Vulnerability write-up - "Dangerous assumptions".
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space level of pages, and how the GitHub Security Lab used the kernel space information leak to construct a KASLR bypass.
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
The GitHub Blog
The code that wasn't there: Reading memory on an Android device by accident
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space…
Tool that could notify you when your hacking tools finish running.
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Email
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
GitHub
GitHub - projectdiscovery/notify: Notify is a Go-based assistance package that enables you to stream the output of several tools…
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms. - projectdiscovery/notify
Remote Code Execution via Prototype Pollution in Blitz.js.
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
Sonarsource
Remote Code Execution via Prototype Pollution in Blitz.js
We recently discovered a Prototype Pollution vulnerability in Blitz.js leading to Remote Code Execution. Learn about this bug class and how to avoid it in your code!
Microsoft Word Zero-Day (CVE-2023-21716) PoC goes public.
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
Help Net Security
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
A PoC for CVE-2023-21716, a RCE vulnerability in Microsoft Word that can be exploited via a malicious RTF document, is publicly available.
DataSurgeon: Tool to extract IP's, email addresses, hashes, files, credit cards, social security numbers and more from text.
https://github.com/Drew-Alleman/DataSurgeon
https://github.com/Drew-Alleman/DataSurgeon
GitHub
GitHub - Drew-Alleman/DataSurgeon: Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers…
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text - Drew-Alleman/DataSurgeon
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’.
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
NY Times
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’
This is the first time a paper trail has emerged to prove definitively that the Mexican military spied on citizens who were trying to expose its misdeeds.
CVE-2022-42475 | Zero-Day: Heap overflow in Fortinet's SSLVPN PoC. This PoC has hardcoded valid which change from system to system.
https://github.com/scrt/cve-2022-42475
https://github.com/scrt/cve-2022-42475
GitHub
GitHub - scrt/cve-2022-42475: POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon
POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon - scrt/cve-2022-42475
■■■■□ Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets.
https://www.bleepingcomputer.com/news/security/google-finds-18-zero-day-vulnerabilities-in-samsung-exynos-chipsets/
https://www.bleepingcomputer.com/news/security/google-finds-18-zero-day-vulnerabilities-in-samsung-exynos-chipsets/
BleepingComputer
Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets
Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung's Exynos chipsets used in mobile devices, wearables, and cars.
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation.
https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
Google Cloud Blog
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation | Google Cloud Blog
A suspected Chinese actor used a zero-day vulnerability in FortiOS and multiple custom malware families as part of an espionage campaign.
aCropalypse vulnerability can recover sensitive information previously removed from Pixel screenshots.
https://www.xda-developers.com/acropalypse-vulnerability/
https://www.xda-developers.com/acropalypse-vulnerability/
XDA
aCropalypse vulnerability can recover sensitive information previously removed from Pixel screenshots
A newly revealed vulnerability could reveal previously redacted details from screenshots if the edits were made using a Pixel device.
Technical summary of breaking into Breach-Forums by FBI.
Apparently, Conor was using his personal internet connection to operate the darknet platform and apparently did not use TOR/VPN once in 2022 due to connection failure or forgetfulness. This IP led FBI to him.
It also seems that the FBI had access to the logs of the server somehow. Likely a Zero-day in the web component.
https://www.bleepingcomputer.com/news/security/fbi-confirms-access-to-breached-cybercrime-forum-database/
Apparently, Conor was using his personal internet connection to operate the darknet platform and apparently did not use TOR/VPN once in 2022 due to connection failure or forgetfulness. This IP led FBI to him.
It also seems that the FBI had access to the logs of the server somehow. Likely a Zero-day in the web component.
https://www.bleepingcomputer.com/news/security/fbi-confirms-access-to-breached-cybercrime-forum-database/
BleepingComputer
FBI confirms access to Breached cybercrime forum database
Today, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after the U.S. Justice Department also officially announced the arrest of its owner
● An Android app from China executed a zero-day exploit on millions of devices.
Fast-growing e-commerce app Pinduoduo had an EvilParcel stow-away.
https://github-com.translate.goog/davinci1010/pinduoduo_backdoor
https://mp-weixin-qq-com.translate.goog/s/P_EYQxOEupqdU0BJMRqWsw
https://techcrunch.com/2023/03/20/google-flags-apps-made-by-popular-chinese-e-commerce-giant-as-malware/
https://arstechnica.com/information-technology/2023/03/android-app-from-china-executed-0-day-exploit-on-millions-of-devices/
Fast-growing e-commerce app Pinduoduo had an EvilParcel stow-away.
https://github-com.translate.goog/davinci1010/pinduoduo_backdoor
https://mp-weixin-qq-com.translate.goog/s/P_EYQxOEupqdU0BJMRqWsw
https://techcrunch.com/2023/03/20/google-flags-apps-made-by-popular-chinese-e-commerce-giant-as-malware/
https://arstechnica.com/information-technology/2023/03/android-app-from-china-executed-0-day-exploit-on-millions-of-devices/
TechCrunch
Google flags apps made by popular Chinese e-commerce giant as malware
Google has flagged several apps made by a Chinese e-commerce giant as malware, alerting users who had them installed, and suspended the company’s official app.
Wire-Tap by the Greece government on journalists and opposition parliamentarians by former PM after they used predator and other spyware softwares against civilians by botched law changes and legal loopholes.
https://youtu.be/SpitB6p7-W4
https://youtu.be/SpitB6p7-W4
YouTube
Greece’s spyware scandal | The Listening Post
Greece is facing an ongoing surveillance scandal after it was revealed that several journalists had their phones hacked by spyware employed for surveillance by the Greek intelligence service. While a scandal of this magnitude should typically attract the…