/ Apache HTTP Server 2.4 vulnerabilities fixes
This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4
https://httpd.apache.org/security/vulnerabilities_24.html
This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4
https://httpd.apache.org/security/vulnerabilities_24.html
httpd.apache.org
Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project
/ firejail: local root exploit reachable via --join logic
(CVE-2022-31214)
https://www.openwall.com/lists/oss-security/2022/06/08/10
Exploit:
https://www.openwall.com/lists/oss-security/2022/06/08/10/1
(CVE-2022-31214)
https://www.openwall.com/lists/oss-security/2022/06/08/10
Exploit:
https://www.openwall.com/lists/oss-security/2022/06/08/10/1
/ Atom and will archive all projects under the organization on December 15, 2022
There was a good editor(
https://github.blog/2022-06-08-sunsetting-atom/
There was a good editor(
https://github.blog/2022-06-08-sunsetting-atom/
The GitHub Blog
Sunsetting Atom
We are archiving Atom and all projects under the Atom organization for an official sunset on December 15, 2022.
/ Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011
https://www.drupal.org/sa-core-2022-011
https://www.drupal.org/sa-core-2022-011
Drupal.org
Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-011
Updated 22:00 UTC 2022-06-10: Added steps to update without drupal/core-recommended. Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released two security advisories: Failure to strip the…
/ FIREFOX AND CHROME ARE SQUARING OFF OVER AD-BLOCKER EXTENSIONS
...
THE SAME FEATURE CAN BE USED MALICIOUSLY TO HIJACK USERS’ LOGIN CREDENTIALS OR INSERT EXTRA ADS INTO WEB PAGES
...
https://www.theverge.com/2022/6/10/23131029/mozilla-ad-blocking-firefox-google-chrome-privacy-manifest-v3-web-request
P.S. Sys-Admin Open BLD Service does not use browser extantions or etc, it is encrypted malisious/tracking/ad DNS blocking service which support many popular browsers, mobile devices, routers, OSs, details : https://lab.sys-adm.in
...
THE SAME FEATURE CAN BE USED MALICIOUSLY TO HIJACK USERS’ LOGIN CREDENTIALS OR INSERT EXTRA ADS INTO WEB PAGES
...
https://www.theverge.com/2022/6/10/23131029/mozilla-ad-blocking-firefox-google-chrome-privacy-manifest-v3-web-request
P.S. Sys-Admin Open BLD Service does not use browser extantions or etc, it is encrypted malisious/tracking/ad DNS blocking service which support many popular browsers, mobile devices, routers, OSs, details : https://lab.sys-adm.in
The Verge
Firefox and Chrome are squaring off over ad blocker extensions
A browser privacy showdown has been brewing for a while.
/ Apple M1 PACMAN attack
PACMAN is a novel hardware attack that can bypass Pointer Authentication (PAC) on the Apple M1 CPU. We present the following contributions:
- A new way of thinking about compounding threat models in the Spectre age.
- Reverse engineered details of the M1 memory hierarchy.
- A hardware attack to forge kernel PACs from userspace on M1.
Details:
* https://pacmanattack.com/
PACMAN is a novel hardware attack that can bypass Pointer Authentication (PAC) on the Apple M1 CPU. We present the following contributions:
- A new way of thinking about compounding threat models in the Spectre age.
- Reverse engineered details of the M1 memory hierarchy.
- A hardware attack to forge kernel PACs from userspace on M1.
Details:
* https://pacmanattack.com/
PACMAN
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
/ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
/ New Hertzbleed Attack
Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure:
https://www.hertzbleed.com/
Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure:
https://www.hertzbleed.com/
Hertzbleed
Hertzbleed Attack
Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
Открытый курс по этичному хакингу. Формат: 10% теория / 90% практика.
Это то, что доктор прописал, курс от практикующего Этичного Хакера, Master of Computer Science, OSCP, eWPTXv2, eCPTXv2
Исследователь множественных CVE, автор блога: murat.one, канала: @onebrick, хорошего человека и моего друга, по окончанию курса слушатели будут на уровне junior penetration tester, в общем 10 недель:
• Неделя 1. Введение в коммерческий пентест. Создание рабочей среды
• Неделя 2. Сбор информации. OSINT
• Неделя 3. Техники социальной инженерии
• Неделя 4. Безопасность web-приложений
• Неделя 5. Атака на web-приложения. Автоматические инструменты
• Неделя 6. Безопасность инфраструктуры. Разведка
• Неделя 7. Атаки на инфраструктуру. Metasploit Framework
• Неделя 8. Основы Android приложений и атаки на WiFi
• Неделя 9. Платформы для обучения кибербезопасности
• Неделя 10. Написание коммерческого отчета
Со слов автора - не диктор и возможно придется поставить скорость на 1.5, но лично мне все в самый раз:
• https://youtu.be/oRflkcjm08U
Спасибо @manfromkz за проделанный труд и за открытый awareness паблику 🤝
/ SynLapse – Technical Details for Critical Azure Synapse Vulnerability
https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability/
https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability/
Orca Security
SynLapse: Azure Synapse Vulnerability | Orca Research Pod
SynLapse was a vulnerability in the Azure Synapse Analytics service discovered by one of Orca Security’s vulnerability researchers, Tzah Pahima.
/ Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
SSH Worm details analysis:
https://www.akamai.com/blog/security/new-p2p-botnet-panchan
SSH Worm details analysis:
https://www.akamai.com/blog/security/new-p2p-botnet-panchan
Akamai
Akamai Blog | Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
Akamai researchers have discovered a new P2P botnet targeting APJ. Read about it here.
/ How I found a Critical Bug in Instagram and Got 49500$ Bounty From Facebook
Blog-post/PoC from 20-years old seurity researcher:
https://infosecwriteups.com/how-i-found-a-critical-bug-in-instagram-and-got-49500-bounty-from-facebook-626ff2c6a853
Blog-post/PoC from 20-years old seurity researcher:
https://infosecwriteups.com/how-i-found-a-critical-bug-in-instagram-and-got-49500-bounty-from-facebook-626ff2c6a853
/ Lookout Uncovers Android Spyware Deployed in Kazakhstan
https://www.lookout.com/blog/hermit-spyware-discovery
https://www.lookout.com/blog/hermit-spyware-discovery
Lookout
Lookout Uncovers Hermit Spyware Deployed in Kazakhstan | Threat Intel
Lookout researchers have uncovered enterprise-grade Android surveillanceware used by the government of Kazakhstan within its borders.
/ DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach
https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
Volexity
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach
Volexity frequently works with individuals and organizations heavily targeted by sophisticated, motivated, and well-equipped threat actors from around the world. Some of these individuals or organizations are attacked infrequently or […]
/ Critical Vulnerability Affecting Crypto Wallet Browser Extensions
Wallets that were affected include MetaMask, Brave, Phantom, and xDefi, who have remediated the issue:
https://halborn.com/halborn-discovers-critical-vulnerability-affecting-crypto-wallet-browser-extensions/
Wallets that were affected include MetaMask, Brave, Phantom, and xDefi, who have remediated the issue:
https://halborn.com/halborn-discovers-critical-vulnerability-affecting-crypto-wallet-browser-extensions/
Halborn
Halborn Discovers Critical Vulnerability Affecting Crypto Wallet Browser Extensions
On June 15 2022 Halborn revealed the discovery of a critical vulnerability affecting crypto wallets MetaMask, Brave, Phantom, and xDefi.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
[ru] Мои "Flex" факторы работы с инфраструктурой, про 12 факторов Heroku и не только
В Августе 2021 года, когда я запускал OPEN BLD DNS и по сегодняшний день - слыхом не слыхивал про методологию THE TWELVE-FACTOR APP, но когда прочитал, понял - у меня все так и было +- на интуитивном уровне, сегодня хочу рассказать свою версию факторов подхода к разработке, деплою, использованию и отслеживанию работоспособности проектов.
Далее о 12 факторах, моей "Flex" методологии и о том, как это все можно применять на практике:
* Статья о 12 факторах Heroku и моего “Flex” взгляда
~~~
[en] My "Flex" factors working with infrastructure and about of 12-factors app from Heroku
Try to use Google Translator, but I created repo and site for my “Flex” concept:
* Repo: https://github.com/m0zgen/flex-doc
* Site: https://flex-doc.pages.dev
В Августе 2021 года, когда я запускал OPEN BLD DNS и по сегодняшний день - слыхом не слыхивал про методологию THE TWELVE-FACTOR APP, но когда прочитал, понял - у меня все так и было +- на интуитивном уровне, сегодня хочу рассказать свою версию факторов подхода к разработке, деплою, использованию и отслеживанию работоспособности проектов.
Далее о 12 факторах, моей "Flex" методологии и о том, как это все можно применять на практике:
* Статья о 12 факторах Heroku и моего “Flex” взгляда
~~~
[en] My "Flex" factors working with infrastructure and about of 12-factors app from Heroku
Try to use Google Translator, but I created repo and site for my “Flex” concept:
* Repo: https://github.com/m0zgen/flex-doc
* Site: https://flex-doc.pages.dev
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
/ The many lives of BlackCat ransomware
Tergeted to Exchange servers. Analysis:
https://www.microsoft.com/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/
Tergeted to Exchange servers. Analysis:
https://www.microsoft.com/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/
Microsoft News
The many lives of BlackCat ransomware
The use of an unconventional programming language, multiple target devices and possible entry points, and affiliation with prolific threat activity groups have made the BlackCat ransomware a prevalent threat and a prime example of the growing ransomware-as…
/ DFSCoerce
PoC for MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot method:
https://github.com/Wh04m1001/DFSCoerce
PoC for MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot method:
https://github.com/Wh04m1001/DFSCoerce
GitHub
GitHub - Wh04m1001/DFSCoerce
Contribute to Wh04m1001/DFSCoerce development by creating an account on GitHub.