CVE-2024-4367 – Arbitrary JavaScript execution in PDF.js #JavaScript #CVE-2024-4367 #ArbitraryExecution https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
codeanlabs
CVE-2024-4367 - Arbitrary JavaScript execution in PDF.js - Codean Labs
A vulnerability in PDF.js found by Codean Labs. PDF.js is a JavaScript-based PDF viewer maintained by Mozilla. This bug allows an attacker to execute arbitrary JavaScript code as soon as a malicious PDF file is opened. This affects all Firefox users (
Abusing url handling in iTerm2 and Hyper for code execution #TerminalEscapeSequences #iTerm2 #Hyper #Vulnerabilities #CodeExecution https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html
Vin01’s Blog
Abusing url handling in iTerm2 and Hyper for code execution
What are escape sequences
Heap overflow in WebRtcAudioSink #Chromium https://issues.chromium.org/issues/41485743
Remote Desktop Protocol: The Series #RDP #IncidentResponse #RemoteDesktopProtocol #Cybersecurity #SophosNews https://news.sophos.com/en-us/2024/03/20/remote-desktop-protocol-the-series/
Sophos News
Remote Desktop Protocol: The Series
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report
Foxit PDF “Flawed Design” Exploitation #FoxitPDFexploitation #CheckPointResearch #PDFsecurity #maliciousPDF #threatintelligence https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/
Check Point Research
Foxit PDF “Flawed Design” Exploitation - Check Point Research
Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands. Check Point…
Random thoughts on physical security measures #PhysicalSecurity #AlarmBypass #Reconnaissance #CableVulnerabilities #SeeThroughWalls https://diablohorn.com/2024/05/21/random-thoughts-on-physical-security-measures/
DiabloHorn
Random thoughts on physical security measures
Lately, I’ve been drawn to do some desk research and limited hands-on testing of physical security measures. I’ve written about this subject before, you can find the article here. Howev…
Persistence Techniques That Persist #CyberArk #IdentitySecurity #RegistryPersistence #ThreatResearch #PersistenceTechniques https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
Cyberark
Persistence Techniques That Persist
Abstract Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change...
Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy #Malware https://blog-en.itochuci.co.jp/entry/2024/05/23/090000
Researcher Blog - ITOCHU Cyber & Intelligence Inc.
Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy - Researcher Blog - ITOCHU Cyber & Intelligence Inc.
Introduction Malware group History Analysis of BloodAlchemy Initial infection vector and infection flow Analysis of malicious DLL Analysis of shellcode Analysis…
Analysis of CVE-2023-39143 – PaperCut RCE #PaperCutRCE #PenetrationTesting #WebDav #PathTraversal #SecurityVulnerabilities https://blog.securelayer7.net/analysis-of-papercut-rce/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Analysis of CVE-2023-39143 – PaperCut RCE
Overview CVE-2023-39143 is a path traversal vulnerability found in Papercut MF/NG, a print management solution. This particular CVE only affects Windows installations prior to version 22.1.3. With...
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations #ElasticSecurityLabs #GHOSTENGINE #cryptoMining #Malware #MITREATTACK https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine
www.elastic.co
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs
Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining.
Tracking APT SideWinder Domains By Combining Regex Patterns, Whois Records and Domain Registrars #ThreatIntelligence #APTTracking #MalwareAnalysis #CyberSecurity #DomainDetection https://www.embeeresearch.io/advanced-guide-to-infrastructure-analysis-tracking-apt-sidewinder-domains/
Embee Research
Tracking APT SideWinder Domains By Combining Regex Patterns, Whois Records and Domain Registrars
Tracking APT SideWinder Domains With Regular Expressions, Whois Records and Domain Registrars
Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956) #NexusRepositoryManager #CVE20244956 #Vulnerability #GitHub #Security https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956
GitHub
vulhub/nexus/CVE-2024-4956 at master · vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose - vulhub/vulhub
hardentools: Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features. #Hardentools #GitHub #WindowsSecurity #RiskReduction #LowHangingFruit https://github.com/hardentools/hardentools
GitHub
GitHub - hardentools/hardentools: Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low…
Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features. - hardentools/hardentools
👍1
Authentication Bypass due to Sensitive Data Exposure in Local Storage #AuthenticationBypass #SensitiveDataExposure #BugBounty #WebApplicationSecurity #HappyHacking https://medium.com/@kritikasingh06/authentication-bypass-due-to-sensitive-data-exposure-in-local-storage-8a706c798800
Medium
Authentication Bypass due to Sensitive Data Exposure in Local Storage
Hey Infosec buddies!
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia #ChineseCyberespionage #OperationDiplomaticSpecter #GovernmentalEntities #AsiaAfricaMiddleEast #RareToolSet https://unit42.paloaltonetworks.com/operation-diplomatic-specter/
Unit 42
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities…
A Chinese APT group is targeting political entities across multiple continents. Named Operation Diplomatic Specter, this campaign uses rare techniques and a unique toolset.
Inside the iOS bug that made deleted photos reappear #iOSbug #bugfixed #binaryanalysis https://www.synacktiv.com/publications/inside-the-ios-bug-that-made-deleted-photos-reappear
Synacktiv
Inside the iOS bug that made deleted photos reappear
LangChain JS Arbitrary File Read Vulnerability #LangChain #Vulnerability #ArbitraryFileRead #SSRF #CyberSecurity https://evren.ninja/langchain-afr-vulnerability.html
Old new email attacks #emailattacks #securityresearch #emailspoofing #SMTPvulnerabilities #RFCstandards https://blog.slonser.info/posts/email-attacks/
blog.slonser.info
Old new email attacks
The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs…
🔥1
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1) #PHPexploit #glibcbug #RCEvulnerability #PHPfilters https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
Ambionics
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway…
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2 #EverydayGhidra #SymbolAcquisition #ConfiguringGhidra #RemoteSymbolServers #ReverseEngineering https://medium.com/@clearbluejar/everyday-ghidra-symbols-automatic-symbol-acquisition-with-ghidra-part-2-bf9033a35b39
Medium
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2
This post, another lesson from the “Everyday Ghidra” series, walks through the process of configuring Ghidra to automatically download…
🔥1