Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
📢 Открытые практикумы by Rebrain: Расписание на неделю

🔹 2 мая Networks: Мастер-класс по собеседованиям для сетевых инженеров и не только
🔹 6 мая Golang: Prometheus метрики в Golang-приложении
🔹 7 мая DevOps: Повесть о том, как найм идёт в ИТ
🔹 8 мая Linux: С Windows на Linux

Детали: Здесь
Please open Telegram to view this post
VIEW IN TELEGRAM
/ Brokewell: do not go broke from new banking malware

..fake browser update page designed to install an Android application.. Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware..:

https://www.threatfabric.com/blogs/brokewell-do-not-go-broke-by-new-banking-malware
😡 OpenBLD.net со своими стикерами и мерчем на AppSecFest.kz

Организаторы AppSecFest.kz, предоставили OpenBLD.net, как открытому проекту на безвозмездной основе стенд 🔥

3 Мая, в Алматы, на стенде, у нас будет монитор, команда из трех человек, и мы научим, расскажем, покажем, как:

🔹 Меньше потреблять трафика
🔹 Уменьшить использование ресурсов памяти и процессора
🔹 Уменьшить тепловыделение
🔹 Убрать рекламу в играх
🔹 Батарея живет дольше, телефон греется меньше
🔹 Снизить вероятность возникновения информационных рисков
🔹 Ускорить загрузку веб-страниц
🔹 Уменьшить интернет шум
🔹 Как можно помочь проекту жить и развиваться

И самое главное оставаться собой и быть в фокусе!

Приходите, подходите. Будут олдскул-стайл стикерпаки, пару футболок, пушечный заряд и тонна мотивации.

Информация о конференции доступна Здесь
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Common-System-Hacking.pdf
9.9 MB
System Hacking: Common Windows, Linux & Web Server Hacking Techniques
/ Detecting browser data theft using Windows Event Logs

This aerticle describes one set of signals for use by system administrators or endpoint detection agents that should reliably flag any access to the browser’s protected data from another application on the system..:

https://security.googleblog.com/2024/04/detecting-browser-data-theft-using.html
📢 Открытый практикум Linux by Rebrain: С Windows на Linux

Время:

• 8 Мая (Среда) 20:00 МСК

Программа:

• Основные сложности
• Стоит ли переходить?
• Что нужно знать в самом начале?
• Пробуем работать в Linux

Детали Здесь

Ведет:

Андрей Буранов – Системный администратор в департаменте VK Play. 10+ лет опыта работы с ОС Linux.
/ Hackers breached its Sign production environment and accessed customer email addresses and hashed Dropbox passwords

The actors compromised a service account that was part of Sign’s back-end, which is a type of non-human account used to execute applications and run automated services. As such, this account had privileges to take a variety of actions within Sign’s production environment. The threat actor then used this access to the production environment to access our customer database..:

https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign
/ Analysis of ArcaneDoor

The zero day vulnerabilities identified are tracked as CVE-2024-20353, CVE-2024-20359, and CVE-2024-20358 – of these, only CVE-2024-20353 and CVE-2024-20359 were exploited in the ArcaneDoor campaign.

The campaign, dubbed “ArcaneDoor,” targeted government-owned perimeter network devices from various vendors as part of a global effort..:

https://censys.com/analysis-of-arcanedoor-threat-infrastructure-suggests-potential-ties-to-chinese-based-actor/
/ GitLab Vulnerability Allows Intercept Accounts Management

https://nvd.nist.gov/vuln/detail/CVE-2023-7028
/ Graph: Growing number of threats leveraging Microsoft API

An increasing number of threats have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud.

BirdyClient or OneDriveBirdyClient malware revealed that its main functionality is to connect to the Microsoft Graph API and use Microsoft OneDrive as a C&C server mechanism to upload and download files from it

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Unmasking Tycoon 2FA: A Stealthy Phishing Kit Used to Bypass Microsoft 365 and Google MFA

Tycoon 2FA is a phishing-as-a-service (PhaaS) platform that was first seen in August 2023. Like many phish kits, it bypasses multifactor authentication (MFA) protections and poses a significant threat to users. Lately, Tycoon 2FA has been grabbing headlines because of its role in ongoing campaigns designed to target Microsoft 365 and Gmail accounts.

This blog post is a rundown of how these attacks work, how they’re evolving, what they look like in the real world..:

https://www.proofpoint.com/us/blog/email-and-cloud-threats/tycoon-2fa-phishing-kit-mfa-bypass
/ CISA - StopRansomware: Black Basta

- technical details
- mitre tactics
- IoC
- mitigations

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-131a
/ Apple Fixed Security Issues in iOS, iPadOS, macOS

- An app may be able to access user-sensitive data in iOS/iPadOS
- A malicious application may be able to access Find My data in macOS
/ Windows DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-30051. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges..:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051