Disclosing a New Vulnerability in JWT Secret Poisoning (CVE-2022-23529)
— https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
— https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
Unit 42
Security Issue in JWT Secret Poisoning (Updated)
We discovered a new high-severity vulnerability (CVE-2022-23529) in the popular JsonWebToken open source project.
Как выполнить единожды Linux logon скрипт
https://sys-adm.in/systadm/999-kak-vypolnit-edinozhdy-linux-logon-skript.html
https://sys-adm.in/systadm/999-kak-vypolnit-edinozhdy-linux-logon-skript.html
sys-adm.in
Как выполнить единожды Linux logon скрипт - Для сисадминов и не только
Sys-Adm.in - Сайт для сисадминов и не только. Здесь собраны различные материалы основанные на личной практике. Блог Евгения Гончарова.
Threema-PST22.pdf
413.9 KB
Three Lessons From Threema: Analysis of a Secure Messenger
On the Security Vulnerabilities of Text-to-SQL Models
attack with AI
https://arxiv.org/pdf/2211.15363.pdf
attack with AI
https://arxiv.org/pdf/2211.15363.pdf
1300+ domains are hosting a webpage that impersonates the official AnyDesk website (added to Open BLD)
— https://www.bleepingcomputer.com/news/security/over-1-300-fake-anydesk-sites-push-vidar-info-stealing-malware/
— https://www.bleepingcomputer.com/news/security/over-1-300-fake-anydesk-sites-push-vidar-info-stealing-malware/
lab.sys-adm.in
Sys-Admin Laboratory
Open Sys-Admin BLD DNS - Focus on information for free with adblocking and implicit cybersecurity threat prevention.
Bitdefender-PR-Whitepaper-EyeSpyVPN-creat625-en-EN.pdf
8.6 MB
EyeSpy - Spyware Delivered in VPN Installers
https://www.bitdefender.com/blog/labs/eyespy-iranian-spyware-delivered-in-vpn-installers/
https://www.bitdefender.com/blog/labs/eyespy-iranian-spyware-delivered-in-vpn-installers/
Detect-ad-ml-algorithm.pdf
398.8 KB
Detecting Adversarial Advertisements in the Wild
MSI's (in)Secure Boot
I decided to setup Secure Boot on my new desktop with a help of sbctl. Unfortunately I have found that my firmware was… accepting every OS image I gave it, no matter if it was trusted or not...
bypass seBoot on msi:
https://dawidpotocki.com/en/2023/01/13/msi-insecure-boot/
I decided to setup Secure Boot on my new desktop with a help of sbctl. Unfortunately I have found that my firmware was… accepting every OS image I gave it, no matter if it was trusted or not...
bypass seBoot on msi:
https://dawidpotocki.com/en/2023/01/13/msi-insecure-boot/
Abusing a GitHub Codespaces Feature For Malware Delivery
https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html
https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html
Trend Micro
Abusing a GitHub Codespaces Feature For Malware Delivery
Proof of Concept (POC): We investigate one of the GitHub Codespaces’ real-time code development and collaboration features that attackers can abuse for cloud-based trusted malware delivery. Once exploited, malicious actors can abuse legitimate GitHub accounts…
How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure Services
https://orca.security/resources/blog/ssrf-vulnerabilities-in-four-azure-services/
https://orca.security/resources/blog/ssrf-vulnerabilities-in-four-azure-services/
Orca Security
How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure Services
In this blog, we will describe how we found 4 different SSRF vulnerabilities and were able to take advantage of these flaws in some of the Azure Services.
How to develop game on free gobot engine from scratch tutorial
https://m.youtube.com/watch?v=iDEcP8Mc-7s&list=PLS9MbmO_ssyDk79j9ewONxV88fD5e_o5d
#game #develop
https://m.youtube.com/watch?v=iDEcP8Mc-7s&list=PLS9MbmO_ssyDk79j9ewONxV88fD5e_o5d
#game #develop
YouTube
Godot 3 Tutorial Series -- Introduction
Godot 3 is finally here and of course it's time for GameFromScratch to update our tutorial series to the latest and greatest version of Godot. We are going to be covering all aspects of Godot development. 2D, 3D, Physics, Importing, Exporting, C#, VisualScript…
Sudoedit allowing a local attacker to append arbitrary entries to the list of files to process
https://ubuntu.com/security/CVE-2023-22809
P.S. thx for the link @clevergod : ✌️
https://ubuntu.com/security/CVE-2023-22809
P.S. thx for the link @clevergod : ✌️
Ubuntu
CVE-2023-22809 | Ubuntu
Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example.
— https://cocomelonc.github.io/persistence/2023/01/19/malware-pers-21.html
— https://cocomelonc.github.io/persistence/2023/01/19/malware-pers-21.html
cocomelonc
Malware development: persistence - part 21. Recycle Bin, My Documents COM extension handler. Simple C++ example.
﷽
Octosuite: A New Tool to Conduct Open Source Investigations on GitHub
https://www.bellingcat.com/resources/2023/01/20/octosuite-a-new-tool-to-conduct-open-source-investigations-on-github/
https://www.bellingcat.com/resources/2023/01/20/octosuite-a-new-tool-to-conduct-open-source-investigations-on-github/
bellingcat
Octosuite: A New Tool to Conduct Open Source Investigations on GitHub - bellingcat
Octosuite is an open source tool that can help researchers quickly gather data on users, organisations and repositories on GitHub
После запуска Open BLD сервиса я стал замечать некоторые "странности" переходящие в закономерности со стороны различных инстанций. Сегодня прилетела блокировка Sys-Admin Форума от РКН.
Осведомленность об ИТ и InfoSec, безопасность и помощь советами в решении технических проблем - это наше кредо на протяжении более 10 лет.
Разные инстанции производили разные "санкционные" действия направленные на мою учетную запись - ну и ладно, жил и проживу без всяких там "инстаграмов".
В итоге я решил сделать небольшую заметку о своих наблюдениях под названием "Бан или совпадение?”:
— https://lab.sys-adm.in/ru/blog/implicit-ban-bld-author
Up. En:
— https://lab.sys-adm.in/blog/implicit-ban-bld-author
Осведомленность об ИТ и InfoSec, безопасность и помощь советами в решении технических проблем - это наше кредо на протяжении более 10 лет.
Разные инстанции производили разные "санкционные" действия направленные на мою учетную запись - ну и ладно, жил и проживу без всяких там "инстаграмов".
В итоге я решил сделать небольшую заметку о своих наблюдениях под названием "Бан или совпадение?”:
— https://lab.sys-adm.in/ru/blog/implicit-ban-bld-author
Up. En:
— https://lab.sys-adm.in/blog/implicit-ban-bld-author
Ansible and ChatGPT: Putting it to the test
https://www.ansible.com/blog/ansible-wisdom-and-chatgpt-putting-it-to-the-test
https://www.ansible.com/blog/ansible-wisdom-and-chatgpt-putting-it-to-the-test
Ansible
Ansible and ChatGPT: Putting it to the test
In this blog, we wanted to put ChatGPT to the test and see how it fares with developing Ansible Playbooks and share our results.
CVE-2022-34689 - CryptoAPI spoofing vulnerability
PoC
https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689
PoC
https://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689
GitHub
akamai-security-research/PoCs/CVE-2022-34689 at main · akamai/akamai-security-research
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams. - akamai/akamai-security-research
DCOM Hardening Toolkit
Powershell noscript for Windows to retrieve the authentication hardening status of DCOM applications
https://github.com/otoriocyber/DCOM-HardeningTool
Powershell noscript for Windows to retrieve the authentication hardening status of DCOM applications
https://github.com/otoriocyber/DCOM-HardeningTool
GitHub
GitHub - otoriocyber/DCOM-HardeningTool: Powershell noscript for Windows to retrieve the authentication hardening status of DCOM…
Powershell noscript for Windows to retrieve the authentication hardening status of DCOM applications - GitHub - otoriocyber/DCOM-HardeningTool: Powershell noscript for Windows to retrieve the authentic...