Security Operations

578 readers
1 users here now

A place for all things Cyber Security, from questions, rants, and stories, to the latest attacks, vulnerabilities, and zero days.

founded 2 years ago
MODERATORS
L3s
226
18
submitted 2 years ago by L4s to c/secops
 
 

Microsoft has announced Excel will support Python::Python is one of the most popular programming languages today, loved by businesses and students alike and Excel is an essential tool to organize,

227
 
 

Technical Details of CVE-2023-30988 - IBM Facsimile Support Privilege Escalation::Because we can!

228
 
 

mTLS: When certificate authentication is done wrong::In this post, we'll deep dive into some interesting attacks on mTLS authentication. We'll have a look at implementation vulnerabilities and how developers can make their mTLS systems vulnerable to user impersonation, privilege escalation, and information leakages.

229
0
Threat Hunting Newsletter (marcusedmondson.substack.com)
submitted 2 years ago by L4s to c/secops
 
 

Threat Hunting Newsletter::I share threat hunting advice and tips for small and medium sized businesses on a budget. Click to read The Threat Hunter's Dilemma, by Marcus Edmondson, a Substack publication. Launched 11 hours ago.

230
2
submitted 2 years ago by L4s to c/secops
 
 

Search Engines for Researchers::undefined

231
 
 

Animated Video on Buffer Overflow Attacks and DeGoogled Phones::undefined

232
 
 

DEFCON Talk: Using ML Models for Red Teaming and Bug Bounty::How I hacked a bunch of companies via machine learning attacks.

233
 
 

How Browser Sync Can Unknowingly Risk Your Business::Upon initiating browser sync, users trigger a process that shares vital data across devices. By default, this synchronization...

234
 
 

The data of 760,000 Discord.io users was put up for sale on the darknet::Note: I've gone ahead and updated the featured image, so it doesn't seem like this has something to do with Discord "directly". It was not my intention to

235
 
 

Memory Forensics R&D Illustrated: Recovering Raw Sockets on Windows 10+::As mentioned in a  recent blog post , our team is once again offering in-person training, and we have substantially updated our course for t...

236
 
 

Speeding up nmap service scanning 16x::In my previous post post, I began writing about how I was designing a port and service scanner for large-scale networks by combining port-scanning tools like masscan/zmap and service scanning tools like nmap. In this post, I’m going to dive into some of the details of nmap’s service scanning, and outline how I was able to speed up nmap’s service scanning by 16-times.

237
8
submitted 2 years ago by L4s to c/secops
 
 

Black Hat USA 2023 slides::undefined

238
 
 

VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF::VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF - GitHub - hardenedvault/ved-ebpf: VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF

239
 
 

“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping::In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts sensitive data. These vulnerabilities could allow a network eavesdropper to decrypt sensitive communications sent by the app, including revealing all keystrokes being typed by the user. Following our disclosure of these vulnerabilities, Sogou released updated versions of the app that identified all of the issues we disclosed.

240
 
 

Ground-breaking report exposes critical gaps in VC backed firms::Risk of Venture Capital Losses Highlighted By DynaRisk: Cybersecurity Gaps Found in Companies Backed By London's Top VC Funds Of the 5,482 companies analyzed within venture capital portfolios, every single company had detectable cybersecurity issues. 65% (or 3,565 companies) demonstrated 'High' rated risk signals, while 8.6% (equivalent to 470 companies) displayed 'Critical' risk signals. Examples

241
 
 

Extended resume writing guidance for InfoSec professionals::Most people don't know how to write a good cybersecurity resume; it's also easy to write a bad one.

242
 
 

EmploLeaks is an OSINT tool that helps detect members of a company with leaked credentials::Contribute to infobyte/emploleaks development by creating an account on GitHub.

243
2
submitted 2 years ago by L4s to c/secops
 
 

TunnelCrack: Widespread design flaws in VPN clients::We present two widespread design flaws in VPN client. These can be abused to make a victim leak traffic in plaintext outside the protected VPN tunnel.

244
 
 

Downfall attacks (another speculative execution attack on Intel silicon)::Downfall attacks targets a critical weakness found in billions of modern processors used in personal and cloud computers.

245
 
 

Kubernetes Exposed: One Yaml away from Disaster::We found two main misconfigurations in Kubernetes clusters belonging to more than 350 organizations openly accessible and largely unprotected.

246
 
 

Revealing VS Code's Vulnerability: Token Storage is Accessible Across All Extensions::This is the full story of the vulnerability we have discovered within Visual Studio Code (VS Code) concerning the handling of secure token storage. While designed for isolated storage for each extension, this vulnerability presents a high-risk “Token Stealing” attack. A malicious extension could expose third-party application tokens “securely stored” by your VS Code IDE, posing significant risks to entire organizations.

247
 
 

Vulnerable WordPress: Release 2023 July - Plugins:142 Vulns:179::Vulnerable version of WordPress that is provided monthly. - Release 2023 July - Lake Urmia · onhexgroup/Vulnerable-WordPress

248
 
 

Living Off the Land: Reverse Engineering Methodology + Tips & Tricks (Cmdl32 Case Study)::Gain the reverse engineering proficiency needed to find new (undiscovered) 'living off the land' programs in Windows as they exist right now. Plus, how this one went under the radar for over a decade!

249
 
 

New acoustic attack steals data from keystrokes with 95% accuracy::undefined

250
1
submitted 2 years ago by L4s to c/secops
 
 

Burp HTTP history browser (BHHB)::Tool to view HTTP history exported from Burp Suite Community Edition - GitHub - adityatelange/bhhb: Tool to view HTTP history exported from Burp Suite Community Edition

view more: ‹ prev next ›