Assessing the security and privacy of Vaccine Passports
https://research.nccgroup.com/2021/10/04/assessing-the-security-and-privacy-of-vaccine-passports/
https://research.nccgroup.com/2021/10/04/assessing-the-security-and-privacy-of-vaccine-passports/
NCC Group Research
Assessing the security and privacy of Vaccine Passports
This post attempts to explore the security and privacy concerns related with vaccine credential systems, by way of threat modelling and exploring the various risks and attacks conceivable against such systems.... Furthermore, we'll look at these concerns…
CVE-2021-26420: Remote Code Execution in SharePoint via Workflow Compilation https://www.zerodayinitiative.com/blog/2021/10/5/cve-2021-26420-remote-code-execution-in-sharepoint-via-workflow-compilation
Zero Day Initiative
Zero Day Initiative — CVE-2021-26420: Remote Code Execution in SharePoint via Workflow Compilation
In June of 2021, Microsoft released a patch to correct CVE-20 21-264 20 – a remote code execution bug in the supported versions of Microsoft SharePoint Server. This bug was reported to the ZDI program by an anonymous researcher and is also known as ZDI…
Interesting cheatsheet » Vulnerability Remediation Kanban https://theartofservice.com/vulnerability-remediation-kanban
Theartofservice
Vulnerability Remediation Kanban- The Art of Service, Standard Requirements Self Assessments
Ready to use prioritized Vulnerability Remediation requirements, to: Make sure the Information Security team is responsible for incident response,
Ransomware in the CIS https://securelist.com/cis-ransomware/104452/
Securelist
Roundup of ransomware in the CIS
Statistics on ransomware attacks in the CIS and technical descriptions of Trojans, including BigBobRoss/TheDMR, Crysis/Dharma, Phobos/Eking, Cryakl/CryLock, CryptConsole, Fonix/XINOF, Limbozar/VoidCrypt, Thanos/Hakbit and XMRLocker.
Actors Target Huawei Cloud Using Upgraded Linux Malware https://www.trendmicro.com/en_us/research/21/j/actors-target-huawei-cloud-using-upgraded-linux-malware-.html
Trend Micro
Actors Target Huawei Cloud Using Upgraded Linux Malware
UEFI threats moving to the ESP: Introducing ESPecter bootkit https://www.welivesecurity.com/2021/10/05/uefi-threats-moving-esp-introducing-especter-bootkit/
WeLiveSecurity
UEFI threats moving to the ESP: Introducing ESPecter bootkit
ESET researchers discover and analyze ESPecter, a previously undocumented UEFI bootkit with roots that go back all the way to at least 2012.
Check Point Research Prevents Theft of Crypto Wallets on OpenSea, the World’s Largest NFT Marketplace https://research.checkpoint.com/2021/check-point-research-prevents-theft-of-crypto-wallets-on-opensea-the-worlds-largest-nft-marketplace/
Check Point Research
Check Point Research Prevents Theft of Crypto Wallets on OpenSea, the World’s Largest NFT Marketplace - Check Point Research
Research by : Dikla Barda, Roman Zaikin & Oded Vanunu During the past few weeks, Check Point researchers spotted various cases where people tweeted reports claiming they lost their crypto wallet balance, while receiving a free gift on the OpenSea market…
The discovery of Gatekeeper bypass CVE-2021-1810 https://labs.f-secure.com/blog/the-discovery-of-cve-2021-1810/
0-Day Hunting (Chaining Bugs/Methodology) https://blog.riotsecurityteam.com/0day-chains
GOT and PLT for pwning https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
System Overlord
GOT and PLT for pwning.
So, during the recent 0CTF, one of my teammates was asking me about RELRO and the GOT and the PLT and all of the ELF sections involved. I realized that though I knew the general concepts, I didn’t know as much as I should, so I did some research to...
Double-check Inputs to Avoid SSRF Vulnerability https://blog.securelayer7.net/double-check-inputs-to-avoid-ssrf-vulnerability/
Chrome in-the-wild bug analysis: CVE-2021-37975 https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_37975/
How a simple Linux kernel memory corruption bug can lead to complete system compromise https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html
Blogspot
How a simple Linux kernel memory corruption bug can lead to complete system compromise
An analysis of current and potential kernel security mitigations Posted by Jann Horn, Project Zero Introduction This blog post de...
Applying Fuzzing Techniques Against PDFTron (part 1 & part 2) https://blog.haboob.sa/blog/applying-fuzzing-techniques-against-pdftron-part-1 https://blog.haboob.sa/blog/applying-fuzzing-techniques-against-pdftron-part-2
Haboob
Applying Fuzzing Techniques Against PDFTron: Part 1 — Haboob
Introduction: PDFTron SDK brings a wide variety of PDF parsing functionalities. It varies from reading and viewing PDF files to converting PDF files to different file formats. The provided SDK is widely used and supports multiple platforms, it also exposes…
Building a POC for CVE-2021-40438 https://firzen.de/building-a-poc-for-cve-2021-40438
New primitive improvement on heap attacks » House of IO - Heap Reuse https://maxwelldulin.com/BlogPost?post=6295828480
Into the art of Binary Exploitation 0x000003 [Prominence of Integer-Overflow] https://infosecwriteups.com/into-the-art-of-binary-exploitation-0x000003-prominence-of-integer-overflow-cea6abd2cce4
Medium
Into the art of Binary Exploitation 0x000003 [Prominence of Integer-Overflow]
Hey hackers ✋✋, I’m back again with another portion of our enterprise, the binary exploitation series. In case you’re perusing my article…
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack https://volatility-labs.blogspot.com/2021/10/memory-forensics-r-illustrated.html
Blogspot
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
In this blog post, we are going to walk you through the research and development process that leads to new and powerful memory analysis capa...
Google Chrome Vulnerability Worth for $6K: Use After Free (CVE-2021-30573) https://securityforeveryone.com/blog/google-chrome-zero-day-vulnerability-cve-2021-30573
Securityforeveryone
Google Chrome Vulnerability Worth for $6K: Use After Free (CVE-2021-30573)
As the S4E team, we found the use after free vulnerability that we detected in the latest version of Google Chrome. Although we focus on customer feedback on our products in the early stage of our startup, we conduct various vulnerability studies and challenging…
A step-by-step analysis of a new version of Darkside Ransomware (v. 2.1.2.3) https://cybergeeks.tech/a-step-by-step-analysis-of-a-new-version-of-darkside-ransomware/
Decompiled code matching via AST features https://fernandodoming.github.io/posts/ast-feature-comparison/