/ 7 Top Trends in Cybersecurity for 2022 from Gartner
https://www.gartner.com/en/articles/7-top-trends-in-cybersecurity-for-2022
https://www.gartner.com/en/articles/7-top-trends-in-cybersecurity-for-2022
Gartner
7 Top Trends in Cybersecurity for 2022
Security and risk executives face a critical juncture in 2022, as the digital footprint of organizations expands and centralized cybersecurity control becomes obsolete. Discover the 7️⃣ top trends in #Cybersecurity from @Gartner_IT. #GartnerSEC
/ What is DNSCrypt
DNSCrypt is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven’t been tampered with.
It is an open specification, with free and open source reference implementations, and it is not affiliated with any company nor organization:
https://dnscrypt.info/
DNSCrypt is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven’t been tampered with.
It is an open specification, with free and open source reference implementations, and it is not affiliated with any company nor organization:
https://dnscrypt.info/
DNSCrypt
DNSCrypt version 2 - Official Project Home Page
New home of the DNSCrypt project, now implementing multiple protocols to improve DNS security. Download official DNSCrypt & DoH servers and clients here.
/ Использование офисных документов в кибератаках
статистика вредоносных вложений в почтовом трафике и не только:
https://securelist.ru/malicious-office-documents-in-cyber-attacks/105158/
статистика вредоносных вложений в почтовом трафике и не только:
https://securelist.ru/malicious-office-documents-in-cyber-attacks/105158/
securelist.ru
Вредоносные офисные документы в почтовых рассылках
В марте 2022 резко возросло количество рассылок с вредоносными офисными документами. Приводим статистику по срабатываниям почтовых компонентов наших защитных решений и общую информацию об атаках с использованием документов.
/ Multiple vulnerabilities in Zyxel zysh
zysh vulnerabilities research:
https://security.humanativaspa.it/multiple-vulnerabilities-in-zyxel-zysh/
zysh vulnerabilities research:
https://security.humanativaspa.it/multiple-vulnerabilities-in-zyxel-zysh/
hn security
Multiple vulnerabilities in Zyxel zysh - hn security
“We live on a placid island […]
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
⚙️ Monitor.sh - Script for checking systemd unit status
monitor.sh can run custom noscript / action if unit has stopped or running statuses, examples:
or
or just:
add this noscript to cron and if your systemd unit will be stopped or disabled, monitor.sh will enable and will try tu restart targeted systemd unit…
* https://github.com/m0zgen/monitor
monitor.sh can run custom noscript / action if unit has stopped or running statuses, examples:
./monitor.sh -u sshd -a "/path/to/action-noscript/action.sh"or
./monitor.sh -u multipathd -r -a "/usr/local/sbin/test.sh"or just:
./monitor.sh -u multipathd -radd this noscript to cron and if your systemd unit will be stopped or disabled, monitor.sh will enable and will try tu restart targeted systemd unit…
* https://github.com/m0zgen/monitor
GitHub
GitHub - m0zgen/monitor: ⚙️ Monitor.sh - Script for checking systemd unit status
⚙️ Monitor.sh - Script for checking systemd unit status - m0zgen/monitor
/ Ransomware The True Cost to Business
A Global Study on Ransomware Business Impact report:
https://www.cybereason.com/hubfs/dam/collateral/reports/Ransomware-The-True-Cost-to-Business-2022.pdf
A Global Study on Ransomware Business Impact report:
https://www.cybereason.com/hubfs/dam/collateral/reports/Ransomware-The-True-Cost-to-Business-2022.pdf
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Этика и психология индивидуума айтишного и не только. Риторика.
- В начале было слово. Слово - это поступок. Говоря слова и собирая их в предложения, абзацы - следи за собой ибо ты совершаешь поступки.
- Воля, дух - их как бы нет как органов, но их можно тренировать, развивать и использовать это в своей жизни.
- Совокупность разных качеств образует образ - личность, эксперта или тряпку и болтуна.
Нравственность и мораль, а так же жизненный опыт, аспекты слова и духа и много чего еще образуют еще одну сущность, дисциплину - этика…
Далее о наборе различных компетенций формирующих поведение и отношение к жизни, самомы себе и окружающим:
- https://sys-adm.in/live/983-etika-i-psikhologiya-individuuma-ajtishnogo-i-ne-tolko-ritorika.html
- В начале было слово. Слово - это поступок. Говоря слова и собирая их в предложения, абзацы - следи за собой ибо ты совершаешь поступки.
- Воля, дух - их как бы нет как органов, но их можно тренировать, развивать и использовать это в своей жизни.
- Совокупность разных качеств образует образ - личность, эксперта или тряпку и болтуна.
Нравственность и мораль, а так же жизненный опыт, аспекты слова и духа и много чего еще образуют еще одну сущность, дисциплину - этика…
Далее о наборе различных компетенций формирующих поведение и отношение к жизни, самомы себе и окружающим:
- https://sys-adm.in/live/983-etika-i-psikhologiya-individuuma-ajtishnogo-i-ne-tolko-ritorika.html
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
/ Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
https://blogs.blackberry.com/en/2022/06/symbiote-a-new-nearly-impossible-to-detect-linux-threat
And:
https://www.intezer.com/blog/research/new-linux-threat-symbiote/
https://blogs.blackberry.com/en/2022/06/symbiote-a-new-nearly-impossible-to-detect-linux-threat
And:
https://www.intezer.com/blog/research/new-linux-threat-symbiote/
BlackBerry
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
There's a new, nearly-impossible-to-detect Linux threat that may be hiding in your running processes. Learn more about "Symbiote," discovered via new joint research by Intezer and BlackBerry.
/ Apache HTTP Server 2.4 vulnerabilities fixes
This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4
https://httpd.apache.org/security/vulnerabilities_24.html
This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4
https://httpd.apache.org/security/vulnerabilities_24.html
httpd.apache.org
Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project
/ firejail: local root exploit reachable via --join logic
(CVE-2022-31214)
https://www.openwall.com/lists/oss-security/2022/06/08/10
Exploit:
https://www.openwall.com/lists/oss-security/2022/06/08/10/1
(CVE-2022-31214)
https://www.openwall.com/lists/oss-security/2022/06/08/10
Exploit:
https://www.openwall.com/lists/oss-security/2022/06/08/10/1
/ Atom and will archive all projects under the organization on December 15, 2022
There was a good editor(
https://github.blog/2022-06-08-sunsetting-atom/
There was a good editor(
https://github.blog/2022-06-08-sunsetting-atom/
The GitHub Blog
Sunsetting Atom
We are archiving Atom and all projects under the Atom organization for an official sunset on December 15, 2022.
/ Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011
https://www.drupal.org/sa-core-2022-011
https://www.drupal.org/sa-core-2022-011
Drupal.org
Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011
Updated 22:00 UTC 2022-06-10: Added steps to update without drupal/core-recommended. Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released two security advisories: Failure to strip the…
/ FIREFOX AND CHROME ARE SQUARING OFF OVER AD-BLOCKER EXTENSIONS
...
THE SAME FEATURE CAN BE USED MALICIOUSLY TO HIJACK USERS’ LOGIN CREDENTIALS OR INSERT EXTRA ADS INTO WEB PAGES
...
https://www.theverge.com/2022/6/10/23131029/mozilla-ad-blocking-firefox-google-chrome-privacy-manifest-v3-web-request
P.S. Sys-Admin Open BLD Service does not use browser extantions or etc, it is encrypted malisious/tracking/ad DNS blocking service which support many popular browsers, mobile devices, routers, OSs, details : https://lab.sys-adm.in
...
THE SAME FEATURE CAN BE USED MALICIOUSLY TO HIJACK USERS’ LOGIN CREDENTIALS OR INSERT EXTRA ADS INTO WEB PAGES
...
https://www.theverge.com/2022/6/10/23131029/mozilla-ad-blocking-firefox-google-chrome-privacy-manifest-v3-web-request
P.S. Sys-Admin Open BLD Service does not use browser extantions or etc, it is encrypted malisious/tracking/ad DNS blocking service which support many popular browsers, mobile devices, routers, OSs, details : https://lab.sys-adm.in
The Verge
Firefox and Chrome are squaring off over ad blocker extensions
A browser privacy showdown has been brewing for a while.
/ Apple M1 PACMAN attack
PACMAN is a novel hardware attack that can bypass Pointer Authentication (PAC) on the Apple M1 CPU. We present the following contributions:
- A new way of thinking about compounding threat models in the Spectre age.
- Reverse engineered details of the M1 memory hierarchy.
- A hardware attack to forge kernel PACs from userspace on M1.
Details:
* https://pacmanattack.com/
PACMAN is a novel hardware attack that can bypass Pointer Authentication (PAC) on the Apple M1 CPU. We present the following contributions:
- A new way of thinking about compounding threat models in the Spectre age.
- Reverse engineered details of the M1 memory hierarchy.
- A hardware attack to forge kernel PACs from userspace on M1.
Details:
* https://pacmanattack.com/
PACMAN
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
/ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
/ New Hertzbleed Attack
Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure:
https://www.hertzbleed.com/
Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure:
https://www.hertzbleed.com/
Hertzbleed
Hertzbleed Attack
Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
Открытый курс по этичному хакингу. Формат: 10% теория / 90% практика.
Это то, что доктор прописал, курс от практикующего Этичного Хакера, Master of Computer Science, OSCP, eWPTXv2, eCPTXv2
Исследователь множественных CVE, автор блога: murat.one, канала: @onebrick, хорошего человека и моего друга, по окончанию курса слушатели будут на уровне junior penetration tester, в общем 10 недель:
• Неделя 1. Введение в коммерческий пентест. Создание рабочей среды
• Неделя 2. Сбор информации. OSINT
• Неделя 3. Техники социальной инженерии
• Неделя 4. Безопасность web-приложений
• Неделя 5. Атака на web-приложения. Автоматические инструменты
• Неделя 6. Безопасность инфраструктуры. Разведка
• Неделя 7. Атаки на инфраструктуру. Metasploit Framework
• Неделя 8. Основы Android приложений и атаки на WiFi
• Неделя 9. Платформы для обучения кибербезопасности
• Неделя 10. Написание коммерческого отчета
Со слов автора - не диктор и возможно придется поставить скорость на 1.5, но лично мне все в самый раз:
• https://youtu.be/oRflkcjm08U
Спасибо @manfromkz за проделанный труд и за открытый awareness паблику 🤝
/ SynLapse – Technical Details for Critical Azure Synapse Vulnerability
https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability/
https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability/
Orca Security
SynLapse: Azure Synapse Vulnerability | Orca Research Pod
SynLapse was a vulnerability in the Azure Synapse Analytics service discovered by one of Orca Security’s vulnerability researchers, Tzah Pahima.
/ Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
SSH Worm details analysis:
https://www.akamai.com/blog/security/new-p2p-botnet-panchan
SSH Worm details analysis:
https://www.akamai.com/blog/security/new-p2p-botnet-panchan
Akamai
Akamai Blog | Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
Akamai researchers have discovered a new P2P botnet targeting APJ. Read about it here.