Security Operations

570 readers
1 users here now

A place for all things Cyber Security, from questions, rants, and stories, to the latest attacks, vulnerabilities, and zero days.

founded 1 year ago
MODERATORS
L3s
101
 
 

The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets::Aqua Nautilus researchers found exposed Kubernetes secrets that pose a critical threat of supply chain attack to hundreds of organizations and OSS.

102
 
 

OMGCICD - Attacking GitLab CI/CD via Shared Runners::This article discusses compromising shared CI/CD runner infrastructure, and how an attacker can escalate their privileges from basic source-repository access...

103
 
 

Enriched Trivy database with Vulners data released and free for all::Contribute to vulnersCom/trivy-plugin-vulners-db development by creating an account on GitHub.

104
 
 

Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)::We took a look at the security of the most popular code editor, Visual Studio Code! This blog post covers vulnerabilities our researchers discovered in third-party extensions.

105
 
 

DIALStranger: my research about DIAL protocol vulnerabilities is public after 4 years::details about DIAL protocol vulnerabilities . Contribute to yunuscadirci/DIALStranger development by creating an account on GitHub.

106
 
 

CrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain::Zero-day vulnerabilities chain in CrushFTP (CVE-20-23-43177) uncovered by Converge Red Team requires immediate attention with these remediation steps.

107
 
 

Ransomware group breaches company, reports them to SEC for failure to disclose::undefined

108
 
 

Reptar: an Intel Ice Lake CPU vulnerability, by Tavis Ormandy::undefined

109
 
 

Nothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification and how it affected open source projects::Python’s e-mail libraries smtplib, imaplib, and poplib do not verify server certificates unless a proper SSL context is passed to the API. This leads to security problems.

110
 
 

CVE Watcher: Hunting Down CVEs Before the Patch Drops::Contribute to Aqua-Nautilus/CVE-Half-Day-Watcher development by creating an account on GitHub.

111
 
 

One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability::undefined

112
 
 

BlueNoroff strikes again with new macOS malware::Newly discovered later-stage malware from BlueNoroff APT group targets macOS with characteristics similar to their RustBucket campaign.

113
 
 

AOL's 92M records database leak in 2003 - A Retroactive Examination::Author : pad, x.com/123456 Introducing eGod – Internet Entrepreneur, Reformed Spam Cartel I recently chatted with my friend James a/k/a eGod and discussed the unprecedented 2003 AOL database leak. He has never been identified or associated with the leak until now. eGod is who quietly convinced the…

114
 
 

AWS IoT Core: A Compromised Device Perspective::undefined

115
 
 

Send Bluetooth LE Spam impersonating 219 devices just using Android app instead of Flipper Zero::The Kitchen Sink is a name of Bluetooth Low Energy (BLE) attack that sends random advertisement packets that targets iOS, Android, and Windows devices the same time in the vicinity. The attack is called “Kitchen Sink” because it tries to send every possible packet in the list, similar to the phrase “everything but the kitchen

116
 
 

50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosures::Nautilus researchers evaluated the disclosure process of open-source projects and found flaws that allowed harvesting the vulnerabilities before patched

117
 
 

When a vulnerability disclosure doesn't go how you expect.::You're out for a stroll and spot a house with its front door wide open. Out of concern, you try to inform the owner about the door. Unexpectedly, the owner snaps back, insisting the door is shut. This is a story about the worst vulnerability disclosure process I've ever experienced.

118
 
 

Your printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE 戴夫寇爾::We identified Pre-auth RCE vulnerabilities in Canon printers (CVE-2023-0853, CVE-2023-0854) and also discovered Pre-auth RCE flaws in HP printers, which led to our achievement of the Master of Pwn title at Pwn2Own Toronto 2022. This article will detail the vulnerabilities and exploitation methods for both Canon and HP printers.

119
 
 

Smashing the TLB for fun and profit - ekoparty 2023::undefined

120
 
 

Keylogger keyboard leaks passwords via Apple's "Find My" location network::Originally, it is supposed to help track down lost things. However, our keylogger keyboard uses Apple's "Find My" location network to send sensitive data.

121
 
 

Dozens of npm Packages Caught Attempting to Deploy Reverse Shell::On October 27, Phylum’s automated risk detection platform began alerting us to a series of suspicious publications on npm. Over the course of the following few days, we discovered a campaign involving at least 48 different publications. These packages, deceptively named to appear legitimate, contained obfuscated JavaScript designed to

122
 
 

Security Researchers from Salt-Security explain in a super detailed post how they did account takeover on Grammarly.com, Booking.com, Expo.io, Codecademy.com, Vidio.com, Bukalapak.com, and 100+ Oth...::It’s extremely important to make sure your OAuth implementation is secure. The fix is just one line of code away. We sincerely hope the information shared in our blog post series will help prevent major online breaches and help web service owners better protect their customers and users.

123
 
 

Free and open-source approach to Domain Monitoring.::We guard your domain, so you have peace of mind. Threat Visibility Platform.

124
5
submitted 1 year ago by L4s to c/secops
 
 

Official release of CVSS v4.0::Attached: 1 image

The CVSS Special Interest Group is proud to announce the official release of CVSS v4.0. This latest release marks a significant step forward with added capabilities crucial for teams with the importance of using threat intelligence and environmental metrics for accurate scoring at its core.

Critical in the interface between supplier and consumer, CVSS provides a way to capture the principal characteristics of a security vulnerability and produces a numerical score reflecting its technical severity to inform and provide guidance to businesses, service providers, government, and the public.

The numerical score can be represented as a qualitative severity rating (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes and prepare defenses against cyber-attacks.

Furthermore, this system allows the consumer to also assess real-time threat and impact, arming them with vital information to help to defend themselves against an attack.

The Common Vulnerability Scoring System is a published standard used by organizations worldwide, and this latest version of CVSS 4.0 seeks to provide the highest fidelity of vulnerability assessment for both industry and the public.

More can be found here: https://first.org/cvss

#FIRSTdotOrg #CVSS #BuildingTrust #PSIRT #CSIRT

125
 
 

Critical phpFox RCE Vulnerability Risked Social Networks::All phpFox users must update to the version 4.8.14 to receive the fix for critical PHP object injection and code execution vulnerability.

view more: ‹ prev next ›