Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
/ Interactive Phishing: Using Chatbot-like Web Applications to Harvest Information

https://www.trustwave.com/media/18693/capture3.png
/ CVE-2022-1729: race condition in Linux perf subsystem leads to local privilege escalation

https://www.openwall.com/lists/oss-security/2022/05/20/2
/ Note: BLD DNS server 135.125.204.230 set to maintenance mode up to ~10 minutes

up: done
/ New Research Paper: Pre-hijacking Attacks on Web User Accounts

https://msrc-blog.microsoft.com/2022/05/23/pre-hijacking-attacks/
/ New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices

Cheerscrypt, a new ransomware family, that has been targeting a customer’s ESXi server used to manage VMware files.

In the past, ESXi servers were also attacked by other known ransomware families such as LockBit, Hive, and RansomEXX as an efficient way to infect many computers with ransomware

- Link to PoC article
/ Serious security vulnerability in Tails 5.0

https://tails.boum.org/security/prototype_pollution/index.en.html
Sys-Admin InfoSec
  Сегодня в Алматы состоится сходка нескольких ИТ-комьюнити с докладами и не только (Lenore Pub, 19:00) Движуху двигают r0crewKZ совместно с SolveChat, будет куча докладов (и я там тоже буду) 1. Александр Ошлаков - "Пишем код в функциональном стиле. Как…
Сегодня. Продолжение. Астана. BurgerShop, в 18:00.

1. SCAM STORIES 🌀 Morty
2. Трюки обхода AV-движков в разработке малварей. Примеры шифрования шеллкода 🌀 catv
3. 2G GSM, 4G LTE, 5G NR 🌀 novitoll
4. Attacking software developers 🌀 Thatskriptkid

Бесплатно, без записи, без стрима.

P.S. Парням докладчикам - удачи Присутствущим понимания, терпения, внимания. 😉
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
/ Zero to hero: save your org from cyber-attack with a zero trust model

simple conceptual

https://specopssoft.com/blog/zero-trust-model-save-your-org-from-cyber-attack/
/ GhostTouch: Targeted Attacks on Touchscreens without Physical Touch

* https://www.usenix.org/conference/usenixsecurity22/presentation/wang-kai
/ Compromised US Academic Credentials Identified Across Various Public and Dark Web Forums

FBI warns

* https://www.ic3.gov/Media/News/2022/220526.pdf
/ Linux Kernel use-after-free write in netfilter

A use-after-free write vulnerability was identified within the netfilter subsystem
which can be exploited to achieve privilege escalation to root:

https://www.openwall.com/lists/oss-security/2022/05/31/1