Posts
2355
Following
513
Followers
1232
A drunken debugger

Heretek of Silent Signal
#music #techno
Show content
*Finally* a fresh set from this lady!

https://www.youtube.com/watch?v=9hfu8DrfGxo
0
0
0
repeated
Edited 4 months ago

Microsoft out-of-band zero-day: CVE-2024-30060 - Security Update Guide
CVE-2024-30060 (7.8 high, disclosed 16 May 2024 by Microsoft) Azure Monitor Agent Elevation of Privilege Vulnerability with CWE-59: Improper Link Resolution Before File Access ('Link Following')
Is marked publicly disclosed, but Not Exploited, Exploitation LESS likely.

What privileges could be gained by an attacker who successfully exploited this vulnerability?
An authenticated attacker would be able to delete targeted files on a system which could result in them gaining SYSTEM privileges.

What actions do customers need to take to protect themselves from this vulnerability?
We released CVE-2024-30060 to help keep customers protected. Customers who have installed the latest updates, or have automatic updates enabled, are already protected. Customers who have disabled Automatic Extension Upgrades or would like to upgrade an extension immediately must manually update their Azure Monitor Agent to the latest version. For more information on how to perform a manual update, see Manage Azure Monitor Agent.

cc: @serghei @campuscodi @mttaggart @GossiTheDog

0
3
0
I *am* cheating but also really proud of this one :)

#IBMi
0
0
0
repeated

Infrastructure used to maintain and distribute the Linux operating system kernel was infected for two years, starting in 2009, by sophisticated malware that managed to get a hold of one of the developers’ most closely guarded resources: the /etc/shadow files that stored encrypted password data for more than 550 system users, researchers said Tuesday.

The unknown attackers behind the compromise infected at least four servers inside kernel.org, the Internet domain underpinning the sprawling Linux development and distribution network, the researchers from security firm ESET said. After obtaining the cryptographic hashes for 551 user accounts on the network, the attackers were able to convert half into plaintext passwords, likely through password-cracking techniques and the use of an advanced credential-stealing feature built into the malware. From there, the attackers used the servers to send spam and carry out other nefarious activities. The four servers were likely infected and disinfected at different times, with the last two being remediated at some point in 2011.

An infection of kernel.org came to light in 2011, when kernel maintainers revealed that 448 accounts had been compromised after attackers had somehow managed to gain unfettered, or “root,” system access to servers connected to the domain. Maintainers reneged on a promise to provide an autopsy of the hack, a decision that has limited the public’s understanding of the incident.

In 2014, ESET researchers said the 2011 attack likely infected kernel.org servers with a second piece of malware they called Ebury. The malware, the firm said, came in the form of a malicious code library that, when installed, created a backdoor in OpenSSH that provided the attackers with a remote root shell on infected hosts with no valid password required. In a little less than 22 months, starting in August 2011, Ebury spread to 25,000 servers. Besides the four belonging to the Linux Kernel Organization, the infection also touched one or more servers inside hosting facilities and an unnamed domain registrar and web hosting provider.

A 47-page report summarizing Ebury's 15-year history said that the infection hitting the kernel.org network began in 2009, two years earlier than the domain was previously thought to have been compromised. The report said that since 2009, the OpenSSH-dwelling malware has infected more than 400,000 servers, all running Linux except for about 400 FreeBSD servers, a dozen OpenBSD and SunOS servers, and at least one Mac.

https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/

4
22
0
repeated

2020: Microsoft sets goal to be carbon negative by end of the decade.

2023: Microsoft's emissions are 30% higher than in 2020.

Main cause? The relentless push to meet AI demand, which requires new data centers built out of carbon-intensive steel, cement, chips.
https://www.bloomberg.com/news/articles/2024-05-15/microsoft-s-ai-investment-imperils-climate-goal-as-emissions-jump-30

11
20
1
repeated

Hey! I’m reviving my long-dormant , “The Shellsharks Podcast”. Exciting right?! In addition to the usual topics, i.e. "Infosec, Technology & Life", I'd like to spotlight awesome people from the community here on the and discuss and topics. If that sounds cool or interesting, check out show page on my site where you can learn more.

https://shellsharks.com/podcast

Oh and the show is now on the Fediverse, powered by . Follow @ShellsharksPodcast

1
1
0
#LazyWeb Can you recommend a good overview on the technical implementation of SMB signatures?
1
1
0
repeated
New assessment for topic: CVE-2024-22026

Topic description: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem ..."

"CVE-2024-22026 is a local privilege escalation vulnerability in Ivanti EPMM (formerly MobileIron) server versions prior to 12.1.0.0, 12.0.0.0, and 11.12.0.1 ..."

Link: https://attackerkb.com/assessments/7f7b046e-eae8-4ef0-940e-eb49334c203e
0
1
1
I just realized the #Hungarian word "elszaródik" have likely been around much longer than "enshittification", meaning the same thing (usually in non-tech context though)
2
0
6
repeated

bert hubert 🇺🇦🇪🇺

Yesterday I presented at the NL-NCSC / @SURF / @ACCSS symposium "Cyber Security & Society". According to Donald Tusk we are entering a new pre-war era, and I fear that he is right. I also fear that we do not have anything near a "war-time resilient" level of control over the IT infrastructures that our societies depend on utterly. We are sitting ducks & it is getting worse. Transcribed presentation, with slides, is here:
https://berthub.eu/articles/posts/cyber-security-pre-war-reality-check/

1
9
0
"imagine that the government decided to drop the hammer on information security earlier on, perhaps circa 2000. Would it have been good if we enshrined the prevailing security sensibilities and engineering practices of the era in law?" - @lcamtuf

https://lcamtuf.substack.com/p/im-not-cheerleading-for-the-cisa
0
1
1
Edited 4 months ago
Inside a low budget consumer hardware espionage implant - Analysis of the S8 data line locator

https://ha.cking.ch/s8_data_line_locator/
0
0
1
[RSS] SSD Advisory – D-Link DIR-X4860 Security Vulnerabilities

https://ssd-disclosure.com/ssd-advisory-d-link-dir-x4860-security-vulnerabilities/
0
0
0
NewJeans’ Hyper-V Part 7 - CVE-2023-36407 Analysis & Exploitation [KR]

https://hackyboiz.github.io/2024/05/12/pwndorei/newjeans-hyper-v-pt7/?s=09
0
0
1
repeated

Hey folks!

I'm the creator of Python @pillow & today is my birthday. Can I ask you for a favor?

I'm looking for a new role & I'd appreciate a boost. Check out my resume here:

- https://aclark.net/resume/

I'm passionate about Python, open source & making a living with open source. What's the next move?

Thank you @willmcgugan for the nudge ❤️

3
13
0
I rarely feel as connected to a person as I felt today looking in the eye of the guy blasting Blood for Blood from his car
1
0
0
Show older