MVT: Análisis Forense de los Dispositivos Móviles
https://esgeeks.com/mvt-analisis-forense-android-ios/?feed_id=12940&_unique_id=624d776674f37
https://esgeeks.com/mvt-analisis-forense-android-ios/?feed_id=12940&_unique_id=624d776674f37
EsGeeks
MVT: Análisis Forense de los Dispositivos Móviles » EsGeeks
MVT (Mobile Verification Toolkit) ayuda a realizar análisis forenses de dispositivos móviles para encontrar signos de un posible compromiso.
Comunidad Pen7esting
https://www.youtube.com/c/sha16/videos
Sha 16, canal de hacking 👍👍
⚔️▶️ Putin legaliza la piratería por las sanciones y la fuga de empresas
No habrá penas para infractores. Aplica a videojuegos, música o software.
https://www.clarin.com/tecnologia/guerra-rusia-ucrania-putin-legaliza-pirateria-sanciones-fuga-empresas_0_pNSWwpBPOV.html
No habrá penas para infractores. Aplica a videojuegos, música o software.
https://www.clarin.com/tecnologia/guerra-rusia-ucrania-putin-legaliza-pirateria-sanciones-fuga-empresas_0_pNSWwpBPOV.html
Clarín
Guerra Rusia-Ucrania: Putin legaliza la piratería por las sanciones y la fuga de empresas
No habrá penas para infractores. Aplica a videojuegos, música o software.
VMSA-2022-0012
CVSSv3 Range: 7.3
Issue Date: 2022-04-06
CVE(s): CVE-2022-22962, CVE-2022-22964
Synopsis:
VMware Horizon Client for Linux update addresses multiple vulnerabilities (CVE-2022-22962, CVE-2022-22964)
Impacted Products
VMware Horizon Client for Linux
https://www.vmware.com/security/advisories/VMSA-2022-0012.html
CVSSv3 Range: 7.3
Issue Date: 2022-04-06
CVE(s): CVE-2022-22962, CVE-2022-22964
Synopsis:
VMware Horizon Client for Linux update addresses multiple vulnerabilities (CVE-2022-22962, CVE-2022-22964)
Impacted Products
VMware Horizon Client for Linux
https://www.vmware.com/security/advisories/VMSA-2022-0012.html
VMware
VMSA-2022-0012.1
VMware Horizon Agent for Linux update addresses multiple vulnerabilities (CVE-2022-22962, CVE-2022-22964)
Quien guste puede pasarse por el servidor de Discord de Black0ut.
PD: Anonimo501 te espero ahí 😐✌️
https://discord.gg/JSAW5nTMDB
PD: Anonimo501 te espero ahí 😐✌️
https://discord.gg/JSAW5nTMDB
Discord
Join the Black0ut Discord Server!
Check out the Black0ut community on Discord - hang out with 160 other members and enjoy free voice and text chat.
Phishing campaign targets Russian govt dissidents with Cobalt Strike
https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-russian-govt-dissidents-with-cobalt-strike/
https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-russian-govt-dissidents-with-cobalt-strike/
BleepingComputer
Phishing campaign targets Russian govt dissidents with Cobalt Strike
A new spear phishing campaign is taking place in Russia targeting dissenters with opposing views to those promoted by the state and national media about the war against Ukraine.
[remote] Opmon 9.11 - Cross-site Scripting
Opmon 9.11 - Cross-site Scripting
https://www.exploit-db.com/exploits/50857
Opmon 9.11 - Cross-site Scripting
https://www.exploit-db.com/exploits/50857
Exploit Database
Opmon 9.11 - Cross-site Scripting
Opmon 9.11 - Cross-site Scripting. CVE-2021-43009 . remote exploit for Multiple platform
Forwarded from Bitácora Crackslatinos [Canal]
Creacion de Exploits desde Cero
Un exploit es cualquier ataque que aprovecha las vulnerabilidades de las aplicaciones, las redes, los sistemas operativos o el hardware. Por lo general, los exploits toman la forma de un programa de software o una secuencia de código previsto para hacerse con el control de los ordenadores o robar datos de red.
Un exploit es cualquier ataque que aprovecha las vulnerabilidades de las aplicaciones, las redes, los sistemas operativos o el hardware. Por lo general, los exploits toman la forma de un programa de software o una secuencia de código previsto para hacerse con el control de los ordenadores o robar datos de red.
Forwarded from Bitácora Crackslatinos [Canal]
Creacion de Exploits Desde 0.zip
10.9 MB
🛡▶️ Un ciberataque ruso retrasa el pago a dos millones de parados en España
Una intrusión en los sistemas del SEPE ha bloqueado los ficheros que se envían a los bancos para el abono de las nóminas. El CNI envió una alerta hace un mes y el incidente ha provocado el retraso en el pago del paro de marzo.
https://www.elconfidencialdigital.com/articulo/politica/confirmados-temores-gobierno-ciberataque-ruso-retrasa-pago-millones-parados/20220406172552377670.html
Una intrusión en los sistemas del SEPE ha bloqueado los ficheros que se envían a los bancos para el abono de las nóminas. El CNI envió una alerta hace un mes y el incidente ha provocado el retraso en el pago del paro de marzo.
https://www.elconfidencialdigital.com/articulo/politica/confirmados-temores-gobierno-ciberataque-ruso-retrasa-pago-millones-parados/20220406172552377670.html
Confidencial Digital
Confirmados los temores del Gobierno: un ciberataque ruso retrasa el pago a dos millones de parados
Los temores del Gobierno se han cumplido. Hace un mes, Moncloa recibió una alert...
Metasploitable v3, un entorno para aprender hacking ético
https://blog.segu-info.com.ar/2022/04/metasploitable-v3-un-entorno-para.html
https://blog.segu-info.com.ar/2022/04/metasploitable-v3-un-entorno-para.html
Cisco Web Security Appliance Filter Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Web%20Security%20Appliance%20Filter%20Bypass%20Vulnerability&vs_k=1
A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device.
This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X
Security Impact Rating: Medium
CVE: CVE-2022-20784
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Web%20Security%20Appliance%20Filter%20Bypass%20Vulnerability&vs_k=1
A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device.
This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-filter-bypass-XXXTU3X
Security Impact Rating: Medium
CVE: CVE-2022-20784
Cisco
Cisco Security Advisory: Cisco Web Security Appliance Filter Bypass Vulnerability
A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected…
⚙️ "Manual uso htop: monitoriza recursos servidor en tiempo real" https://blog.elhacker.net/2022/01/top-sustituye-htop-y-monitoriza-procesos-recursos-servidores-linux-tiempo-real.html
Blog elhacker.NET
Manual uso htop: monitoriza recursos servidor en tiempo real
Blog sobre informática, tecnología y seguridad con manuales, tutoriales y documentación sobre herramientas y programas
VMSA-2022-0010.4
CVSSv3 Range: 9.8
Issue Date: 2022-04-02
Updated On: 2022-04-08
CVE(s): CVE-2022-22965
Synopsis:
VMware Response to Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965)
Impacted Products
VMware Tanzu Application Service for VMs (TAS)
VMware Tanzu Operations Manager (Ops Manager)
VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)
https://www.vmware.com/security/advisories/VMSA-2022-0010.html
CVSSv3 Range: 9.8
Issue Date: 2022-04-02
Updated On: 2022-04-08
CVE(s): CVE-2022-22965
Synopsis:
VMware Response to Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965)
Impacted Products
VMware Tanzu Application Service for VMs (TAS)
VMware Tanzu Operations Manager (Ops Manager)
VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)
https://www.vmware.com/security/advisories/VMSA-2022-0010.html
📃 "5 señales de que su identidad ha sido robada" https://www.welivesecurity.com/la-es/2022/01/25/senales-identidad-ha-sido-robada/
WeLiveSecurity
5 señales de que su identidad ha sido robada
Al detectar tempranamente las señales de advertencia que indican que ha sido víctima de robo de identidad, podrá minimizar el impacto que esto puede tener.