Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
📢 Integration of OpenBLD.net with URLhaus by abuse.ch

URLhaus is a project operated by abuse.ch. Its purpose is to collect, track, and share malware URLs, aiding network administrators and security analysts in safeguarding their networks and customers from cyber threats.

Now, you can check the malicious domain ownership with OpenBLD.net alongside Quad9, AdGuard, Cloudflare, ProtonDNS on abuse.ch.

In addition, you can incorporate abuse.ch lists into your security solutions, just as OpenBLD.net does.

You can check this as example on:
🔹 https://urlhaus.abuse.ch/host/dukeenergyltd.top

Here's to security for us all. Cheers!)
Please open Telegram to view this post
VIEW IN TELEGRAM
/ FortiOS & FortiProxy - Out-of-bounds Write in captive portal

..may allow an inside attacker who has access to captive portal to execute arbitrary code or commands via specially crafted HTTP requests:

https://www.fortiguard.com/psirt/FG-IR-23-328
📢 Открытый практикум: Выбираем форк MySQL от Oracle до MariaDB

Время:

• 19 Марта (Вторник) 19:00 МСК

Программа:

• Обзор открытых форков в экосистеме MySQL
• Oracle MySQL
• Percona Server for MySQL
• MariaDB
• Совместимость, возможности перехода
• Сравнение функциональности

Детали

Ведёт:

Николай Лавлинский – Веб-разработчик более 15 лет. Спикер конференций HighLoad++, РИТ++. Специализация: ускорение сайтов и веб-приложений.
/ Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild

*with bypass antivirus

https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/
/ UDP-based, application-layer protocol implementations are vulnerable to network loops

..An unauthenticated attacker can use maliciously-crafted packets against a UDP-based vulnerable implementation of application protocols (e.g., DNS, NTP, TFTP) that can lead to Denial-of-Service (DOS) and/or abuse of resources..:

https://kb.cert.org/vuls/id/417980
/ SQLi (SQL Injection) org.postgresql:postgresql Dependency in Bamboo Data Center and Server

This Critical severity org.postgresql:postgresql Dependency vulnerability was introduced in versions 8.2.1, 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, and 9.5.0 of Bamboo Data Center and Server.

https://jira.atlassian.com/browse/BAM-25716
📢 Открытый практикум DevOps by Rebrain: Как выживать инженеру в потоке тонны звонков

Время:

• 26 Марта (Вторник) 19:00 МСК

Программа:

• Подходы к оптимизации времени
• Фреймворк потока
• Капсульный подход управления календарём
• Тулсет

Регистрация

Ведёт:

Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
/ GoFetch is a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs).

https://gofetch.fail/
/ ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms

https://comsec.ethz.ch/research/dram/zenhammer/
/ The latest emerging C2 was primarily focused on Asus devices, and grew to over 6,000 bots in a period of 72 hours.

ASUS routers under attack:

https://blog.lumen.com/the-darkside-of-themoon/
/ Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes

Residential proxies are frequently used by threat actors to conceal malicious activity, including advertising fraud and the use of bots. Access to residential proxy networks is often purchased from other threat actors who create them through enrolling unwitting users’ devices as nodes in the network through malware embedded in mobile, CTV or desktop applications...

How VPN app can convert your device to malicious proxy node:

https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-and-lumiapps-transform-mobile-devices-into-proxy-nodes
📢 Открытый практикум: Кросс-командные взаимодействия - учимся жить дружно

Время:

• 2 Апреля (Вторник) 19:00 МСК

Программа:

• Предпосылки для построения или изменения процесса взаимодействия
• Построение процесса взаимодействия команд DEV, QA с DevOps командой, когда вы единая служба
• Построение процесса работы DevOps с OPS/support

Детали

Ведёт:

Александр Крылов – Опыт работы в DevOps более 7 лет. Спикер конференций: DevOps conf, TeamLead conf, Highload conf. Автор курса по Haproxy на Rebrain.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation

Microsoft Edge browser, designated CVE-2024–21388. This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user’s knowledge.

https://labs.guard.io/cve-2024-21388-microsoft-edges-marketing-api-exploited-for-covert-extension-installation-879fe5ad35ca