🔐 Incident Response for Generative AI Workloads: A Structured Approach by AWS #AIsecurityHub #IncidentResponse #GenerativeAI #AWS #StructuredApproach https://medium.com/ai-security-hub/incident-response-for-generative-ai-workloads-a-structured-approach-by-aws-da8619533f23
Medium
🔐 Incident Response for Generative AI Workloads: A Structured Approach by AWS
Amazon Web Services (AWS) outlines a structured approach for incident response in Generative AI workloads, emphasizing both response…
Inside a New OT/IoT Cyberweapon: IOCONTROL #IOCONTROL #Cyberweapon #CybersecurityResearch #MalwareAnalysis #IoTSecurity https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol
Claroty
Inside a New OT/IoT Cyberweapon: IOCONTROL
Team82 has researched a malware sample called IOCONTROL linked to an Iran-based attack group used to target IoT and OT civilian infrastructure in the U.S. and Israel.
Performing AD LDAP Queries Like a Ninja #ADLDAP #LDAPLogging #BypassDetection #ThreatDetection #ADSecurity https://cravaterouge.com/articles/ldapad-logging/
CravateRouge Ltd
Performing AD LDAP Queries Like a Ninja | CravateRouge Ltd
Strategies to minimize logging generation, and methods to enhance logging efficiency
Everything About Memory Allocators: Write A Simple Memory Allocator #MemoryAllocators #MemoryManagement #CProgramming #Implementation #ThreadSafety https://mohitmishra786.github.io/chessman/2024/11/24/Everything-About-Memory-Allocators-Write-a-simple-memory-allocator.html
Mohit Mishra
Everything About Memory Allocators: Write A Simple Memory Allocator
Table of Contents Introduction Memory Layout Fundamentals Memory Management Basics Building a Memory Allocator Core Data Structures Memory Block Headers Implementation Details Core Functions Implementation malloc() free() calloc() realloc() Thread Safety…
NFS Security: Identifying and Exploiting Misconfigurations #NFSSecurity #ISMS #InfoSecRiskManagement #BusinessContinuity #SecurityAwareness https://www.hvs-consulting.de/en/nfs-security-identifying-and-exploiting-misconfigurations/
HvS-Consulting
NFS Security: Identifying and Exploiting Misconfigurations | HvS-Consulting
Understand security features, misconfigurations and technical attacks on NFS shares.
Volkswagen’s bad streak: We know where your car is #VolkswagenDataBreach #CCCInvestigation #DataPrivacy #Cybersecurity #ProtectYourself https://reynardsec.com/en/volkswagens-bad-streak-we-know-where-your-car-is/
ReynardSec
Volkswagen's bad streak: We know where your car is - ReynardSec
Volkswagen has landed in hot water once again. A recent investigation by the Chaos Computer Club (CCC) reveals that the company has been systematically collecting and storing movement data from hundreds of thousands of vehicles across its brands (VW, Audi…
Simple Prompts to get the System Prompts #AIWrappers #Security #SystemPrompts #Research #Blog https://eval.blog/blog/simple-prompts-to-get-the-system-prompts/
eval.blog
Simple Prompts to get the System Prompts
Exploring prompt injection techniques to extract hidden system prompts from popular AI wrappers and chatbots.
From Arbitrary File Write to RCE in Restricted Rails apps #ArbitraryFileWrite #RCE #RailsApps #Bootsnap #ExploitationPossibilities https://blog.convisoappsec.com/en/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/
Conviso AppSec
From Arbitrary File Write to RCE in Restricted Rails apps
We describe a technique that can be used to achieve remote code execution (RCE) from an arbitrary file write vulnerability by abusing the cache mechanism of Bootsnap.
Directory Traversal (Path Traversal) #DirectoryTraversal #PathTraversal #OWASP #SourceCodeReview #SSTI https://blog.projectasuras.com/OWASP/Path-Traversal/1
CVE-2024-54819 - I Librarian Server Side Request Forgery #CVE202454819 #ILibrarian #SSRF #Cybersecurity #Vulnerability https://www.partywave.site/show/research/CVE-2024-54819_-_I_Librarian_Server_Side_Request_Forgery
www.partywave.site
cve-2024-54819-i-librarian-server-side-request-forgery
Discover cve-2024-54819-i-librarian-server-side-request-forgery article on partywave.
👍1
Command Injection in apmcfgupload endpoint for DrayTek Gateway Devices #Notion #AllinOne #Workspace #Notes #Tasks https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f
netsecfish on Notion
Command Injection in `apmcfgupload` endpoint for DrayTek Gateway Devices | Notion
Summary
CVE-2024-49113: LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 #PoC #LdapNightmare #CVE202449113 #SafeBreachLabs #WindowsServerVulnerability https://github.com/SafeBreach-Labs/CVE-2024-49113
GitHub
GitHub - SafeBreach-Labs/CVE-2024-49113: LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 - SafeBreach-Labs/CVE-2024-49113
Remote Code Execution (RCE) Exploits – How Hackers Exploit from Home #RCEExploits #HackersAtHome #OcsalyAcademy #CybersecurityThreats #StaySafe https://ocsaly.com/how-hackers-exploit-calibre-and-what-you-can-do-about-it/
TMI — Too Much Information. The less you reveal the better! #TMI #UserEnumerationVulnerability #InformationDisclosure #SecureProgramming #ProtectUserData https://medium.com/@aleksamajkic/too-much-information-the-less-you-reveal-the-better-163dabb7f89f
Medium
TMI — Too Much Information. The less you reveal the better!
A short overview of frequently overlooked vulnerability with real world examples
RustPotato: A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. #RustPotato #GodPotato #SeImpersonate #SYSTEMPrivileges #ReverseShell https://github.com/safedv/RustPotato
GitHub
GitHub - safedv/RustPotato: A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP…
A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. - safedv/RustPotato
Backdooring Your Backdoors - Another $20 Domain, More Governments #Backdoors #DomainExploitation #GovernmentCompromised #WebShells #CyberSecurityResearch https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
watchTowr Labs
Backdooring Your Backdoors - Another $20 Domain, More Governments
After the excitement of our .MOBI research, we were left twiddling our thumbs. As you may recall, in 2024, we demonstrated the impact of an unregistered domain when we subverted the TLS/SSL CA process for verifying domain ownership to give ourselves the ability…
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability #OpenSSH #Vulnerability #PoCExploit #CyberSecurity #RemoteCodeExecution https://cybersecuritynews.com/regresshion-code-execution-vulnerability/
Cyber Security News
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as "regreSSHion," has been released, raising alarms across the cybersecurity community.
Comment obtenir une injection SQL « time-based blind » et automatiser en modifiant SQLMAP ? #TimeBasedSQLInjection #BlindSQLInjection #ModifyingSQLMap #CyberSecurity #DataExfiltration https://www.hackmosphere.fr/time-based-blind-sql-injection/
Hackmosphere
Time-based Blind SQL Injection et modification de SQLMAP
Time-based blind SQL injection : Découvrez comment cette faille se distingue par sa capacité à exfiltrer des données sans activer d'alerte.
Exploiting SSTI in a Modern Spring Boot Application (3.3.4) #SSTI #SpringBoot #Pentesting #RCE #Exploit https://modzero.com/en/blog/spring_boot_ssti/
Modzero
Exploiting SSTI in a Modern Spring Boot Application (3.3.4)