/ Take a note of SpyNote!
This spyware app spreads via smishing (i.e. malicious SMS messages) by urging the victims to install the app from provided links..:
https://blog.f-secure.com/take-a-note-of-spynote/
This spyware app spreads via smishing (i.e. malicious SMS messages) by urging the victims to install the app from provided links..:
https://blog.f-secure.com/take-a-note-of-spynote/
F-Secure
Take a note of SpyNote malware | F‑Secure
SpyNote malware is targeting Android users — learn how it works, the risks it poses, and how to keep your device secure.
/ Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks
https://www.cadosecurity.com/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks/
https://www.cadosecurity.com/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks/
Cadosecurity
Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks
Cado Security Labs researchers have discovered a new cryptojacking campaign targeting exposed Jupyter Notebooks.
/ Synology NAS DSM Account Takeover: When Random is not Secure
https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure
https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure
Claroty
Synology NAS DSM Account Takeover: When Random is not Secure
Claroty discovers the use of a weak random number generator in Synology’s DiskStation Manager (DSM) Linux-based operating system. Learn more.
Открытый практикум DevOps by Rebrain: Оптимизация запросов в MySQL 2
Время:
• 24 Октября (Вторник) 19:00 МСК. Регистрация
Программа:
• Методы оптимизации сложных запросов в СУБД MySQL
• Как подходить к анализу сложных запросов, как находить возможности оптимизации
• Оптимизация нескольких реальных запросов в интерактивном формате
Ведет:
• Николай Лавлинский – Технический директор. Веб-разработчик более 15 лет. Спикер конференций HighLoad++, РИТ++. Специализация: ускорение сайтов и веб-приложений
Время:
• 24 Октября (Вторник) 19:00 МСК. Регистрация
Программа:
• Методы оптимизации сложных запросов в СУБД MySQL
• Как подходить к анализу сложных запросов, как находить возможности оптимизации
• Оптимизация нескольких реальных запросов в интерактивном формате
Ведет:
• Николай Лавлинский – Технический директор. Веб-разработчик более 15 лет. Спикер конференций HighLoad++, РИТ++. Специализация: ускорение сайтов и веб-приложений
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
iso-27001-audit-check-list.pdf
1.9 MB
ISO 271001:2022 Audit Checklist
Forwarded from OpenBLD.net
OpenBLD.net - Update HTTPS certificates will progress tonight
🔹 ADA - Issue and Update certsificates
🔹 RIC - Issue and Update certsificates
This action will not affect your connectivity. This message is to let you know that this is a legitimate, planned procedure.
This action will not affect your connectivity. This message is to let you know that this is a legitimate, planned procedure.
Please open Telegram to view this post
VIEW IN TELEGRAM
/ Casio Issues Apology and Notice Concerning Personal Information Leak
Due to Unauthorized Access to Server
https://world.casio.com/information/1018-incident/
Due to Unauthorized Access to Server
https://world.casio.com/information/1018-incident/
CASIO Official Website
Casio Issues Apology and Notice Concerning Personal Information Leak Due to Unauthorized Access to Server | CASIO
/ Allow Access to Bing.. ChatGPT — Release Notes
https://help.openai.com/en/articles/6825453-chatgpt-release-notes
https://help.openai.com/en/articles/6825453-chatgpt-release-notes
OpenAI Help Center
ChatGPT — Release Notes | OpenAI Help Center
A changelog of the latest updates for ChatGPT
/ Google-hosted malvertising leads to fake Keepass site that looks genuine
https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/amp/
https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/amp/
Ars Technica
Google-hosted malvertising leads to fake Keepass site that looks genuine
Google-verified advertiser + legit-looking URL + valid TLS cert = convincing lookalike.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
План: Категоризации моделей угроз, Внедрения смягчающих мер и культуры ИБ для компании <Company name>
Создан на лету, за короткое время, в процессе одного интервью. Абстрактно, top-level план - Источники угроз, Уровни угроз, Уровень уязвимости систем, План внедрения, Основные этапы, Получаемые преимущества, Заключение.
Возможно кому-то может оказаться полезным. Пользуйтесь)
Google Doc - https://docs.google.com/document/d/1DQWxr6zde4ugHPaN7cCE7Hh70jxNbsAfT2ydH_nuMgY/edit?usp=sharing
Создан на лету, за короткое время, в процессе одного интервью. Абстрактно, top-level план - Источники угроз, Уровни угроз, Уровень уязвимости систем, План внедрения, Основные этапы, Получаемые преимущества, Заключение.
Возможно кому-то может оказаться полезным. Пользуйтесь)
Google Doc - https://docs.google.com/document/d/1DQWxr6zde4ugHPaN7cCE7Hh70jxNbsAfT2ydH_nuMgY/edit?usp=sharing
23rd October – Threat Intelligence Report from Checkpoint
- top attacks and breaches
- vulnerabilities and patches
- threat intelligence reports
- https://research.checkpoint.com/2023/23rd-october-threat-intelligence-report/
- top attacks and breaches
- vulnerabilities and patches
- threat intelligence reports
- https://research.checkpoint.com/2023/23rd-october-threat-intelligence-report/
Check Point Research
23rd October – Threat Intelligence Report - Check Point Research
For the latest discoveries in cyber research for the week of 23rd October, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Attackers have gained access to parts of the network of the cloud identity authentication giant Okta. The…
/ Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
www.assetnote.io
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.
Открытый практикум DevOps by Rebrain: Управление временем команд цикла разработки
Время:
↘ 31 Октября (Вторник) 19:00 МСК. Регистрация
Программа:
• Самоорганизация команды
• Time-tools и методы управления временем
• Управление сквозным бэклогом
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Постоянный спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
Время:
↘ 31 Октября (Вторник) 19:00 МСК. Регистрация
Программа:
• Самоорганизация команды
• Time-tools и методы управления временем
• Управление сквозным бэклогом
Ведёт:
Александр Крылов – Опыт работы в DevOps более 7 лет. Постоянный спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
Forwarded from OpenBLD.net
How can you reduce the threat of spying on your iPhone?
iPhone owners can be hacked through iMessage with Operation Triangulation infection chain and you can reduce thich chain attack together with OpenBLD.net.
In short. Operation Triangulation infection chain: a device receives a malicious iMessage attachment that launches a chain of exploits, and their execution ultimately results in the launch of the TriangleDB implant. In more detail, the infection chain can be summarized with the following article - https://securelist.com/triangulation-validators-modules/110847/
Now all chained domains added to OpenBLD.net ecosystem, and of course - be careful about what and from whom you receive in your iMessage 😎
iPhone owners can be hacked through iMessage with Operation Triangulation infection chain and you can reduce thich chain attack together with OpenBLD.net.
In short. Operation Triangulation infection chain: a device receives a malicious iMessage attachment that launches a chain of exploits, and their execution ultimately results in the launch of the TriangleDB implant. In more detail, the infection chain can be summarized with the following article - https://securelist.com/triangulation-validators-modules/110847/
Now all chained domains added to OpenBLD.net ecosystem, and of course - be careful about what and from whom you receive in your iMessage 😎
StripedFly: Perennially flying under the radar
It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows.:
https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows.:
https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
Securelist
StripedFly: Perennially flying under the radar
Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was…
/ Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
Welivesecurity
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research discover campaigns by the Winter Vivern APT group that exploit a zero-day XSS vulnerability in the Roundcube Webmail server and target governmental entities and a think tank in Europe.
/ Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
https://blog.talosintelligence.com/attributing-yorotrooper/
https://blog.talosintelligence.com/attributing-yorotrooper/
Cisco Talos Blog
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
🚀 Exciting October'23 Upgrades at OpenBLD.net!
We're thrilled to unveil the latest enhancements in our OpenBLD.net ecosystem. Here's what's new:
🔹 New Filtering Routine Server
Strengthening the core of OpenBLD.net with a brand new filtering routine server.
🔹 Enhanced Performance
Boosted RAM and CPU power on select servers for even smoother operation.
🔹 German Server Addition
Testing out a new server in Germany for ada.openbld.net frontend scoping.
🔹 Rule Tweaks
Updated blocking rules to better combat abused IPs and CIDRs.
🔹 Improved Resource Handling
Optimized performance for web resources like
🔹 New site: With GitHub collaboration opportunities: https://openbld.net
🚫 Reducing Threats: We've successfully blocked Kazakhstan-associated YoroTrooper attacks and the threat of spying on your iPhone. Plus, we've thwarted Keepass faked malware.
📢 Stay Connected:
- Join our official Telegram
- Follow us on LinkedIn
OpenBLD.net is your go-to service for a cleaner, distraction-free online experience.
Help us make the internet a better place for all! 💪
#OpenBLD #InternetSecurity #Upgrade2023
We're thrilled to unveil the latest enhancements in our OpenBLD.net ecosystem. Here's what's new:
Strengthening the core of OpenBLD.net with a brand new filtering routine server.
Boosted RAM and CPU power on select servers for even smoother operation.
Testing out a new server in Germany for ada.openbld.net frontend scoping.
Updated blocking rules to better combat abused IPs and CIDRs.
Optimized performance for web resources like
Krisha, IvI, and Yandex Maps.🚫 Reducing Threats: We've successfully blocked Kazakhstan-associated YoroTrooper attacks and the threat of spying on your iPhone. Plus, we've thwarted Keepass faked malware.
- Join our official Telegram
- Follow us on LinkedIn
OpenBLD.net is your go-to service for a cleaner, distraction-free online experience.
Help us make the internet a better place for all! 💪
#OpenBLD #InternetSecurity #Upgrade2023
Please open Telegram to view this post
VIEW IN TELEGRAM
openbld.net
OpenBLD.net - fast, free DNS that blocks ads, trackers, malware — with DoH, DoT, GeoDNS | OpenBLD.net DNS - Block advertising,…
OpenBLD.net — ultra-fast DNS with ad blocking and proactive cybersecurity. Be yourself, be focused.
/ SYSTEM MANAGEMENT MODE SPECULATIVE EXECUTION ATTACKS
https://eclypsium.com/blog/system-management-mode-speculative-execution-attacks/
https://eclypsium.com/blog/system-management-mode-speculative-execution-attacks/
Eclypsium | Supply Chain Security for the Modern Enterprise
System Management Mode Speculative Execution Attacks - Eclypsium
Eclypsium researchers have discovered a new application of speculative execution attacks, bypassing hardware-based memory protections.
/ Active Directory Advanced Threat Hunting - Identify vulnerabilities before others do
https://github.com/tomwechsler/Active_Directory_Advanced_Threat_Hunting
https://github.com/tomwechsler/Active_Directory_Advanced_Threat_Hunting
/ CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys
https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/
https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/
Unit 42
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys
We analyze an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances — which TAs used to perform cryptojacking.