Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
​​🎓 "DFIR - Digital Forensic & Incident Response" https://www.hackbysecurity.com/curso/1-formacion/9-digital-forensic-incident-response

Hack By Security (https://www.hackbysecurity.com/) ofrece un descuento del 20% exclusivo para los suscriptores de @seguridadinformatic4
Utiliza el cupón seginfo20
CVE-2021-34682

Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.

📖 Read

via "National Vulnerability Database".
ExploitDB Just tweeted ****************************************** [local] Tftpd64 4.64 - 'Tftpd32_svc' Unquoted Service Path https://t.co/IyJkYWoeKc
«Terminal», es un juego que simula un ciberataque a un aeropuerto

Proteger aeropuerto evitando que los atacantes interrumpan la actividad normal
- Acto I: El analista
- Acto II: El mánager
- Acto III: El ejecutivo

https://derechodelared.com/terminal-el-juego-que-simula-un-ciberataque-a-un-aeropuerto/
Apple corrige 2 Zero-Day urgentes explotados In-the-Wild
https://blog.segu-info.com.ar/2021/06/apple-corrige-2-zero-day-urgentes.html
OTAN: la repetición de ciberataques podría equipararse a un ataque armado.

La OTAN va a la tratar los ciberataques «caso por caso» y puede considerarlos como un ataque armado e invocar el artículo 5 del Tratado del Atlántico Norte de 1949.

▶️ https://derechodelared.com/otan-la-repeticion-de-ciberataques-podria-equipararse-a-un-ataque-armado/
Cisco Jabber and Webex Client Software Shared File Manipulation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Jabber%20and%20Webex%20Client%20Software%20Shared%20File%20Manipulation%20Vulnerability&vs_k=1

A vulnerability in Cisco Jabber and Cisco Webex (formerly Teams) could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface.
The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99



Security Impact Rating: Medium



CVE: CVE-2021-1242