Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.54K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
AppSecFest - Уже в эту пятницу (21 апреля)
 
• Мобильное приложение как средство компрометации персональных данных или зачем нам Mobile Application Security?
• Концепции Incident Management в процессах DevSecOps
• Анализ кода фишингового ресурса
• Безопасность в Kubernetes: как устранить векторы атак на Kubernetes

Будут доклады про создание апсек-направления с нуля, пайплайн проверки, DAST, IAST и OAST...

Планируется онлайн трансляция, ссылка уже есть на сайте. Все детали здесь:
appsecfest.kz
 
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Get started using Attack simulation training

If your organization has Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack simulation training in the Microsoft 365:

More details…
/ ‘AuKill’ EDR killer malware abuses Process Explorer driver

Over the past several months, Sophos X-Ops has investigated multiple incidents where attackers attempted to disable EDR clients with a new defense evasion tool we’ve dubbed AuKill. The AuKill tool abuses an outdated version of the driver used by version 16.32 of the Microsoft utility, Process Explorer, to disable EDR processes before deploying either a backdoor or ransomware on the target system:

https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver/
Открытый практикум DevOps by Rebrain: Шифрование секретов в GitOps
 
• 25 Апреля (Вторник), 19:00 по МСК. Детали

Программа:
• Где хранить секреты - git, vault или облачный сервис?
• Разбираемся с dek, kek и kms
• Изучаем схему работы sops, sealed secrets
• Если успеем, то затронем варианты реализации kubernetes authentication в vault и external secrets

Ведет:
• Василий Озеров - Руководит международной командой в рамках своего агентства Fevlake. Co-Founder REBRAIN. Более 8 лет Devops практик.
/ Multiple vulnerabilities in VMware Aria Operations

Critical. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root. Advisory:

https://www.vmware.com/security/advisories/VMSA-2023-0007.html
/ Private vulnerability reporting now generally availablein GitHub

private vulnerability reporting, a private collaboration channel that makes it easier for researchers and maintainers to report and fix vulnerabilities on public repositories:

https://github.blog/2023-04-19-private-vulnerability-reporting-now-generally-available/
/ RBAC Buster - First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

This blog post is a part of a comprehensive study we conducted on misconfigured K8s clusters in the wild. Research findings are significant as they shed light on the risks of misconfigurations and how even large organizations can overlook the importance of securing their clusters, leaving them vulnerable to potential disasters with just one mistake:

https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters
/ EvilExtractor – All-in-One Stealer

EvilExtractor (sometimes spelled Evil Extractor) is an attack tool designed to target Windows operating systems and extract data and files from endpoint devices. It includes several modules that all work via an FTP service. It was developed by a company named Kodex, which claims it is an educational tool. However, research conducted by FortiGuard Labs shows cybercriminals are actively using it as an info stealer:

https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
new_side_attack_intel_cpu_sys-admin_,up.pdf
380.2 KB
New side attack to Intel CPU report

Abstract—The transient execution attack is a type of attack
leveraging the vulnerability of modern CPU optimization tech-
nologies. New attacks surface rapidly. The side-channel is a key
part of transient execution attacks to leak data
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Linux Catalogs - Visual Denoscriptions