Открытый практикум DevOps by Rebrain: IT-Quiz
Программа:
• квизы на разбор проблем в Kubernetes кластере
• решение в онлайн-формате
• призы победителям
• 27 Декабря (Вторник) в 19:00 по МСК. Детали
• Василий Озеров - Co-Founder REBRAIN. Более 8 лет Devops практик.
Программа:
• квизы на разбор проблем в Kubernetes кластере
• решение в онлайн-формате
• призы победителям
• 27 Декабря (Вторник) в 19:00 по МСК. Детали
• Василий Озеров - Co-Founder REBRAIN. Более 8 лет Devops практик.
/ LastPass Data Breach December Update
...We recently notified you that an unauthorized party gained access to a third-party cloud-based storage service, which LastPass uses to store archived backups of our production data. In keeping with our commitment to transparency, we want to provide you with an update regarding our ongoing investigation.
What We’ve Learned..:
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
...We recently notified you that an unauthorized party gained access to a third-party cloud-based storage service, which LastPass uses to store archived backups of our production data. In keeping with our commitment to transparency, we want to provide you with an update regarding our ongoing investigation.
What We’ve Learned..:
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
Lastpass
Security Incident December 2022 Update - LastPass - The LastPass Blog
Please refer to the latest article for updated information.nbs[..]
/ Detecting Azure AD Account Takeover Attacks
Cloud account takeover(ATO) is an attack where attackers gain access to cloud identities by using methods like social engineering, device code phishing, etc. Detecting these attacks can sometimes be difficult. In this blog, I’ll explain how we can develop a generic detection that covers almost any, if not all, methods for Azure AD (Well, the method can be applied to other identity providers, too)..:
— https://posts.bluraven.io/detecting-azure-ad-account-takeover-attacks-b2652bb65a4c
Cloud account takeover(ATO) is an attack where attackers gain access to cloud identities by using methods like social engineering, device code phishing, etc. Detecting these attacks can sometimes be difficult. In this blog, I’ll explain how we can develop a generic detection that covers almost any, if not all, methods for Azure AD (Well, the method can be applied to other identity providers, too)..:
— https://posts.bluraven.io/detecting-azure-ad-account-takeover-attacks-b2652bb65a4c
Medium
Detecting Azure AD Account Takeover Attacks
An easy and generic approach for detecting cloud account takeover attacks using KQL
Sys-Admin InfoSec pinned «Open BLD DNS Service: December/End of the year 2022. Update News. Open BLD DNS Service - it is a free DoH / DoT / DNS project for blocking trackers, telemetry, advertising, malware with support TLS v1.2/v1.3. 🌱 New Services Added ❇ Adaptive Open BLD…»
/ ACSESSED: Cross-tenant network bypass in Azure Cognitive Search
https://www.mnemonic.io/resources/blog/acsessed-cross-tenant-network-bypass-in-azure-cognitive-search/
https://www.mnemonic.io/resources/blog/acsessed-cross-tenant-network-bypass-in-azure-cognitive-search/
Mnemonic
ACSESSED: Cross-tenant network bypass in Azure Cognitive Search
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
/ Check Point response to CVE-2021-26414 - "Windows DCOM Server Security Feature Bypass"
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176148&t=1672019191897
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176148&t=1672019191897
Checkpoint
sk176148 - Check Point response to CVE-2021-26414 - "Windows DCOM Server Security Feature Bypass"
Applies to: Identity Awareness, Multi-Domain Security Management, Quantum Security Management, Quantum Spark Appliances
/ ZyXEL LTE3301-M209 - "Backdoor" credentials
https://resolverblog.blogspot.com/2022/12/cve-2022-40602-zyxel-lte3301-m209.html
https://resolverblog.blogspot.com/2022/12/cve-2022-40602-zyxel-lte3301-m209.html
Blogspot
[ CVE-2022-40602 ] ZyXEL LTE3301-M209 - "Backdoor" credentials
Hi Folks, as a continuation from the previous post, we're going to take a look at ZyXEL LTE3301-M209. [!] Togheter with Zyxel PSIRT, we deci...
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
The FBI is warning the public that cyber criminals are using search engine advertisement services to impersonate brands and direct users to malicious sites that host ransomware and steal login credentials and other financial information:
https://www.ic3.gov/Media/Y2022/PSA221221
https://www.ic3.gov/Media/Y2022/PSA221221
/ Pass-the-Challenge: Defeating Windows Defender Credential Guard
..new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender Credential Guard..:
https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
..new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender Credential Guard..:
https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
Medium
Pass-the-Challenge: Defeating Windows Defender Credential Guard
In this blog post, we present new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender…
/ WordPress Stop Spammers Security < 2022.6 - Unauthenticated PHP Object Injection
PoC:
https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf
PoC:
https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf
WPScan
Stop Spammers Security < 2022.6 - Unauthenticated PHP Object Injection
See details on Stop Spammers Security < 2022.6 - Unauthenticated PHP Object Injection CVE 2022-4120. View the latest Plugin Vulnerabilities on WPScan.
/ New Deployment Option for Self-Hosting Bitwarden
https://bitwarden.com/blog/new-deployment-option-for-self-hosting-bitwarden/
https://bitwarden.com/blog/new-deployment-option-for-self-hosting-bitwarden/
Bitwarden
New deployment option for self-hosted Bitwarden | Bitwarden
The Bitwarden unified self-hosted deployment joins the existing standard deployment option as a lightweight alternative for those who choose to deploy their password management solution on their own private network.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Gitops-cookbook-ebook-Red-Hat-Developer.pdf
17.7 MB
/ New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/
/ Get root on macOS 13.0.1 with CVE-2022-46689, the macOS Dirty Cow bug
https://worthdoingbadly.com/macdirtycow/
P.S. thx for the link @clevergod ✌️
https://worthdoingbadly.com/macdirtycow/
P.S. thx for the link @clevergod ✌️
Worth Doing Badly
Get root on macOS 13.0.1 with CVE-2022-46689, the macOS Dirty Cow bug
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple’s XNU source.
/ SQL Injection vulnerability (CVE-2022-47523) was discovered in Password Manager Pro, PAM360 and Access Manager Plus
https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html
https://www.manageengine.com/privileged-session-management/advisory/cve-2022-47523.html
Manageengine
SQL Injection Vulnerability - CVE-2022-47523 - ManageEngine Access Manager Plus
SQL Injection Vulnerability in ManageEngine Access Manager Plus
/ CircleCI security alert: Rotate any secrets stored in CircleCI
https://circleci.com/blog/january-4-2023-security-alert/
https://circleci.com/blog/january-4-2023-security-alert/
CircleCI
CircleCI security alert: Rotate any secrets stored in CircleCI (Updated Jan 13)
Read CircleCI’s security alerts from January 2023. Last updated 1/13/2023.
/ PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources
…automated account creation cases bypassed CAPTCHA images using simple image analysis techniques... creation of more than 130,000 user accounts created on various cloud platform services like Heroku, Togglebox and GitHub..:
https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/
…automated account creation cases bypassed CAPTCHA images using simple image analysis techniques... creation of more than 130,000 user accounts created on various cloud platform services like Heroku, Togglebox and GitHub..:
https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/
Unit 42
PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources
We take a deep dive into Automated Libra, the cloud threat actor group behind the freejacking campaign PurpleUrchin.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Invictus-AWS
Is a python noscript that will help automatically enumerate and acquire relevant data from an AWS environment. The tool doesn't require any installation it can be run as a standalone noscript with minimal configuration required. The goal for Invictus-AWS is to allow incident responders or other security personnel to quickly get an insight into an AWS environment:
— https://github.com/invictus-ir/Invictus-AWS
Is a python noscript that will help automatically enumerate and acquire relevant data from an AWS environment. The tool doesn't require any installation it can be run as a standalone noscript with minimal configuration required. The goal for Invictus-AWS is to allow incident responders or other security personnel to quickly get an insight into an AWS environment:
— https://github.com/invictus-ir/Invictus-AWS
GitHub
GitHub - invictus-ir/Invictus-AWS: A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data…
A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of incident response. - GitHub - invictus-ir/Invictus-AWS: A t...