๐งต
https://x.com/J0R1AN/status/1842139861295169836
https://gist.github.com/JorianWoltjer/b9163fe616319db8fe570b4ef9c02291
Please open Telegram to view this post
VIEW IN TELEGRAM
X (formerly Twitter)
Jorian (@J0R1AN) on X
During a recent CTF, one participant found a particularly interesting solution to my challenge. The goal was to send multiple CSRF requests with SameSite=Lax from 1 visit.
Normally, a form sends you to the page you are posting to and you cannot send anyโฆ
Normally, a form sends you to the page you are posting to and you cannot send anyโฆ
https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/
https://securelist.com/goldenjackal-apt-group/109677/
https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/
Please open Telegram to view this post
VIEW IN TELEGRAM
Ars Technica
Two never-before-seen tools, from same group, infect air-gapped devices
It's hard enough creating one air-gap-jumping tool. GoldenJackal did it 2x in 5 years.
๐ง ByteDance recently terminated an intern for sabotaging an AI model training project within its commercial technology team. The intern was accused of malicious interference, leading to their dismissal in August 2024. Despite reports suggesting significant financial damage, ByteDance clarified that the sabotage did not impact formal commercial projects or their broader AI operations. The company has informed the intern's university and relevant industry bodies. This incident highlights growing concerns around AI security and insider threats in the tech industry.
Please open Telegram to view this post
VIEW IN TELEGRAM
https://ading.dev/blog/posts/chrome_sandbox_escape.html
https://github.com/ading2210/CVE-2024-6778-POC
Please open Telegram to view this post
VIEW IN TELEGRAM
ading.dev
Escaping the Chrome Sandbox Through DevTools
This blog post details how I found CVE-2024-6778 and CVE-2024-5836, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension.
Catch: They used 50 bit integer as their key instead of standard 1024 or 2048 bit keys ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
https://www.forbes.com/sites/daveywinder/2024/11/04/google-claims-world-first-as-ai-finds-0-day-security-vulnerability/
Please open Telegram to view this post
VIEW IN TELEGRAM
Forbes
Google Claims World First As AI Finds 0-Day Security Vulnerability
Googleโs Project Zero hackers and DeepMind boffins have collaborated to uncover a zero-day security vulnerability in real-world code for the first time using AI.
https://sandflysecurity.com/about-us/news/sandfly-5-2-linux-stealth-rootkit-file-and-directory-de-cloaking/
Please open Telegram to view this post
VIEW IN TELEGRAM
Sandfly Security - Agentless Linux EDR and Incident Response
Sandfly 5.2 - Linux Stealth Rootkit File and Directory De-Cloaking
Sandfly 5.2 has new features to de-cloak and detect Linux stealth rootkits.
https://projectdiscovery.io/blog/github-enterprise-saml-authentication-bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
https://dimitrifourny.github.io/2024/11/14/firefox-animation-cve-2024-9680.html
Please open Telegram to view this post
VIEW IN TELEGRAM
dimitrifourny.github.io
Firefox Animation CVE-2024-9680 โ Dimitri Fourny
Personal website and computer security blog.
The current 8-antenna Cometa system offers limited spoofing resistance. A 16-antenna CRPA operating in the L1 band is under development, employing advanced algorithms to enhance spoof resistance. CRPA systems exploit angular discrimination between satellite signals and ground-based jamming by measuring direction and time of arrival.
RTK GNSS integrates satellite and base station data. The base station, connected to a local reference, transmits corrections via mobile networks for precise positioning. Ukrainian networks offering RTK services could potentially be exploited for selective disruptions. Additionally, private RTK systems, such as those used in precision agriculture, may present exploitable vulnerabilities.
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
โก1
https://dozheiny.net/2024/11/15/Reverse-Engineering-Trojan-Telegram-clone.html
Please open Telegram to view this post
VIEW IN TELEGRAM
Iran's Handala hacking group has hacked Israel's highly secure SSV blockchain network, used by Mossad to manage payments to foreign operatives.
Despite blockchain's reputation for being unhackable, Mossad's $1 million bug bounty challenge was bypassed.
8 TB of sensitive data being stolen, including personal details of their operatives.
Please open Telegram to view this post
VIEW IN TELEGRAM
A hack of a nation state by another nation state amid ongoing genocide by Jews of native indigenous population of Palestine ๐ต๐ธ
https://claroty.com/team82/research/from-exploits-to-forensics-unraveling-the-unitronics-attack
Please open Telegram to view this post
VIEW IN TELEGRAM
ESET researchers analyze the first UEFI bootkit designed for Linux systems.
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/
Please open Telegram to view this post
VIEW IN TELEGRAM
Welivesecurity
Bootkitty: Analyzing the first UEFI bootkit for Linux
ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.
๐ฅ2 2โก1๐1๐ฆ1
https://rastamouse.me/udrl-sleepmask-and-beacongate/
Please open Telegram to view this post
VIEW IN TELEGRAM
Rasta Mouse
UDRL, SleepMask, and BeaconGate
I've been looking into Cobalt Strike's UDRL, SleepMask, and BeaconGate features over the last couple of days. It took me some time to understand the relationship between these capabilities, so the aim of this post is to provide a concise overview for thoseโฆ
This media is not supported in the widget
VIEW IN TELEGRAM
๐ฉ8๐4๐1๐คก1