Grenadier, Fünf (G)?"
5. Sh3lldon - Патчинг bin, elf и pe файлов с гидрой
6. sysadmin "Аваренесс о неявных превентивных сервисах"
Бесплатно, без стрима, без записи.
Не забываем подтягиваться в Lenore Pub к 19:00 ✌️
#free #meetup #ru
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
HR головного мозга или что не так с рынком поиска трудовых резервов
Периодически поглядываю на рынок труда, как с точки зрения работодателя, так и с точки зрения соискателя.
Последнее время, метаморфоза типов, видов, способов трудового взаимодействия претерпела значительные, но почему то не совсем видимые и даже порой неочевидные вещи (для вполне очевидных вещей) - для конечных пользователей рынка, будь то HR или соискатель.
Возможно нижесказанное, есть ни что иное, как субъективный взгляд со своей (моей) колокольни, но что действительно вырисовывается из общей картины хочется зафиксировать в этом артикле..:
- [HR головного мозга](https://sys-adm.in/live/978-hr-golovnogo-mozga-ili-chto-ne-tak-s-rynkom-poiska-trudovykh-rezervov.html)
#ru #blog #reflections
Периодически поглядываю на рынок труда, как с точки зрения работодателя, так и с точки зрения соискателя.
Последнее время, метаморфоза типов, видов, способов трудового взаимодействия претерпела значительные, но почему то не совсем видимые и даже порой неочевидные вещи (для вполне очевидных вещей) - для конечных пользователей рынка, будь то HR или соискатель.
Возможно нижесказанное, есть ни что иное, как субъективный взгляд со своей (моей) колокольни, но что действительно вырисовывается из общей картины хочется зафиксировать в этом артикле..:
- [HR головного мозга](https://sys-adm.in/live/978-hr-golovnogo-mozga-ili-chto-ne-tak-s-rynkom-poiska-trudovykh-rezervov.html)
#ru #blog #reflections
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
/ Massive WordPress JavaScript Injection Campaign Redirects to Ads
https://blog.sucuri.net/2022/05/massive-wordpress-javanoscript-injection-campaign-redirects-to-ads.html
https://blog.sucuri.net/2022/05/massive-wordpress-javanoscript-injection-campaign-redirects-to-ads.html
Sucuri Blog
Massive WordPress JavaScript Injection Campaign Redirects to Ads
May 2022 saw a new wave for the massive malware campaign that targets vulnerable plugins and themes in WordPress websites to inject malicious JavaScript and redirect site visitors to ads and scam pages.
/ Vulnerability Spotlight: How an attacker could chain several vulnerabilities in an industrial wireless router to gain root access
InHand Networks’ InRouter302 that could allow an attacker to escalate their privileges on the targeted device from a non-privileged user to a privileged one:
https://blog.talosintelligence.com/2022/05/blog-post-.html
InHand Networks’ InRouter302 that could allow an attacker to escalate their privileges on the targeted device from a non-privileged user to a privileged one:
https://blog.talosintelligence.com/2022/05/blog-post-.html
/ Zyxel Firewall Unauthenticated Remote Command Injection
https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/
https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/
Rapid7
CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | Rapid7 Blog
/ Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&CK® matrix evaluation for defenders
https://www.microsoft.com/security/blog/2022/05/11/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders/
https://www.microsoft.com/security/blog/2022/05/11/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders/
Microsoft News
Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&CK® matrix evaluation for defenders
The Center for Threat-Informed Defense, along with Microsoft and industry partners, collaborated on a repeatable methodology and a web-based calculator, aiming to streamline MITRE ATT&CK® use for defenders.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Combining even more techniques to defeat EDR via DLL unhooking and AMSI bypass
Research article:
https://kymb0.github.io/malwaredev-defeat-edr-unhook/
Research article:
https://kymb0.github.io/malwaredev-defeat-edr-unhook/
kymBlog
Combining even more techniques to defeat EDR via DLL unhooking and AMSI bypass
Taking on an enterprise grade EDR for fun, profit, and learning
/ Kali Linux 2022.2 Release
This release has various impressive updates:
https://www.kali.org/blog/kali-linux-2022-2-release/
This release has various impressive updates:
https://www.kali.org/blog/kali-linux-2022-2-release/
Kali Linux
Kali Linux 2022.2 Release (GNOME 42, KDE 5.24 & hollywood-activate) | Kali Linux Blog
It’s that time of year again, time for another Kali Linux release! Quarter #2 - Kali Linux 2022.2. This release has various impressive updates, all of which are ready for immediate download or updating.
The summary of the changelog since the 2022.1 release…
The summary of the changelog since the 2022.1 release…