When I think of "watering hole attack targeting cybersecurity/tech professionals" I was ... hoping for something cooler than this. r/cybersecurity found and banned someone targeting our community with #malware today: https://chris.partridge.tech/2023/malware-targeting-cybersecurity-subreddit/
"DavRelayUp: A universal no-fix local privilege escalation in domain-joined windows workstations":
Beyond the good olβ .bashrc entryβ¦ Part 1
https://www.hexacorn.com/blog/2023/09/29/beyond-the-good-ol-bashrc-entry-part-1/
Details and PoC for that WS_FTP 10.0 CVSS vulnerability (CVE-2023-40044):
Exploitation requires an HTTPS POST request.
There are currently more than 550 WS_FTP servers connected to the internet, according to Shodan.
This is very bad!
Dude tracked down the author of sub7, got the source and released it.
https://gitlab.com/illwill/sub7
Alright, which one of you is picking on North Korea?
Today I found out that google docs infects html exports with spyware, no scripts, but links in your document are replaced with invisible google tracking redirects. I was using their software because a friend wanted me to work with him on a google doc, he is a pretty big fan of their software, but we were both somehow absolutely shocked that they would go that far.
nothing wakes you up on a Saturday better than a newly reported critical security vulnerability in #curl ... π©
(which *might* get lowered to just"high" but the burn in my soul is intense nonetheless)
Did you know that #Diaphora detects patch diffing sessions and tries to help finding where vulnerabilities were fixed? Here are some examples for CVE-2020-1350 and CVE-2023-28231.
#patchdiffing #binarydiffing #bindiffing #vulnerabilityresearch #vulndev
This might have slipped under the radar these past few days, but a 9.8 RCE in Exim (on many, many mail servers) that does not require authentication is bad bad bad.
Security advisories should be machine-readable! CISA's advisories for ICS, OT, and medical devices are now available in the Common Security Advisory Framework (CSAF)
The fedi isn't like email. The fedi is like if you accidentally triple booked a bdsm convention, a FSF convention, and a communist workers AGM all in the same german arena
The inevitable has finally happened - someone's used a technique I published to hack a website I made.
0x999 used the single-packet attack to get double points on a hackxor mission and top the leaderboard, then thoughtfully notified me π
Hackxor's leaderboard is stored on a super fast in-memory Redis database located on the same machine, so at least it's a great advert for how the single-packet attack makes tiny race windows exploitable!