Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049) https://breakdev.org/zip-motw-bug-analysis/
BREAKDEV
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)
Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.
Why is Rosetta 2 fast? https://dougallj.wordpress.com/2022/11/09/why-is-rosetta-2-fast/
dougallj
Why is Rosetta 2 fast?
Rosetta 2 is remarkably fast when compared to other x86-on-ARM emulators. I’ve spent a little time looking at how it works, out of idle curiosity, and found it to be quite unusual, so I figur…
Technical analysis of Optus API security challenge - Three must to have API security controls https://discuss.secdim.com/t/technical-analysis-of-optus-api-security-challenge-three-must-to-have-api-security-controls/335
Discuss
Technical analysis of Optus API security challenge - Three must to have API security controls
Tl;dr: Authentication alone could only hide API security weaknesses. Three security controls are required to address the root cause of Optus API secure programming challenge. This article is a technical analysis of nearly 40 submissions that we have received…
[CVE-2022-40303] Integer overflow in xmlParseNameComplex https://gitlab.gnome.org/GNOME/libxml2/-/issues/381
GitLab
[CVE-2022-40303] Integer overflow in xmlParseNameComplex (#381) · Issues · GNOME / libxml2 · GitLab
Libxml2 is vulnerable to an integer overflow in xmlParseNameComplex when an attribute list has a very long name (name is >= 2**32 characters).
Discovering vendor-specific vulnerabilities in Android https://blog.oversecured.com/Discovering-vendor-specific-vulnerabilities-in-Android/
News, Techniques & Guides
Discovering vendor-specific vulnerabilities in Android
For several years, Oversecured has been the best way to discover vulnerabilities in Android and iOS mobile apps.
CVE-2022-45063: xterm <375 code execution via font ops https://www.openwall.com/lists/oss-security/2022/11/10/1
swicc: A framework for creating smart cards (ICC-based cards with contacts) https://github.com/tomasz-lisowski/swicc
GitHub
GitHub - tomasz-lisowski/swicc: A framework for creating smart cards (ICC-based cards with contacts).
A framework for creating smart cards (ICC-based cards with contacts). - tomasz-lisowski/swicc
Reverse Engineering the Apple MultiPeer Connectivity Framework https://www.evilsocket.net/2022/10/20/Reverse-Engineering-the-Apple-MultiPeer-Connectivity-Framework/
evilsocket
Reverse Engineering the Apple MultiPeer Connectivity Framework
Some time ago I was using Logic Pro to record some of my music and I needed a way to start and stop the recording from an iPhone, so I found about Logic Remote
A Technical Analysis of Royal Ransomware https://securityscorecard.pathfactory.com/research/the-royal-ransomware
Security Scorecard
A Technical Analysis Of The Royal Ransomware
This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad…
A good book on the maths you need to know for Machine Learning https://www.cis.upenn.edu/~jean/math-deep.pdf
Encrypting Shellcode using SystemFunction032/033 https://osandamalith.com/2022/11/10/encrypting-shellcode-using-systemfunction032-033/
🔐Blog of Osanda
Encrypting Shellcode using SystemFunction032/033 | 🔐Blog of Osanda
After a while, I’m publishing a blog post which made me interested. With the recent tweets about the undocumented SystemFunction032 Win32 API function, I decided to quickly have a look at it.…
What can we learn from leaked Insyde's BIOS for Intel Alder Lake https://hardenedvault.net/blog/2022-10-08-alderlake_fw-leak/
hardenedvault.net
What can we learn from leaked Insyde's BIOS for Intel Alder Lake
Leaked story timeline According to the timestamp of the github repository, an unidentified user uploaded the Insyde’s partial firmware solution (4.
A Kernel Hacker Meets Fuchsia OS https://a13xp0p0v.github.io/2022/05/24/pwn-fuchsia.html
Alexander Popov
A Kernel Hacker Meets Fuchsia OS
Fuchsia is a general-purpose open-source operating system created by Google. It is based on the Zircon microkernel written in C++ and is currently under active development. The developers say that Fuchsia is designed with a focus on security, updatability…
Exploiting Wi-Fi Stack on Tesla Model S https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/
Keen Security Lab Blog
Exploiting Wi-Fi Stack on Tesla Model S
In the past two years, Keen Security Lab did in-depth research on the security of Tesla Cars and presented our research results on Black Hat 2017 and Black Hat 2018. Our research involves many in-veh
Decentralized Identity Attack Surface – Part 1 https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-1
Cyberark
Decentralized Identity Attack Surface – Part 1
Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with this question for years. Who are you in cyberspace? Your digital identity is comprised of...
Techniques In Email Forensic Analysis https://digitalinvestigator.blogspot.com/2022/11/techniques-in-email-forensic-analysis.html
Digital Investigator
Techniques In Email Forensic Analysis
This post attempts to illustrate email architecture
from a forensics perspective. It further describes techniques employed in email forensic analysis
from a forensics perspective. It further describes techniques employed in email forensic analysis
P2723R0 Zero-initialize objects of automatic storage duration https://isocpp.org/files/papers/P2723R0.html
A Deep Dive on AWS KMS Key Access and AWS Key Grants https://www.cloudquery.io/blog/aws-kms-key-grants-deep-dive
CloudQuery
A Deep Dive on AWS KMS Key Access and AWS Key Grants | CloudQuery
A Technical Deep Dive on AWS KMS Key Access and AWS Key Grants.
Gregor Samsa: Exploiting Java's XML Signature Verification https://googleprojectzero.blogspot.com/2022/11/gregor-samsa-exploiting-java-xml.html
Blogspot
Gregor Samsa: Exploiting Java's XML Signature Verification
By Felix Wilhelm, Project Zero Earlier this year, I discovered a surprising attack surface hidden deep inside Java’s standard library: A cus...
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures https://www.rapid7.com/blog/post/2022/11/16/cve-2022-41622-and-cve-2022-41800-fixed-f5-big-ip-and-icontrol-rest-vulnerabilities-and-exposures/
Rapid7
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures | Rapid7 Blog