/ 20 years of payment processing problems
Electronic payment systems have existed on the Internet for a long time, and some bugs in them are twenty years old. We’ve found critical vulnerabilities allowing us to steal money and drive up the balance. Today we will analyze typical implementations of payment processing and related security issues…
https://bo0om.ru/20-years-of-payment-processing-problems-en
Electronic payment systems have existed on the Internet for a long time, and some bugs in them are twenty years old. We’ve found critical vulnerabilities allowing us to steal money and drive up the balance. Today we will analyze typical implementations of payment processing and related security issues…
https://bo0om.ru/20-years-of-payment-processing-problems-en
/ A look at the CloudMensis macOS spyware
CloudMensis is malware for macOS developed in Objective-C. Samples we analyzed are compiled for both Intel and Apple silicon architectures..:
* Technical analysis
CloudMensis is malware for macOS developed in Objective-C. Samples we analyzed are compiled for both Intel and Apple silicon architectures..:
* Technical analysis
WeLiveSecurity
I see what you did there: A look at the CloudMensis macOS spyware
ESET uncovers CloudMensis, a macOS backdoor that spies on users of Mac devices and communicates with its operators via public cloud storage services.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
AppFlowy.IO - The Open Source Alternative To Notion
You are in charge of your data and customizations.
Documentation:
* https://appflowy.gitbook.io/docs/essential-documentation/contribute-to-appflowy
Official site:
* https://www.appflowy.io
GitHub:
* https://github.com/AppFlowy-IO/appflowy
#need_ro_research
You are in charge of your data and customizations.
Documentation:
* https://appflowy.gitbook.io/docs/essential-documentation/contribute-to-appflowy
Official site:
* https://www.appflowy.io
GitHub:
* https://github.com/AppFlowy-IO/appflowy
#need_ro_research
AppFlowy
AppFlowy is the AI collaborative workspace where you achieve more without losing control of your data
Open BLD DNS: Our supporter is UptimeRobot
Hey, UptimeRobot it is a very good solution for on-line monitoring tasks. I'm using UptimeRobot over than 10 years for monitoring tasks by:
- Ping availability my Blog and Forum
- HTTP(S) availability and SSL expiry reminders
- Port(s) availability for Open BLD services
- Keyword checking on web-pages
Free plan allow using UptimeRobot with 5 min. interval with notifications to email.
Now, UptimeRobot helps to Open BLD Project to reduce checking intervals to 1 min and now you can checking Open BLD status on:
• https://bld-status.sys-adm.in page.
On my own behalf, I express my deep gratitude to the UptimeRobot service, now the availability and stability of the Open BLD service has more monitoring than it was.
You can try / help to Open BLD DNS project through official BLD Project site:
* https://lab.sys-adm.in
Hey, UptimeRobot it is a very good solution for on-line monitoring tasks. I'm using UptimeRobot over than 10 years for monitoring tasks by:
- Ping availability my Blog and Forum
- HTTP(S) availability and SSL expiry reminders
- Port(s) availability for Open BLD services
- Keyword checking on web-pages
Free plan allow using UptimeRobot with 5 min. interval with notifications to email.
Now, UptimeRobot helps to Open BLD Project to reduce checking intervals to 1 min and now you can checking Open BLD status on:
• https://bld-status.sys-adm.in page.
On my own behalf, I express my deep gratitude to the UptimeRobot service, now the availability and stability of the Open BLD service has more monitoring than it was.
You can try / help to Open BLD DNS project through official BLD Project site:
* https://lab.sys-adm.in
/ DNS-over-HTTP/3 in Android
To help keep Android users’ DNS queries private, Android supports encrypted DNS. In addition to existing support for DNS-over-TLS, Android now supports DNS-over-HTTP/3 which has a number of improvements over DNS-over-TLS.
Announce from Google:
https://security.googleblog.com/2022/07/dns-over-http3-in-android.html
To help keep Android users’ DNS queries private, Android supports encrypted DNS. In addition to existing support for DNS-over-TLS, Android now supports DNS-over-HTTP/3 which has a number of improvements over DNS-over-TLS.
Announce from Google:
https://security.googleblog.com/2022/07/dns-over-http3-in-android.html
Google Online Security Blog
DNS-over-HTTP/3 in Android
Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. I...
/ Luna and Black Basta — new ransomware for Windows, Linux and ESXi
Luna: brand-new ransomware written in Rust, Black Basta is a relatively new ransomware variant written in C++ which first came to light in February 2022…
Technical analysis:
https://securelist.com/luna-black-basta-ransomware/106950/
Luna: brand-new ransomware written in Rust, Black Basta is a relatively new ransomware variant written in C++ which first came to light in February 2022…
Technical analysis:
https://securelist.com/luna-black-basta-ransomware/106950/
Securelist
Kaspersky report on Luna and Black Basta ransomware
This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta.
/ Apple released multiple security pathces for *OS
* About the security content of macOS Monterey 12.5. Details.
* About the security content of macOS Big Sur 11.6.8. Details.
* About the security content of Security Update 2022-005 Catalina. Details.
* About the security content of macOS Monterey 12.5. Details.
* About the security content of macOS Big Sur 11.6.8. Details.
* About the security content of Security Update 2022-005 Catalina. Details.
Apple Support
About the security content of macOS Monterey 12.5
This document describes the security content of macOS Monterey 12.5.
/ Atlassian Multiple Products Security Advisory - CVE-2022-26136, CVE-2022-26137
* Summary of Vulnerabilities
* Summary of Vulnerabilities
Open SysConf 22 да прибудет с нами сила!
Йоу! Внезапно. Нежданно не гаданно (как всегда) мы решили оффлайнутся в нашем любимом формате на Open SysConf 22:
Предварительные вводные Open SysConf 22:
• Первичный контекст конференции - Открытая конференция ИТ/ИБ/..OPS направлений
• Вторичный контекст конференции - Спорт, развитие, личностный рост, мотивация
• Тип встречи - оффлайн, вопросы с трансляцией/записью обсуждаются (об этом позже)
• Дата встречи - Октябрь, 2022г. Примерно середина месяца (об этом позже)
• Место - в процессе определения, но ясно одно, локация г.Алматы.
И конечно доклады, общение, знакомство, новые знания, мотивация и как результат личностный и профессиональный рост 🌱
Концепции:
• Без коммерции или коммерческого бэкграунда
• Открытость и бесплатность
• Свободный вход и участие
• Помощь и обеспечение - добровольное, донаты.
Заценить конфу и темы прошлогодней конференции:
• https://sysconf.io
Помни дорогой друг - Делиться своими знаниями и опытом это не только нужно - это необходимо.
Всем Peace ✌️
Йоу! Внезапно. Нежданно не гаданно (как всегда) мы решили оффлайнутся в нашем любимом формате на Open SysConf 22:
Предварительные вводные Open SysConf 22:
• Первичный контекст конференции - Открытая конференция ИТ/ИБ/..OPS направлений
• Вторичный контекст конференции - Спорт, развитие, личностный рост, мотивация
• Тип встречи - оффлайн, вопросы с трансляцией/записью обсуждаются (об этом позже)
• Дата встречи - Октябрь, 2022г. Примерно середина месяца (об этом позже)
• Место - в процессе определения, но ясно одно, локация г.Алматы.
И конечно доклады, общение, знакомство, новые знания, мотивация и как результат личностный и профессиональный рост 🌱
Концепции:
• Без коммерции или коммерческого бэкграунда
• Открытость и бесплатность
• Свободный вход и участие
• Помощь и обеспечение - добровольное, донаты.
Заценить конфу и темы прошлогодней конференции:
• https://sysconf.io
Помни дорогой друг - Делиться своими знаниями и опытом это не только нужно - это необходимо.
Всем Peace ✌️
/ Unauthenticated SQL injection vulnerability in SonicWall GMS
https://www.cybersecurity-help.cz/vdb/SB2022072213
https://www.cybersecurity-help.cz/vdb/SB2022072213
www.cybersecurity-help.cz
Unauthenticated SQL injection vulnerability in SonicWall GMS
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
/ VMware ESXi TCP/IP Memory Corruption Remote Code Execution Vulnerability
https://www.zerodayinitiative.com/advisories/ZDI-22-1021/
P.S. Thx dear subscriber for the link ✌️
https://www.zerodayinitiative.com/advisories/ZDI-22-1021/
P.S. Thx dear subscriber for the link ✌️
Zerodayinitiative
ZDI-22-1021
VMware ESXi TCP/IP Memory Corruption Remote Code Execution Vulnerability
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Boundary | HashiCorp Developer
Explore Boundary product documentation, tutorials, and examples.
/ Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/
https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/
Microsoft News
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and targeted attacks against European…
Samba 4.16.4, 4.15.9 and 4.14.14 Security Releases are available for Download
These are Security Releases in order to address CVE-2022-2031, CVE-2022-32742, CVE-2022-32744, CVE-2022-32745 and CVE-2022-32746.
https://www.samba.org/samba/latest_news.html#4.16.4
These are Security Releases in order to address CVE-2022-2031, CVE-2022-32742, CVE-2022-32744, CVE-2022-32745 and CVE-2022-32746.
https://www.samba.org/samba/latest_news.html#4.16.4
www.samba.org
Samba - Latest News
Home of Samba, the SMB file server
Old cat, new tricks, bad habits
An analysis of Charming Kitten’s new tools and OPSEC errors
The Telegram grabber tool is written in C++ and uses the open source Telegram Database Library (TDLib), a cross-platform Telegram client typically used to create custom apps for the platform... and many another interesting research info..:
https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html
An analysis of Charming Kitten’s new tools and OPSEC errors
The Telegram grabber tool is written in C++ and uses the open source Telegram Database Library (TDLib), a cross-platform Telegram client typically used to create custom apps for the platform... and many another interesting research info..:
https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html
PwC
Cyber threat intelligence
PwC delivers an innovative combination of human ingenuity and technologies to assess the global threat landscape, helping to protect against disruptions and data losses.
System Administrator Appreciation Day
Be Strong, Be Healthy, Be Smart ✌️
Be Strong, Be Healthy, Be Smart ✌️
/ Vulnerability in Dahua’s ONVIF Implementation Threatens IP Camera Security
https://www.nozominetworks.com/blog/vulnerability-in-dahua-s-onvif-implementation-threatens-ip-camera-security/
https://www.nozominetworks.com/blog/vulnerability-in-dahua-s-onvif-implementation-threatens-ip-camera-security/
Nozominetworks
Vulnerability in Dahua’s ONVIF Implementation Threatens IP Camera Security
Nozomi Networks Labs publishes a vulnerability in Dahua's ONVIF standard implementation, which can be abused to take over IP cameras.
/ Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool
https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/
https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/
SentinelOne
Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool
LockBit ransomware finds a new way to evade security controls by leveraging a Windows Defender command line tool.
/ DNS settings to avoid email spoofing and phishing for unused domain
https://www.cyberciti.biz/security/dns-settings-to-avoid-email-spoofing-and-phishing-for-unused-domain/
https://www.cyberciti.biz/security/dns-settings-to-avoid-email-spoofing-and-phishing-for-unused-domain/
/ Multiple vulnerabilities were privately reported to VMware. (critical)
Patches are available to remediate these vulnerabilities in affected VMware products:
https://www.vmware.com/security/advisories/VMSA-2022-0021.html
Patches are available to remediate these vulnerabilities in affected VMware products:
https://www.vmware.com/security/advisories/VMSA-2022-0021.html