Git-Rotate: Leveraging GitHub Actions to Bypass Microsoft Entra Smart lockout https://research.aurainfosec.io/pentest/git-rotate/
Aura Research Division
Git-Rotate: Leveraging GitHub Actions to Bypass Microsoft Entra Smart lockout
Explore how GitHub Actions can be leveraged to rotate IP addresses during password spraying attacks to bypass IP-Based blocking such as Entra Smart lockout.
Donex ransomware https://www.shadowstackre.com/analysis/donex
Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex https://www.ctvnews.ca/world/behind-the-doors-of-a-chinese-hacking-company-a-sordid-culture-fuelled-by-influence-alcohol-and-sex-1.6799679
CTVNews
Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
A highly unusual leak last month of internal documents from a private contractor linked to China's government and police revealed the sordid wheeling and dealing that takes place behind the scenes in China's hacking industry.
👍1
Analyze installed Android applications for security risks in Termux https://www.mobile-hacker.com/2024/03/11/analyze-installed-android-applications-for-security-risks-in-termux/
Mobile Hacker
Analyze installed Android applications for security risks in Termux
I will show you how to install and run it on non-rooted Android device using Termux app. This brings convenience of analyzing Android apps directly on device
CVE-2024–23897 – Arbitrary file read in Jenkins https://blog.securelayer7.net/arbitrary-file-read-in-jenkins/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2024–23897 – Arbitrary file read in Jenkins
Overview CVE-2024–23897 is a critical vulnerability discovered in Jenkins, with a high CVSS score of 9.8. This vulnerability allows the attacker to read files in the system through Command-Line...
NextChat: An AI Chatbot That Lets You Talk to Anyone You Want To https://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to/
Horizon3.ai
NextChat: An AI Chatbot That Lets You Talk to Anyone You Want To
NextChat a.k.a ChatGPT-Next-Web, a popular Gen AI ChatBot, is vulnerable to a critical server-side request forgery (SSRF) vulnerability.
Introduction to LLM Security https://blog.cloudsecuritypartners.com/introduction-to-llm-security/
Cloud Security Partners Blog
Introduction to LLM Security
In the dynamic world of AI today, Large Language Models (LLMs) stand out as one of the most interesting and capable technologies. The ability to answer arbitrary prompts has numerous business use cases. As such, they are rapidly being integrated into a variety…
Practical and Theoretical Attacks in the Industrial Landscape (Part 2) https://claroty.com/team82/research/practical-and-theoretical-attacks-in-the-industrial-landscape-part-2
Claroty
Practical and Theoretical Attacks in the Industrial Landscape (Part 2)
In part two of this Team82 series, we examine practical and theoretical attacks against operational technology (OT) through the use of a virtual factory environment. The attacks range in sophistication and present defenders with an opportunity to threat model…
GhostRace: Exploiting and Mitigating Speculative Race Conditions
(CVE-2024-2193) https://www.vusec.net/projects/ghostrace/
(CVE-2024-2193) https://www.vusec.net/projects/ghostrace/
vusec
GhostRace - vusec
Exploiting and Mitigating Speculative Race Conditions GhostRace: CVE-2024-2193 Race conditions arise when multiple threads attempt to access a shared resource without proper synchronization, often leading to vulnerabilities such as concurrent use-after-free.…
The Anatomy of an ALPHA SPIDER Ransomware Attack https://www.crowdstrike.com/blog/anatomy-of-alpha-spider-ransomware/
CrowdStrike.com
The Anatomy of an ALPHA SPIDER Ransomware Attack
Read this blog on the anatomy of an ALPHA SPIDER ransomware attack to better understand how they operate and how to better protect your business.
A Look at Software Composition Analysis https://blog.doyensec.com/2024/03/14/supplychain.html
Doyensec
A Look at Software Composition Analysis
At Doyensec, we specialize in performing white and gray box application security audits. So, in addition to dynamically testing applications, we typically audit our clients’ source code as well. This process is often software-assisted, with open source and…
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762 https://www.assetnote.io/resources/research/two-bytes-is-plenty-fortigate-rce-with-cve-2024-21762
www.assetnote.io
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
Early this February, Fortinet released an advisory for an "out-of-bounds write vulnerability" that could lead to remote code execution. The issue affected the SSL VPN component of their FortiGate network appliance and was potentially already being exploited…
Analyzing Pipedream / Incontroller with MITRE/STIX https://diablohorn.com/2024/03/17/analyzing-pipedream-incontroller-with-mitre-stix/
DiabloHorn
Analyzing Pipedream / Incontroller with MITRE/STIX
This blog post is intended to further practice with MITRE data as well as understand some OT attack techniques implemented by OT malware. For this we are going to look at Pipedream (researched by D…
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains https://www.akamai.com/blog/security-research/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains
Akamai
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains | Akamai
A new malicious privilege escalation technique can be disastrous. In this post, get context and defensive measures against this threat.
👍1
Hunting Vulnerable Kernel Drivers https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
VMware Security Blog
Hunting Vulnerable Kernel Drivers
In information security, even seemingly insignificant issues could pose a significant threat. One notable vector of attack is through device drivers used by legitimate software developers. There are numerous available drivers to support legacy hardware in…
Security Advisory: Remote Command Execution in Cisco Access Point WAP Products https://onekey.com/blog/security-advisory-remote-command-execution-in-cisco-access-point-wap-products/
Onekey
Security Advisory: Remote Command Execution in Cisco Access Point WAP Products | ONEKEY Research | Research | ONEKEY
Learn about the vulnerabilities affecting Cisco's WAP371 and other Small Business Wireless APs, and the importance of binary static analysis.
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers https://www.mobile-hacker.com/2024/03/22/bluetooth-vulnerability-allows-unauthorized-user-to-record-and-play-audio-on-bluetooth-speakers/
Mobile Hacker
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
This critical security issue allows third party user to record audio from Bluetooth speaker with built-in microphone in vicinity, even when it is already paired and connected with another device. This can result in eavesdropping on private conversations using…