Network Capture with Process Name and PID on macOS https://nuxx.net/blog/2021/10/29/network-capture-with-process-name-and-pid-on-macos/
How Microsoft reduced Windows 11 update size by 40%
https://techcommunity.microsoft.com/t5/windows-it-pro-blog/how-microsoft-reduced-windows-11-update-size-by-40/ba-p/2839794
https://techcommunity.microsoft.com/t5/windows-it-pro-blog/how-microsoft-reduced-windows-11-update-size-by-40/ba-p/2839794
TECHCOMMUNITY.MICROSOFT.COM
How Microsoft reduced Windows 11 update size by 40%
Reducing update size is important to you, and to us. Explore the techniques we used in Windows 11.
PuzzleMaker attacks with Chrome zero-day exploit chain https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/
Securelist
PuzzleMaker attacks with Chrome zero-day exploit chain
We detected a wave of highly targeted attacks that exploited a chain of Google Chrome and Microsoft Windows zero-day exploits.
Windows security book in web form » https://docs.microsoft.com/en-us/windows/security/
Docs
Windows security documentation
Windows is designed with zero-trust principles at its core, offering powerful security from chip to cloud. As organizations embrace hybrid work environments, the need for robust security solutions becomes paramount. Windows integrates advanced hardware and…
A Technical Analysis of CVE-2021-30864: Bypassing App Sandbox Restrictions https://perception-point.io/a-technical-analysis-of-cve-2021-30864-bypassing-app-sandbox-restrictions/
Fortinet
FortiMail Workspace Security | Fortinet
FortiMail Workspace Security secures user-facing apps from advanced threats that target Email, Browsers, Collaboration Tools and Cloud Storage Apps.
Heap Overflows For Humans 102 https://www.fuzzysecurity.com/tutorials/mr_me/3.html
XMachOViewer: Mach-O viewer for Windows, Linux and MacOS https://github.com/horsicq/XMachOViewer
GitHub
GitHub - horsicq/XMachOViewer: XMachOViewer is a Mach-O viewer for Windows, Linux and MacOS
XMachOViewer is a Mach-O viewer for Windows, Linux and MacOS - horsicq/XMachOViewer
Linux Heap Exploitation Intro Series: The magicians cape – 1 Byte Overflow https://sensepost.com/blog/2017/linux-heap-exploitation-intro-series-the-magicians-cape-1-byte-overflow/
CVE-2021-33742: Internet Explorer out-of-bounds write in MSHTML https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2021/CVE-2021-33742.html
Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 2 https://www.unh4ck.com/detection-engineering-and-threat-hunting/lateral-movement/detecting-conti-cobaltstrike-lateral-movement-techniques-part-2
Unh4Ck
Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 2 | Cyb3rSn0rlax
Detection opportunities on lateral movement techniques used by CONTI ransomware group using CobaltStrike.
Use-After-Free in Voice Control: CVE-2021-30902 Write-up https://blog.zecops.com/research/use-after-free-in-voice-control-cve-2021-30902/
Jamf
Jamf Threat Labs | Blog
Malicious code analysis: Abusing SAST (mis)configurations to hack CI systems https://medium.com/cider-sec/malicious-code-analysis-abusing-sast-mis-configurations-to-hack-ci-systems-13d5c1b37ffe
Medium
Malicious code analysis: Abusing SAST (mis)configurations to hack CI systems
What happens when SAST tools do more than just scanning? What if security scanners abuse their privileges?
Mimalloc: Free List Sharding in Action https://www.microsoft.com/en-us/research/uploads/prod/2019/06/mimalloc-tr-v1.pdf
How SSL certificates are leaking sensitive information
https://labs.detectify.com/2021/11/05/how-ssl-certificates-are-leaking-sensitive-information/
https://labs.detectify.com/2021/11/05/how-ssl-certificates-are-leaking-sensitive-information/
¿Cómo ceder datos personales a terceros cumpliendo con GDPR? https://asentify.com/como-ceder-datos-personales-a-terceros-cumpliendo-con-gdpr/
Asentify
¿Cómo ceder datos personales a terceros cumpliendo con GDPR? - Asentify
La nueva normativa europea GDPR significa un cambio de paradigma en cuanto al tratamiento de datos personales. Uno de los puntos más complejos para las empresas es la cesión a terceros, cuyo punto clave es el consentimiento explícito. Los nuevos requerimientos…
Driftwood: Know if Private Keys are Sensitive
https://trufflesecurity.com/blog/driftwood
https://trufflesecurity.com/blog/driftwood
Trufflesecurity
Introducing Driftwood: Know if Private Keys are Sensitive ◆ Truffle Security Co.
Asymmetric private keys are among the most often leaked out. We’re open sourcing a tool that immediately tells you if one is sensitive https://github.com/trufflesecurity/driftwood. With this tool we found the private keys for hundreds of TLS certificates…
GDPR Enforcement Tracker: overview of fines and penalties regarding GDPR https://www.enforcementtracker.com/
Enforcementtracker
GDPR Enforcement Tracker - list of GDPR fines
List and overview of fines and penalties under the EU General Data Protection Regulation (GDPR, DSGVO)
This is how I bypassed almost every EDR! https://medium.com/@omribaso/this-is-how-i-bypassed-almost-every-edr-6e9792cf6c44
Medium
This is how I bypassed almost every EDR!
First of all, let me introduce myself, my name is Omri Baso, I’m 24 years old from Israel and I’m a red teamer and a security researcher…