Linux kernel test robot noticed a 3888.9% improvement of will-it-scale.per_process_opshttps://lore.kernel.org/lkml/202411072132.a8d2cf0f-oliver.sang@intel.com/
Commit:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d4148aeab412432bf928f311eca8a2ba52bb05df
Управление памятью и сборщиком мусора в Go (Memory Management and Garbage Collection in Go)
https://www.youtube.com/live/UVqpl4PExkM?si=HbRHSYTQdQcOFswt
https://www.youtube.com/live/UVqpl4PExkM?si=HbRHSYTQdQcOFswt
YouTube
Управление памятью и сборщиком мусора в Go
22 мая Нина сделала новый доклад на Go-митапе в Москве: https://www.youtube.com/live/5BTrGM5ElAA
Слайды: https://github.com/progmsk/progmsk.github.io/files/14963281/go-garbage-collection.pdf
Репозиторий: https://github.com/PakshNina/gc
Канал Нины на ютубе:…
Слайды: https://github.com/progmsk/progmsk.github.io/files/14963281/go-garbage-collection.pdf
Репозиторий: https://github.com/PakshNina/gc
Канал Нины на ютубе:…
Glove Stealer: Leveraging IElevator to Bypass App-Bound Encryption & Steal Sensitive Data
https://www.gendigital.com/blog/insights/research/glove-stealer
https://www.gendigital.com/blog/insights/research/glove-stealer
Gendigital
Glove Stealer: Leveraging IElevator to Bypass App-Bound Encryption & Steal Sensitive Data
A .NET malware, bypasses Chrome's App-Bound Encryption, stealing data from browsers, crypto wallets, 2FA authenticators
Subject Linux 6.12
Linus commented: No strange surprises this last week, so we're sticking to the regular release schedule, and that obviously means that the merge window opens tomorrow. I already have two dozen+ pull requests in my mailbox, kudos to all the early birds..:
https://lkml.org/lkml/2024/11/17/326
Linus commented: No strange surprises this last week, so we're sticking to the regular release schedule, and that obviously means that the merge window opens tomorrow. I already have two dozen+ pull requests in my mailbox, kudos to all the early birds..:
https://lkml.org/lkml/2024/11/17/326
8 Free CyberSec & Networking Courses From Cisco
It may be useful to refresh your knowledge or learn something new:It may be useful to refresh your knowledge or learn something new:
1 Ethical Hacker
2 Junior Cybersecurity Analyst
3 Endpoint Security
4 Cyber Threat Management
5 Introduction to Cybersecurity
6 Network Defense
7 Network Addressing and Basic Troubleshooting
8 Networking Essentials
It may be useful to refresh your knowledge or learn something new:It may be useful to refresh your knowledge or learn something new:
1 Ethical Hacker
2 Junior Cybersecurity Analyst
3 Endpoint Security
4 Cyber Threat Management
5 Introduction to Cybersecurity
6 Network Defense
7 Network Addressing and Basic Troubleshooting
8 Networking Essentials
Netacad
Ethical Hacker
Become an ethical hacker and build your offensive security skills in this free online course - from Cisco Networking Academy. Sign up today!
ModeLeak: Privilege Escalation to LLM Model Exfiltration in Vertex AI
https://unit42.paloaltonetworks.com/privilege-escalation-llm-model-exfil-vertex-ai/
https://unit42.paloaltonetworks.com/privilege-escalation-llm-model-exfil-vertex-ai/
Unit 42
ModeLeak: Privilege Escalation to LLM Model Exfiltration in Vertex AI
New research reveals two vulnerabilities in Google's Vertex AI that may lead to privilege escalation or data theft through custom jobs or malicious models. New research reveals two vulnerabilities in Google's Vertex AI that may lead to privilege escalation…
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet
https://blog.lumen.com/one-sock-fits-all-the-use-and-abuse-of-the-nsocks-botnet/
https://blog.lumen.com/one-sock-fits-all-the-use-and-abuse-of-the-nsocks-botnet/
Lumen Blog
One sock fits all: The use and abuse of the NSOCKS botnet
Learn about the NSOCKS crimeware proxy network, housing over 35,000 bots and its connections to prominent cyber criminal organizations.
This media is not supported in your browser
VIEW IN TELEGRAM
Animated Cyber Security))
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
https://www.kaspersky.com/blog/jarkastealer-in-pypi-packages/52640/
https://www.kaspersky.com/blog/jarkastealer-in-pypi-packages/52640/
Kaspersky official blog
Packages with infostealer found in PyPI repository
Kaspersky GReAT experts have found malicious packages for AI integration containing JarkaStealer malware in the PyPI repository.
Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone
https://www.mobile-hacker.com/2024/10/04/portable-hacking-lab-control-the-smallest-kali-linux-with-a-smartphone/
https://www.mobile-hacker.com/2024/10/04/portable-hacking-lab-control-the-smallest-kali-linux-with-a-smartphone/
Mobile Hacker
Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone
This guide shows you how to set up a headless Pi-Tail, controlled entirely from your smartphone via SSH or VNC. This compact and cost-effective setup is perfect for on-the-go Wi-Fi pentesting, network scanning, and vulnerability assessments.
LogoFAIL Exploited to Deploy Bootkitty, the first UEFI bootkit for Linux
https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux
https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux
www.binarly.io
LogoFAIL Exploited to Deploy Bootkitty, the first UEFI bootkit for Linux
Binarly researchers find a direct connection between the newly discovered Bootkitty Linux bootkit and exploitation of the LogoFAIL image parsing vulnerabilities reported more than a year ago
Forwarded from Malware, Cats and Cryptography
Alhamdulillah, I finished writing MD MZ Book 2nd edition. More than two years have passed since then, and I wanted to supplement the book with new articles from my blog. As a result, this new edition of this book now contains almost 1000 pages.
The new version of this book is divided into five (4 + 1 bonus) chapters:
- Malware development tricks and techniques
- AV evasion tricks
- Persistence techniques
- Malware, Cryptography, Research
- Intro to linux malware development
All material in the book is based on posts from my blog.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to Anna Tsyganova and Duman Sembayev.
The proceeds from the sale of this book will be used to treat Munira and charity funds from Kazakhstan:
https://cocomelonc.github.io/book/2024/11/29/mybook-2.html
The new version of this book is divided into five (4 + 1 bonus) chapters:
- Malware development tricks and techniques
- AV evasion tricks
- Persistence techniques
- Malware, Cryptography, Research
- Intro to linux malware development
All material in the book is based on posts from my blog.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to Anna Tsyganova and Duman Sembayev.
The proceeds from the sale of this book will be used to treat Munira and charity funds from Kazakhstan:
https://cocomelonc.github.io/book/2024/11/29/mybook-2.html
cocomelonc
Malware development book. Second edition
﷽
Zabbix - SQL injection in user.get API (CVE-2024-42327)
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Critical
https://support.zabbix.com/browse/ZBX-25623
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Critical
https://support.zabbix.com/browse/ZBX-25623
zizmor would have caught the Ultralytics workflow vulnerability
https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection
blog.yossarian.net
zizmor would have caught the Ultralytics workflow vulnerability
Threat Advisory: Oh No Cleo! Cleo Software Actively Being Exploited in the Wild
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
Huntress
Cleo Software Actively Being Exploited in the Wild CVE-2024-55956 | Huntress
Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, known as CVE-2024-55956, commonly used to manage file transfers. Read more about this emerging threat on the Huntress Blog.
Popularization of eBPF technology and other trends in Trojan engineering.
https://news.drweb.ru/show/?i=14955&lng=ru
https://news.drweb.ru/show/?i=14955&lng=ru
Dr.Web
Популяризация технологии eBPF и другие тренды в трояностроении
Исследование очередного киберинцидента позволило вирусным аналитикам «Доктор Веб» выявить идущую хакерскую кампанию, в ходе которой проявились многие современные тенденции, применяемые злоумышленниками.
MITRE-ATTACK Navigator
https://github.com/CTI-Driven/Advanced-Threat-Hunting-Ransomware-Groups-Affiliates/tree/main/Known-Exploited-Vulnerabilities-By-Ransomware-Groups-KQL
https://github.com/CTI-Driven/Advanced-Threat-Hunting-Ransomware-Groups-Affiliates/tree/main/Known-Exploited-Vulnerabilities-By-Ransomware-Groups-KQL
GitHub
Advanced-Threat-Hunting-Ransomware-Groups-Affiliates/Known-Exploited-Vulnerabilities-By-Ransomware-Groups-KQL at main · CTI-Driven/Advanced…
Advanced Threat Hunting: Ransomware Group. Contribute to CTI-Driven/Advanced-Threat-Hunting-Ransomware-Groups-Affiliates development by creating an account on GitHub.