/ Prevent phishing based on domain registrations
Based on Microsoft Defender SmartScreen and Enhanced Phishing Protection:
— https://cloudbrothers.info/en/prevent-phishing-based-domain-registrations/
Based on Microsoft Defender SmartScreen and Enhanced Phishing Protection:
— https://cloudbrothers.info/en/prevent-phishing-based-domain-registrations/
cloudbrothers.info
Prevent phishing based on domain registrations
Business email compromise and phishing are just two of the threats sent to hundreds and thousands of email inboxes around the world every day. As defenders, we use various tools and methods to limit the delivery of these emails to the intended target.
In…
In…
/ Samba 4.18.0 Available for Download
https://lists.samba.org/archive/samba-announce/2023/000630.html
https://lists.samba.org/archive/samba-announce/2023/000630.html
/ CorePlague: Severe Vulnerabilities in Jenkins Server Lead to RCE
https://blog.aquasec.com/jenkins-server-vulnerabilities
https://blog.aquasec.com/jenkins-server-vulnerabilities
Aqua
CorePlague: Critical Vulnerabilities in Jenkins Server Lead to RCE
Aqua Research revealed a chain of vulnerabilities CVE-2023-27898, CVE-2023-27905 in Jenkins Server & Update Center which could lead to a complete compromise
/ Stealing the LIGHTSHOW (Part One)
Analysys of phishing campaign targeting a U.S.-based technology companies... The phishing payloads primarily utilized by UNC2970 are Microsoft Word documents embedded with macros to perform remote-template injection to pull down and execute a payload from a remote command and control (C2). Mandiant has observed UNC2970 tailoring the fake job denoscriptions to specific targets:
https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970
Analysys of phishing campaign targeting a U.S.-based technology companies... The phishing payloads primarily utilized by UNC2970 are Microsoft Word documents embedded with macros to perform remote-template injection to pull down and execute a payload from a remote command and control (C2). Mandiant has observed UNC2970 tailoring the fake job denoscriptions to specific targets:
https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970
Google Cloud Blog
Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970 | Mandiant | Google Cloud Blog
/ Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts:
https://www.veeam.com/kb4424
https://www.veeam.com/kb4424
Veeam Software
KB4424: CVE-2023-27532
Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker…
/ Home Assistant Supervisor security vulnerability
Authentication bypass Supervisor API:
https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/
Authentication bypass Supervisor API:
https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/
Home Assistant
Disclosure: Supervisor security vulnerability
Disclosure of a security vulnerability found impacting installations using the Home Assistant Supervisor.
/ GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
Unit 42
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers
New Golang-based malware we have dubbed GoBruteforcer targets web servers. Golang is becoming popular with malware programmers due to its versatility.
/ Microsoft 365 enumeration, spraying and exfiltration - TeamFiltration in the spotlight
TeamFiltration is self-defined as a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.
Article, we will look at its capabilities and how we can potentially detect related events in Azure AD and Microsoft 365 logs. While the article focuses on TeamFiltration, the learnings apply to any similar toolset:
— https://guillaumeben.xyz/Microsoft-365-enumeration/
TeamFiltration is self-defined as a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.
Article, we will look at its capabilities and how we can potentially detect related events in Azure AD and Microsoft 365 logs. While the article focuses on TeamFiltration, the learnings apply to any similar toolset:
— https://guillaumeben.xyz/Microsoft-365-enumeration/
/ YouTube under fire for allegedly gathering children's data
YouTube collects children’s data… Little steps for settings up YouTube Kids for more protect from harmful activitires from media platform:
— https://www.malwarebytes.com/blog/news/2023/03/youtube-under-fire-for-allegedly-gathering-uk-childrens-data
YouTube collects children’s data… Little steps for settings up YouTube Kids for more protect from harmful activitires from media platform:
— https://www.malwarebytes.com/blog/news/2023/03/youtube-under-fire-for-allegedly-gathering-uk-childrens-data
Malwarebytes
YouTube under fire for allegedly gathering children’s data
The complaint asserts that YouTube collected “the location, viewing habits and preferences” of up to five million children.
/ Kali Linux 2023.1 Release (Kali Purple & Python Changes)
https://www.kali.org/blog/kali-linux-2023-1-release/
https://www.kali.org/blog/kali-linux-2023-1-release/
Kali Linux
Kali Linux 2023.1 Release (Kali Purple & Python Changes) | Kali Linux Blog
Today we are releasing Kali 2023.1 (and on our 10th anniversary)! It will be ready for immediate download or updating by the time you have finished reading this post.
Given its our 10th anniversary, we are delighted to announce there are a few special things…
Given its our 10th anniversary, we are delighted to announce there are a few special things…
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
GOAD (Game Of Active Directory) - version 2
GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques:
-- https://github.com/Orange-Cyberdefense/GOAD
GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques:
-- https://github.com/Orange-Cyberdefense/GOAD
/ Windows SmartScreen Security Feature Bypass Vulnerability
Impact: Security Feature Bypass, CVE-2023-24880
— https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
/ Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
Impact: Remote Code Execution Max Severity: Critical
— https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415
P.S. thx for the link for RCE my dear friend ✌️
Impact: Security Feature Bypass, CVE-2023-24880
— https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
/ Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
Impact: Remote Code Execution Max Severity: Critical
— https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415
P.S. thx for the link for RCE my dear friend ✌️
/ Microsoft Mitigates Outlook Elevation of Privilege Vulnerability
Impacted Products:
All supported versions of Microsoft Outlook for Windows are affected. Other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected:
— https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/
Impacted Products:
All supported versions of Microsoft Outlook for Windows are affected. Other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected:
— https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/
Намечается новая кибер-конфа в Алматы - AppSecFest
Совпало, что я оказался знаком с организаторами данной конфы - это будет апрель 2023, это будет посвящено Application Security и DevSecOps тематикам в РК.
Организаторы обещают:
• Качественный нетворкинг
• 250+ участников
• 8-ми часовую длительность + афтепати
• Стенды от вендоров
• Проходить будет 21 апреля, ТЦ Forum Алматы
Заявки на доклады - appsecfest@astlab.kz, сайт - https://appsecfest.kz
Совпало, что я оказался знаком с организаторами данной конфы - это будет апрель 2023, это будет посвящено Application Security и DevSecOps тематикам в РК.
Организаторы обещают:
• Качественный нетворкинг
• 250+ участников
• 8-ми часовую длительность + афтепати
• Стенды от вендоров
• Проходить будет 21 апреля, ТЦ Forum Алматы
Заявки на доклады - appsecfest@astlab.kz, сайт - https://appsecfest.kz
/ Tick APT group compromise of a DLP software developer in East Asia
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
WeLiveSecurity
The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia
ESET Research uncovers a campaign by APT group Tick against a data-loss prevention company in East Asia and find a previously unreported tool used by Tick
/ Highlights from Git 2.40
Git project just released Git 2.40 with features and bug fixes from over 88 contributors, 30 of them new:
https://github.blog/2023-03-13-highlights-from-git-2-40/
Git project just released Git 2.40 with features and bug fixes from over 88 contributors, 30 of them new:
https://github.blog/2023-03-13-highlights-from-git-2-40/
The GitHub Blog
Highlights from Git 2.40
The first Git release of the year is here! Take a look at some of our highlights on what's new in Git 2.40.
/ Uncovering Windows Events
This post will focus on the process I followed to understand the events the Threat-Intelligence ETW provider logs and how to uncover the underlying mechanisms. One can use a similar process when trying to reverse other manifest-based ETW providers. This post isn’t a deep dive into how ETW works… Not all manifest-based Event Tracing for Windows (ETW) providers that are exposed through Windows are ingested into telemetry sensors/EDR’s:
https://posts.specterops.io/uncovering-windows-events-b4b9db7eac54
This post will focus on the process I followed to understand the events the Threat-Intelligence ETW provider logs and how to uncover the underlying mechanisms. One can use a similar process when trying to reverse other manifest-based ETW providers. This post isn’t a deep dive into how ETW works… Not all manifest-based Event Tracing for Windows (ETW) providers that are exposed through Windows are ingested into telemetry sensors/EDR’s:
https://posts.specterops.io/uncovering-windows-events-b4b9db7eac54
Medium
Uncovering Windows Events
Threat Intelligence ETW
/ OpenSSH 9.3 has just been released
With security and another fixes — https://lists.mindrot.org/pipermail/openssh-unix-dev/2023-March/040641.html
With security and another fixes — https://lists.mindrot.org/pipermail/openssh-unix-dev/2023-March/040641.html
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Active Directory Cheatsheet with code examples
- internal audit
- port forwarding
- bypass EP
- enumeration
- and etc…
— https://hideandsec.sh/books/cheatsheets-82c/page/active-directory
- internal audit
- port forwarding
- bypass EP
- enumeration
- and etc…
— https://hideandsec.sh/books/cheatsheets-82c/page/active-directory
hideandsec.sh
Active Directory | HideAndSec
This cheatsheet is built from numerous papers, GitHub repos and GitBook, blogs, HTB boxes and labs,...
/ CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/
https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/
CrowdStrike.com
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
The Dero cryptojacking operation locates Kubernetes clusters with anonymous access enabled on a Kubernetes API and listens on non-standard ports accessible from the internet.
/ Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems
https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html
https://googleprojectzero.blogspot.com/2023/03/multiple-internet-to-baseband-remote-rce.html
Blogspot
Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems
Posted by Tim Willis, Project Zero In late 2022 and early 2023, Project Zero reported eighteen 0-day vulnerabilities in Exynos Modems...