CVE-2022-26809: Remote Procedure Call Runtime Remote Code Execution Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809
Tough Times for Ukrainian Honeypot? https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tough-times-for-ukrainian-honeypot/
Trustwave
Tough Times for Ukrainian Honeypot?
I’ve always been fascinated by wireless communications. The ability to launch seemingly invisible packets of information up into the air without even the need to consider aerodynamics itself seems like some kind of magic.
CVE-2022-21449: Psychic Signatures in Java
https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
Neil Madden
CVE-2022-21449: Psychic Signatures in Java
The long-running BBC sci-fi show Doctor Who has a recurring plot device where the Doctor manages to get out of trouble by showing an identity card which is actually completely blank. Of course, thi…
Investigating an engineering workstation – Part 2
https://blog.nviso.eu/2022/03/30/investigating-an-engineering-workstation-part-2/
https://blog.nviso.eu/2022/03/30/investigating-an-engineering-workstation-part-2/
NVISO Labs
Investigating an engineering workstation – Part 2
In this second post we will focus on specific evidence written by the TIA Portal. As you might remember, in the first part we covered standard Windows-based artefacts regarding execution of the TIA…
Hacker forged Windows 11 upgrade website to trick users to download the virus https://securityonline.info/hacker-forged-windows-11-upgrade-website-to-trick-users-to-download-the-virus/
Cybersecurity News
Hacker forged Windows 11 upgrade website to trick users to download the virus
network security company, CloudSEK has found in their daily monitoring that there are fake Windows 11 upgrade websites
Teaching Burp a new HTTP Transport Encoding https://www.pentagrid.ch/en/blog/teaching_burp_a_new_http_transport_encoding/
Pentagrid AG
Teaching Burp a new HTTP Transport Encoding
WSO2 RCE (CVE-2022-29464) exploit and writeup https://github.com/hakivvi/CVE-2022-29464
GitHub
GitHub - hakivvi/CVE-2022-29464: WSO2 RCE (CVE-2022-29464) exploit and writeup.
WSO2 RCE (CVE-2022-29464) exploit and writeup. Contribute to hakivvi/CVE-2022-29464 development by creating an account on GitHub.
Writing a Wireshark dissector to parse data embedded in ICMP headers https://medium.com/@kevin.massey1189/writing-a-wireshark-dissector-to-parse-data-embedded-in-icmp-headers-1f039cd4072d
Medium
Writing a Wireshark dissector to parse data embedded in ICMP headers
I recently spent some time repurposing fields in ICMP headers in order to do a basic file transfer. I decided to use the code, ID, and…
What Is Peppering in Password Security and How Does It Work? https://www.makeuseof.com/what-is-peppering-how-does-it-work/
MUO
What Is Peppering in Password Security and How Does It Work?
You've probably heard about salting passwords, but a further technique, peppering, makes them even more secure. Here's how.
Static unpacker and decoder for Hello Kitty Packer https://medium.com/proferosec-osm/static-unpacker-and-decoder-for-hello-kitty-packer-91a3e8844cb7
Medium
Static unpacker and decoder for Hello Kitty Packer
During a recent incident response engagement, the Profero IR team observed a sample of Hello Kitty ransomware. This version of ransomware…
Remote Code Execution via VirusTotal Platform https://www.cysrc.com/blog/virus-total-blog/
Cysrc
CySource Cyber Workforce Development Platform
Continuously train and measure your entire workforce
Making Your Neural Network Say “I Don’t Know” — Bayesian NNs using Pyro and PyTorch https://towardsdatascience.com/making-your-neural-network-say-i-dont-know-bayesian-nns-using-pyro-and-pytorch-b1c24e6ab8cd
Medium
Making Your Neural Network Say “I Don’t Know” — Bayesian NNs using Pyro and PyTorch
A tutorial + code on writing a bayesian image classifier on MNIST dataset.
DFSpot-Deepfake-Recognition: Determine whether a given video sequence has been manipulated or synthetically generated https://github.com/chinmaynehate/DFSpot-Deepfake-Recognition
GitHub
GitHub - chinmaynehate/DFSpot-Deepfake-Recognition: Determine whether a given video sequence has been manipulated or synthetically…
Determine whether a given video sequence has been manipulated or synthetically generated - chinmaynehate/DFSpot-Deepfake-Recognition
Introduction: Vulnerable Lambdas in the Wild https://rhinosecuritylabs.com/cloud-security/cloudgoat-vulnerable-lambda-functions/
Rhino Security Labs
CloudGoat goes Serverless: A walkthrough of Vulnerable Lambda Functions
This post walks through exploiting serverless environments and AWS Lambda functions via the CloudGoat vulnerable_lambda scenario.
Writing a Linux Kernel Remote in 2022 https://blog.immunityinc.com/p/writing-a-linux-kernel-remote-in-2022/
Anatomy of a Zero Day - How to decrypt....a robot? https://dolosgroup.io/blog/2022/4/28/anatomy-of-a-zero-day-how-to-decrypt-a-robot
Dolos Group
Anatomy of a Zero Day - How to decrypt....a robot? — Dolos Group
That title would have sounded very weird to me a year ago but that’s exactly what happened. Let me walk you through how we were approached by a client for a code review, had to find a zero day just to get started (CVE-2022-29856), and ultimately “decrypted…
Malicious relays and the health of the Tor network https://blog.torproject.org/malicious-relays-health-tor-network/
blog.torproject.org
Malicious relays and the health of the Tor network | Tor Project
In this post, we'll explain what we do to fight malicious relays in our network, how we did in the past, and what further improvements are upcoming and being worked on.