Careto is back: what’s new after 10 years of silence? #CaretoAPT #RecentAttacks #Kaspersky #SecuritySolutions #CyberEspionage https://securelist.com/careto-is-back/114942/
Securelist
Careto APT’s recent attacks discovered
Kaspersky researchers analyze 2019, 2022 and 2024 attacks attributed to Careto APT with medium to high confidence.
Scanners Beware: Welcome to the Network from Hell #NetworkSecurity #Innovation #DeceptionDefense #CybersecuritySolution #DisruptAttackers https://medium.com/sensorfu/scanners-beware-welcome-to-the-network-from-hell-86989f29f17b
Medium
Scanners Beware: Welcome to the Network from Hell
We’ve crafted a bold defense strategy that not only slows scans but actively disrupts and deceives attackers.
🤔2👍1
Finding Bugs in Chrome with CodeQL #ChromeBugs #CodeQL #SecurityFlaws #BugHunting #WebDevelopment https://bughunters.google.com/blog/5085111480877056/finding-bugs-in-chrome-with-codeql
Google
Blog: Finding Bugs in Chrome with CodeQL
Want to learn about using a static analysis tool called CodeQL to search for vulnerabilities in Google Chrome? Then this blog post is for you!
Security vulnerability uncovered and patched in the golang.org/x/crypto /ssh package #PlatformshSecurityVulnerability #GoSSHAuthBypass #GoCryptoSSHPackage #SecurityDisclosure #OpenSourceBugs https://platform.sh/blog/uncovered-and-patched-golang-vunerability/
platform.sh
Platform.sh team finds auth bypass in Go SSH package
Platform.sh team discovers misimplementation of PublicKeyCallback leading to authorization bypass in Go's x/crypto/ssh | Platform.sh
Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE #KerioControl #Vulnerabilities #CVE202452875 #1ClickRCE #XSS https://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875
Karmainsecurity
Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware #DarkGateMalware #MicrosoftTeamsExploit #AnyDeskExploit #CyberSecurity #MalwarePropagation https://techacademy.online/attackers-exploit-microsoft-teams-and-anydesk-to-deploy-darkgate-malware/
Understanding Logits And Their Possible Impacts On Large Language Model Output Safety #Logits #LanguageModels #SoftMaxFunction #ModelSafety #ArtificialIntelligence https://ioactive.com/understanding-logits-and-their-possible-impacts-on-large-language-model-output-safety/
Nice compilation of search evasion techniques #UnprotectProject #Home #TechniqueList #CodeSnippets #DetectionRules https://unprotect.it/
Exploiting Reflected Input Via the Range Header #ReflectedInputExploitation #RangeHeaderExploitation #ServerVulnerabilities #XSSAttacks #InformationSecurity https://attackshipsonfi.re/p/exploiting-reflected-input-via-the
attackshipsonfi.re
Exploiting Reflected Input Via the Range Header
TL;DR Reflected input is often unexploitable because the attack ends up in a place which stops it working, such as inside a quoted attribute.
CVE-2024-44825 - Invesalius Arbitrary File Write and Directory Traversal #CVE-2024-44825 #Invesalius #ArbitraryFileWrite #DirectoryTraversal #ZipSlip https://www.partywave.site/show/research/CVE-2024-44825%20-%20Invesalius%20Arbitrary%20File%20Write%20and%20Directory%20Traversal
www.partywave.site
cve-2024-44825-invesalius-arbitrary-file-write-and-directory-traversal
Discover cve-2024-44825-invesalius-arbitrary-file-write-and-directory-traversal article on partywave.
Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150 #JWTAlgorithmConfusion #Vulnerability #CVE202454150 #SecurityCodeReview #AlgorithmConfusion https://pentesterlab.com/blog/another-jwt-algorithm-confusion-cve-2024-54150
Pentesterlab
Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150
Discover how a code review uncovered a JWT algorithm confusion vulnerability (CVE-2024-54150). Learn key insights to enhance your security skills and spot vulnerabilities effectively.
🔐 Incident Response for Generative AI Workloads: A Structured Approach by AWS #AIsecurityHub #IncidentResponse #GenerativeAI #AWS #StructuredApproach https://medium.com/ai-security-hub/incident-response-for-generative-ai-workloads-a-structured-approach-by-aws-da8619533f23
Medium
🔐 Incident Response for Generative AI Workloads: A Structured Approach by AWS
Amazon Web Services (AWS) outlines a structured approach for incident response in Generative AI workloads, emphasizing both response…
Inside a New OT/IoT Cyberweapon: IOCONTROL #IOCONTROL #Cyberweapon #CybersecurityResearch #MalwareAnalysis #IoTSecurity https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol
Claroty
Inside a New OT/IoT Cyberweapon: IOCONTROL
Team82 has researched a malware sample called IOCONTROL linked to an Iran-based attack group used to target IoT and OT civilian infrastructure in the U.S. and Israel.
Performing AD LDAP Queries Like a Ninja #ADLDAP #LDAPLogging #BypassDetection #ThreatDetection #ADSecurity https://cravaterouge.com/articles/ldapad-logging/
CravateRouge Ltd
Performing AD LDAP Queries Like a Ninja | CravateRouge Ltd
Strategies to minimize logging generation, and methods to enhance logging efficiency
Everything About Memory Allocators: Write A Simple Memory Allocator #MemoryAllocators #MemoryManagement #CProgramming #Implementation #ThreadSafety https://mohitmishra786.github.io/chessman/2024/11/24/Everything-About-Memory-Allocators-Write-a-simple-memory-allocator.html
Mohit Mishra
Everything About Memory Allocators: Write A Simple Memory Allocator
Table of Contents Introduction Memory Layout Fundamentals Memory Management Basics Building a Memory Allocator Core Data Structures Memory Block Headers Implementation Details Core Functions Implementation malloc() free() calloc() realloc() Thread Safety…
NFS Security: Identifying and Exploiting Misconfigurations #NFSSecurity #ISMS #InfoSecRiskManagement #BusinessContinuity #SecurityAwareness https://www.hvs-consulting.de/en/nfs-security-identifying-and-exploiting-misconfigurations/
HvS-Consulting
NFS Security: Identifying and Exploiting Misconfigurations | HvS-Consulting
Understand security features, misconfigurations and technical attacks on NFS shares.
Volkswagen’s bad streak: We know where your car is #VolkswagenDataBreach #CCCInvestigation #DataPrivacy #Cybersecurity #ProtectYourself https://reynardsec.com/en/volkswagens-bad-streak-we-know-where-your-car-is/
ReynardSec
Volkswagen's bad streak: We know where your car is - ReynardSec
Volkswagen has landed in hot water once again. A recent investigation by the Chaos Computer Club (CCC) reveals that the company has been systematically collecting and storing movement data from hundreds of thousands of vehicles across its brands (VW, Audi…
Simple Prompts to get the System Prompts #AIWrappers #Security #SystemPrompts #Research #Blog https://eval.blog/blog/simple-prompts-to-get-the-system-prompts/
eval.blog
Simple Prompts to get the System Prompts
Exploring prompt injection techniques to extract hidden system prompts from popular AI wrappers and chatbots.
From Arbitrary File Write to RCE in Restricted Rails apps #ArbitraryFileWrite #RCE #RailsApps #Bootsnap #ExploitationPossibilities https://blog.convisoappsec.com/en/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/
Conviso AppSec
From Arbitrary File Write to RCE in Restricted Rails apps
We describe a technique that can be used to achieve remote code execution (RCE) from an arbitrary file write vulnerability by abusing the cache mechanism of Bootsnap.