🔧 s3n (Search-Scan-Save-Notify)
A tool to scrape online web-content (APIs, RSS Feeds, or Websites) and notify if search term was hit. It is based on PHP.
https://github.com/AamerShah/s3n
Credits: twitter.com/Aamer_Sha
A tool to scrape online web-content (APIs, RSS Feeds, or Websites) and notify if search term was hit. It is based on PHP.
https://github.com/AamerShah/s3n
Credits: twitter.com/Aamer_Sha
GitHub
GitHub - AamerShah/s3n: Search-Scan-Save-Notify
Search-Scan-Save-Notify. Contribute to AamerShah/s3n development by creating an account on GitHub.
Interesting thread on RCE in Ghidra via log4j (CVE-2021-44228)
https://twitter.com/zhuowei/status/1469511822411767811
https://twitter.com/zhuowei/status/1469511822411767811
Twitter
Zhuowei Zhang
I just popped a calc in Ghidra 10.0.2 with a malicious executable: Update to Ghidra 10.1 now! (8450bfbdd21fa01ffdcc35e23be3382e15601b6e1c0b5329ee8f615123ab338d)
Zero-Day: A deep dive into the Israeli 🇮🇱 state sponsored cyber-crime spyware via zero-click iMessage exploit: Remote Code Execution.
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
projectzero.google
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Posted by Ian Beer & Samuel Groß of Google Project Zero We want to thank Citizen Lab ...
Chrome: Site Isolation bypass via NavigationPreloadRequest.
https://bugs.chromium.org/p/project-zero/issues/detail?id=2239
https://bugs.chromium.org/p/project-zero/issues/detail?id=2239
Pegasus vs. Predator as Dissident’s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware from a startup in Macedonia 🇲🇰 an apparent competition with the state sponsored crimeware (lets call it so) of Israel 🇮🇱
A citizen-lab report.
https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/
A citizen-lab report.
https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/
The Citizen Lab
Pegasus vs. Predator
Two Egyptians—exiled politician Ayman Nour and the host of a popular news program (who wishes to remain anonymous)—were hacked with Predator spyware, built and sold by the previously little-known mercenary spyware developer Cytrox. The phone of Ayman Nour…
cKure Red
Trend Micro's Web Based scanner for CVE-2021-44228 aka Log4Shell. log4j-tester.trendmicro.com
YouTube
Log4j Vulnerability (Log4Shell) Explained // CVE-2021-44228
Let's try to make sense of the Log4j vulnerability called Log4Shell. First we look at the Log4j features and JNDI, and then we explore the history of the recent log4shell vulnerability. This is part 1 of a two part series into log4j.
Log4j Issues:
2013:…
Log4j Issues:
2013:…
🔧 Tool: Mariana Trench; a security focused static analysis platform targeting Android.
https://github.com/facebook/mariana-trench
https://github.com/facebook/mariana-trench
GitHub
GitHub - facebook/mariana-trench: A security focused static analysis tool for Android and Java applications.
A security focused static analysis tool for Android and Java applications. - facebook/mariana-trench
Data-Leak: State sponsored Cyber-Crime syndicate from India 🇮🇳 using Tek Fog: An App With BJP (the ruling party); Footprints for Cyber Troops to Automate Hate, Manipulate Trends.
https://thewire.in/tekfog/en/1.html
https://thewire.in/tekfog/en/1.html
An interesting thread on SquirrelWaffle, Qakbot and Emotet using the same C2 servers linked to hundreds of websites from India 🇮🇳
https://twitter.com/1ZRR4H/status/1485413045975330822
https://twitter.com/1ZRR4H/status/1485413045975330822
Twitter
Germán Fernández 🇨🇱
Confirmo, los operadores de #Emotet ocupan el mismo proveedor de Webshells que ocupa TR distribution con #Qakbot o #Squirrelwaffle. Llegué a un listado de 138 sitios comprometidos, 36 ya fueron reportados (Emotet), 102 están próximos a utilizar 👀 IOC's: …
Zero-Day: A vulnerability in Polkit's pkexec component identified as CVE-2021-4034 (PwnKit) is present in the default configuration of all major Linux distributions and can be exploited to gain full root privileges on the system, researchers warn today.
https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/
https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/
Qualys
CVE-2021-4034: How PwnKit Exploits Polkit’s pkexec | Qualys
CVE-2021-4034, a PwnKit vulnerability, lets unprivileged users gain root access via pkexec. Explore its impact and how to mitigate the risk.
CVE-2021-39675, is present in the mobile OS's System component, and can be abused to achieve remote escalation of privilege without the user needing to do anything at all, and "with no additional execution privileges needed," as Google puts it.
https://source.android.com/security/bulletin/2022-02-01
Change management: https://android.googlesource.com/platform/system/nfc/+/fef77a189022aa7ac53136e582a1444b1d2ef5f0%5E%21/#F0
Reference: https://www.theregister.com/2022/02/09/android_security_bulletin/
https://source.android.com/security/bulletin/2022-02-01
Change management: https://android.googlesource.com/platform/system/nfc/+/fef77a189022aa7ac53136e582a1444b1d2ef5f0%5E%21/#F0
Reference: https://www.theregister.com/2022/02/09/android_security_bulletin/
The Register
Critical 'remote escalation' flaw in Android 12 fixed in Feb security patch batch
This is the final software update from Google for the Pixel 3, 3 XL, too
Data-Leak from United States 🇺🇸 as Federal Bureau of Investigation (FBI) revealed that the BlackByte ransomware group has breached the networks of at least three organizations from US critical infrastructure sectors in the last three months.
https://www.cisa.gov/critical-infrastructure-sectors
https://www.bleepingcomputer.com/news/security/fbi-blackbyte-ransomware-breached-us-critical-infrastructure/
https://www.cisa.gov/critical-infrastructure-sectors
https://www.bleepingcomputer.com/news/security/fbi-blackbyte-ransomware-breached-us-critical-infrastructure/