red_hat_enterprise_linux_9_configuring_firewalls_and_packet_filters.pdf
629.7 KB
Configuring firewalls and packet filters
Managing the firewalld service, the nftables framework, and XDP packet filtering features (doc from RHEL 9)
Managing the firewalld service, the nftables framework, and XDP packet filtering features (doc from RHEL 9)
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
Qualys
OpenSSH CVE-2024-6387 RCE Vulnerability: Risk & Mitigation | Qualys
CVE-2024-6387 exploit in OpenSSH poses remote unauthenticated code execution risks. Find out which versions are vulnerable and how to protect your systems.
Velvet Ant Exploits Cisco Zero-Day
https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/
https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/
Sygnia
China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices – Advisory for…
Learn about the forensic investigation by Sygnia, the cyber espionage operation by Velvet Ant, and best practices for safeguarding your network against sophisticated threats.
CVE-2024-29510 – Exploiting Ghostnoscript using format strings
https://codeanlabs.com/blog/research/cve-2024-29510-ghostnoscript-format-string-exploitation/
https://codeanlabs.com/blog/research/cve-2024-29510-ghostnoscript-format-string-exploitation/
Codean Labs
CVE-2024-29510 - Exploiting Ghostnoscript using format strings — Codean Labs
A format string vulnerability in Ghostnoscript ≤ 10.03.0 which enables attackers to gain Remote Code Execution (#RCE) while also bypassing sandbox protections. CVE-2024-29510 has significant impact on web-applications and other services offering document conversion…
Отфильтрованный архив (новость: RockYou2024: 10 billion passwords leaked in the largest compilation of all time) от https://securixy.kz
- https://news.1rj.ru/str/securixy_kz/908
- https://news.1rj.ru/str/securixy_kz/908
Telegram
Sys-Admin InfoSec
/ RockYou2024: 10 billion passwords leaked in the largest compilation of all time
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
Exim MTA Could Allow Malicious Email Attachments Past Filters [CVE-2024-39929]
https://censys.com/cve-2024-39929/
https://censys.com/cve-2024-39929/
Censys
July 10, 2024 Advisory: Vulnerability in Exim MTA Could Allow Malicious Email Attachments Past Filters [CVE-2024-39929]
Video for - https://news.1rj.ru/str/sysadm_in_channel/5198
https://youtu.be/8mdW3MWoeFI?si=yqhrlwD3gcc12zwz
https://youtu.be/8mdW3MWoeFI?si=yqhrlwD3gcc12zwz
Telegram
Sys-Admin InfoSec
/ EvilVideo: Telegram app for Android targeted by zero-day exploit sending malicious videos
https://www.eset.com/uk/about/newsroom/press-releases/set-research-discovers-evilvideo-telegram-app-for-android-targeted-by-zero-day-exploit-sending-malicious-videos/
https://www.eset.com/uk/about/newsroom/press-releases/set-research-discovers-evilvideo-telegram-app-for-android-targeted-by-zero-day-exploit-sending-malicious-videos/
OWASP_Vulnerability_Management_Guide.pdf
1.4 MB
OWASP Vulnerability Management Guide (OVMG)
Forwarded from Yevgeniy Goncharov
🦄 Йоу! Хорош спать. Поднимай взор на темы докладов Open SysConf'24
Во первых. Теперь каждый может внести лепту в создание сайта, исправлении ошибок на нем и так далее.
Во вторых. Мы имеем место и дату - 12 Октяря, 2024 года.
В третьихх. Мы имеем четрые крутых заявленых доклада:
1. Три системы, которые ты захочешь развернуть и настроить
2. Внедрение вредоносного кода в андроид приложения.
3. Open(Secure)Source
4. Синтез молекулярных единиц в микросервисах
Иди на сайт и регистрируйся, пока есть места.
Дев. сайт: https://sysconf-io.pages.dev/2024
Во первых. Теперь каждый может внести лепту в создание сайта, исправлении ошибок на нем и так далее.
Во вторых. Мы имеем место и дату - 12 Октяря, 2024 года.
В третьихх. Мы имеем четрые крутых заявленых доклада:
1. Три системы, которые ты захочешь развернуть и настроить
2. Внедрение вредоносного кода в андроид приложения.
3. Open(Secure)Source
4. Синтез молекулярных единиц в микросервисах
Иди на сайт и регистрируйся, пока есть места.
Дев. сайт: https://sysconf-io.pages.dev/2024
IOT Cybersecurity Framework.pdf
3.8 MB
IOT Cyber Security Framework
PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem
https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem
https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem
www.binarly.io
PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem
PKfail is a zero day disclosure detected by the Binarly REsearch Team and responsibly disclosed.
RADIUS/UDP vulnerable to improved MD5 collision attack
https://blog.cloudflare.com/radius-udp-vulnerable-md5-attack
https://blog.cloudflare.com/radius-udp-vulnerable-md5-attack
The Cloudflare Blog
RADIUS/UDP vulnerable to improved MD5 collision attack
The RADIUS protocol is commonly used to control administrative access to networking gear. Despite its importance, RADIUS hasn’t changed much in decades. We discuss an attack on RADIUS as a case study for why it’s important for legacy protocols to keep up…
How did Facebook intercept their competitor's encrypted mobile app traffic?
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights...:
https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/
P.S. Thx for the link, dear subscriber ✌️
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights...:
https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/
P.S. Thx for the link, dear subscriber ✌️
haxrob
How did Facebook intercept their competitor's encrypted mobile app traffic?
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights.
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps
One-time passwords (OTPs) are designed to add an extra layer of security to online accounts, and most enterprises have become very dependent upon them for controlling access to sensitive data and applications...
However, these passwords are just as valuable to attackers.
Mobile malware has become increasingly sophisticated, employing cunning tactics to steal these crucial codes and bypass their added protection to enable malicious infiltration to corporate networks and data...:
https://www.zimperium.com/blog/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps/
One-time passwords (OTPs) are designed to add an extra layer of security to online accounts, and most enterprises have become very dependent upon them for controlling access to sensitive data and applications...
However, these passwords are just as valuable to attackers.
Mobile malware has become increasingly sophisticated, employing cunning tactics to steal these crucial codes and bypass their added protection to enable malicious infiltration to corporate networks and data...:
https://www.zimperium.com/blog/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps/
Zimperium
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps - Zimperium
true
BingoMod: The new android RAT that steals money and wipes data
https://www.cleafy.com/cleafy-labs/bingomod-the-new-android-rat-that-steals-money-and-wipes-data
https://www.cleafy.com/cleafy-labs/bingomod-the-new-android-rat-that-steals-money-and-wipes-data
Cleafy
BingoMod: The new android RAT that steals money and wipes data | Cleafy Labs
Discover the new android RAT BingoMod, identified by the Cleafy TIR team in May 2024. BingoMod targets money transfers via Account Takeover and On-Device Fraud, bypassing bank security measures. It exploits permissions to steal credentials, conduct overlay…
Powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers
https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/
https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/
Infoblox Blog
Who Knew? Domain Hijacking is So Easy | Infoblox
Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions, and other organizations, large and small. Find out how to determine whether your domain name is at risk.
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
https://www.elastic.co/security-labs/bits-and-bytes-analyzing-bitsloth
https://www.elastic.co/security-labs/bits-and-bytes-analyzing-bitsloth
www.elastic.co
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor — Elastic Security Labs
Elastic Security Labs identified a novel Windows backdoor leveraging the Background Intelligent Transfer Service (BITS) for C2. This malware was found during a recent activity group tracked as REF8747.