Deceptive Cracked Software Spreads Lumma Variant on YouTube https://www.fortinet.com/blog/threat-research/lumma-variant-on-youtube
Fortinet Blog
Deceptive Cracked Software Spreads Lumma Variant on YouTube
FortiGuard Labs uncovered a threat group using YouTube channels to spread Private .NET loader for Lumma Stealer 4.0. Learn more.…
CVE-2024-21633: MobSF Remote code execution (via CVE-2024-21633) https://github.com/0x33c0unt/CVE-2024-21633
GitHub
GitHub - 0x33c0unt/CVE-2024-21633: MobSF Remote code execution (via CVE-2024-21633)
MobSF Remote code execution (via CVE-2024-21633). Contribute to 0x33c0unt/CVE-2024-21633 development by creating an account on GitHub.
How I pwned half of America’s fast food chains, simultaneously. https://mrbruh.com/chattr/
Mrbruh
How I pwned half of America's fast food chains, simultaneously
How I pwned half of America’s fast food chains, simultaneously. Also checkout Eva’s blogpost of this event.
With an upbeat pling my console alerted me that my script had finished running, to be precise it was searching for exposed Firebase credentials on…
With an upbeat pling my console alerted me that my script had finished running, to be precise it was searching for exposed Firebase credentials on…
🥱1
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360 https://blog.securelayer7.net/unauthorized-rce-in-adobe-coldfusion/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Unauthenticated RCE in Adobe Coldfusion – CVE-2023-26360
Overview CVE-2023-263060 was exploited in the wild in Adobe ColdFusion product, a commercial application server for rapid web application development. The vulnerability affects both the 2018 and...
Analysis of an Info Stealer — Chapter 2: The iOS App https://medium.com/@icebre4ker/analysis-of-an-info-stealer-chapter-2-the-ios-app-0529e7b45405
Medium
Analysis of an Info Stealer — Chapter 2: The iOS App
Introduction
The Role of the Control Flow Graph in Static Analysis https://nicolo.dev/en/blog/role-control-flow-graph-static-analysis/
nicolo.dev
The Role of the Control Flow Graph in Static Analysis
The flow control graph is an important building block in static program analysis for applying a variety of analyses that consider the flow of a program. The “flow”, described informally, represents the evolution of the program during execution time, that…
CVE-2023-41056: Redis Remote Code Execution Vulnerability https://securityonline.info/cve-2023-41056-redis-remote-code-execution-vulnerability/
Cybersecurity News
CVE-2023-41056: Redis Remote Code Execution Vulnerability
Rated 8.1 on the CVSS, CVE-2023-41056 is a serious threat that underscores the fragility of even the most secure systems
Dependency Confusions in Docker and remote pwning of your infra https://www.errno.fr/DockerDependencyConfusion
kasld: Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR). https://github.com/bcoles/kasld
GitHub
GitHub - bcoles/kasld: Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux…
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing K...
Attack of the week: Airdrop tracing https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/
A Few Thoughts on Cryptographic Engineering
Attack of the week: Airdrop tracing
It’s been a while since I wrote an “attack of the week” post, and the fault for this is entirely mine. I’ve been much too busy writing boring posts about Schnorr signatures!…
A collection of weggli patterns for C/C++ vulnerability research https://security.humanativaspa.it/a-collection-of-weggli-patterns-for-c-cpp-vulnerability-research/
HN Security
A collection of weggli patterns for C/C++ vulnerability research - HN Security
Introducing a collection of weggli patterns for C/C++ SAST and vulnerability research.
👏2
[PATCH] tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux https://lore.kernel.org/all/[email protected]/
Frinet: reverse-engineering made easier https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier
Synacktiv
Frinet: reverse-engineering made easier
Privilege escalation using the XAML diagnostics API (CVE-2023-36003) https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
M417Z
Privilege escalation using the XAML diagnostics API (CVE-2023-36003)
This is a write-up of a vulnerability that I discovered in Windows. The vulnerability was patched in December’s Patch Tuesday, and the CVE assigned to it is CVE-2023-36003. The vulnerability allows a non-elevated process to inject a DLL into an elevated or…
Debug Case Study: SharePoint Pre-Auth Code Injection RCE chain CVE-2023-29357 & CVE-2023-24955 https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging%20Case%20Studies/Debug%20Case%20Study%3A%20SharePoint%20Pre-Auth%20Code%20Injection%20RCE%20chain%20CVE-2023-29357%20%26%20CVE-2023-24955
GitHub
InsightEngineering/Debugging Case Studies/Debug Case Study: SharePoint Pre-Auth Code Injection RCE chain CVE-2023-29357 & CVE-2023…
Hardcore Debugging. Contribute to DebugPrivilege/InsightEngineering development by creating an account on GitHub.
Atomic Stealer rings in the new year with updated version https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version
Malwarebytes
Atomic Stealer rings in the new year with updated version
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.
How I Discovered an RCE Vulnerability in Tesla, Securing a $10,000 Bounty https://medium.com/@sahul1996l/how-i-discovered-an-rce-vulnerability-in-tesla-securing-a-10-000-bounty-62e725c2a6bd
Medium
The Hidden Gateway: How Extensive Recon Unlocked RCE on a Tesla Infrastructure
Myself: I am Raguraman , Security Researcher 🛡️ | Bug Hunter | CTF Player | Secured @ Tesla,Apple,Amazon,Oracle & more
Exploring FBot | Python-Based Malware Targeting Cloud and Payment Services https://www.sentinelone.com/labs/exploring-fbot-python-based-malware-targeting-cloud-and-payment-services/
SentinelOne
Exploring FBot | Python-Based Malware Targeting Cloud and Payment Services
FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services.