Vulnerabilidad crítica (9.8/10) en F5 (Parchea CVE-2022-1388 YA!)
https://blog.segu-info.com.ar/2022/05/vulnerabilidad-critica-9810-en-f5.html
https://blog.segu-info.com.ar/2022/05/vulnerabilidad-critica-9810-en-f5.html
Vulnerabilidad crítica (10/10) en WSO2 afecta a servicios de banca y salud
https://blog.segu-info.com.ar/2022/05/vulnerabilidad-critica-1010-en-wso2.html
https://blog.segu-info.com.ar/2022/05/vulnerabilidad-critica-1010-en-wso2.html
Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20TelePresence%20Collaboration%20Endpoint%20and%20RoomOS%20Software%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web engine of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow a remote attacker to cause a denial of service (DoS) condition, view sensitive data on an affected device, or redirect users to an attacker-controlled destination.
For more information about these vulnerabilities, see the Details (#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK
Security Impact Rating: Medium
CVE: CVE-2022-20764,CVE-2022-20794
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20TelePresence%20Collaboration%20Endpoint%20and%20RoomOS%20Software%20Vulnerabilities&vs_k=1
Multiple vulnerabilities in the web engine of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow a remote attacker to cause a denial of service (DoS) condition, view sensitive data on an affected device, or redirect users to an attacker-controlled destination.
For more information about these vulnerabilities, see the Details (#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ROS-DOS-X7H7XhkK
Security Impact Rating: Medium
CVE: CVE-2022-20764,CVE-2022-20794
Cisco
Cisco Security Advisory: Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities
Multiple vulnerabilities in the web engine of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow a remote attacker to cause a denial of service (DoS) condition, view sensitive data on an affected device, or redirect…
Buenas a tod@s los nuevos, para aquellos que no saben, este es el canal de Youtube https://youtube.com/c/Anonimo501 que corresponde a este telegram, espero OS guste y pasen por el.
Saludos.
Saludos.
Forwarded from 🔒Seguridad Informática
🎥 "Introduccion a Metodologia de un Pentesting 1" https://youtu.be/9LtdGVslqao
🎥 "Metodologia de un Pentesting 2" https://youtu.be/mY8qTp80WfE
🎥 "Metodologia de un Pentesting 3" https://youtu.be/rw1douRr7fg
🎥 "Metodologia de un Pentesting 4" https://youtu.be/SR7zHW9t3p4
🎥 "Metodologia de un Pentesting 5" https://youtu.be/nyNvYqStbz8
🎥 "Metodologia de un Pentesting 2" https://youtu.be/mY8qTp80WfE
🎥 "Metodologia de un Pentesting 3" https://youtu.be/rw1douRr7fg
🎥 "Metodologia de un Pentesting 4" https://youtu.be/SR7zHW9t3p4
🎥 "Metodologia de un Pentesting 5" https://youtu.be/nyNvYqStbz8
Políticos y entidades gubernamentales en el punto de mira de campaña de phishing pro-rusas https://unaaldia.hispasec.com/2022/05/politicos-y-entidades-gubernamentales-en-el-punto-de-mira-de-campana-de-phishing-pro-rusas.html
Una al Día
Políticos y entidades gubernamentales en el punto de mira de campaña de phishing pro-rusas
Cozy Bear (APT29), autoproclamados abiertamente como pro-rusos, responsable de ciberataques a organizaciones militares y entidades de defensa.
📃 "Buscador web de exploits y herramientas de seguridad" https://derechodelared.com/sploitus-exploits/
🛠 https://sploitus.com/
🛠 https://sploitus.com/
Derecho de la Red
Buscador web de exploits y herramientas de seguridad.
Se trata de un motor de búsqueda basado en la API de Vulners para buscar exploits y herramientas. Nos ofrece, además del exploit, herramientas relacionadas con nuestras búsquedas
¿Cómo Iniciarse en la Seguridad Informática y Hacking Ético?
https://esgeeks.com/iniciarse-hacking-etico/?feed_id=13161&_unique_id=6275e6816c77a
https://esgeeks.com/iniciarse-hacking-etico/?feed_id=13161&_unique_id=6275e6816c77a
EsGeeks
¿Cómo Iniciarse en la Seguridad Informática y Hacking Ético? » EsGeeks
Para aquellos que quieran aprender más sobre el Hacking Ético. Si es tu primera experiencia, o necesitas un repaso, está en el lugar adecuado.
Sophia Script for Windows: The most powerful PowerShell module on GitHub for Windows 10 & Windows 11 fine-tuning and tweaking
https://github.com/farag2/Sophia-Script-for-Windows
https://github.com/farag2/Sophia-Script-for-Windows
GitHub
GitHub - farag2/Sophia-Script-for-Windows: :zap: The most powerful open source tweaker on GitHub for fine-tuning Windows 10 & Windows…
:zap: The most powerful open source tweaker on GitHub for fine-tuning Windows 10 & Windows 11 - farag2/Sophia-Script-for-Windows
Ciberataques persistentes de Rusia a Ucrania
https://blog.segu-info.com.ar/2022/05/ciberataques-persistentes-de-rusia.html
https://blog.segu-info.com.ar/2022/05/ciberataques-persistentes-de-rusia.html
⚙️▶️ Ransomwhe[.]re, la plataforma que hace seguimiento de los rescates de ransomware.
Creado por Jack Cable, Ransomwhere, recopila datos sobre los rescates pagados en los distintos ataques de ransomware.
https://derechodelared.com/ransomwhere-plataforma-pagos-ransomware/
Creado por Jack Cable, Ransomwhere, recopila datos sobre los rescates pagados en los distintos ataques de ransomware.
https://derechodelared.com/ransomwhere-plataforma-pagos-ransomware/
Derecho de la Red
Ransomwhe[.]re, la plataforma que hace seguimiento de los rescates de ransomware.
Creado por Jack Cable, Ransomwhere, recopila datos sobre los rescates pagados en los distintos ataques de ransomware.