A Technical Analysis of Royal Ransomware https://securityscorecard.pathfactory.com/research/the-royal-ransomware
Security Scorecard
A Technical Analysis Of The Royal Ransomware
This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad…
A good book on the maths you need to know for Machine Learning https://www.cis.upenn.edu/~jean/math-deep.pdf
Encrypting Shellcode using SystemFunction032/033 https://osandamalith.com/2022/11/10/encrypting-shellcode-using-systemfunction032-033/
🔐Blog of Osanda
Encrypting Shellcode using SystemFunction032/033 | 🔐Blog of Osanda
After a while, I’m publishing a blog post which made me interested. With the recent tweets about the undocumented SystemFunction032 Win32 API function, I decided to quickly have a look at it.…
What can we learn from leaked Insyde's BIOS for Intel Alder Lake https://hardenedvault.net/blog/2022-10-08-alderlake_fw-leak/
hardenedvault.net
What can we learn from leaked Insyde's BIOS for Intel Alder Lake
Leaked story timeline According to the timestamp of the github repository, an unidentified user uploaded the Insyde’s partial firmware solution (4.
A Kernel Hacker Meets Fuchsia OS https://a13xp0p0v.github.io/2022/05/24/pwn-fuchsia.html
Alexander Popov
A Kernel Hacker Meets Fuchsia OS
Fuchsia is a general-purpose open-source operating system created by Google. It is based on the Zircon microkernel written in C++ and is currently under active development. The developers say that Fuchsia is designed with a focus on security, updatability…
Exploiting Wi-Fi Stack on Tesla Model S https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/
Keen Security Lab Blog
Exploiting Wi-Fi Stack on Tesla Model S
In the past two years, Keen Security Lab did in-depth research on the security of Tesla Cars and presented our research results on Black Hat 2017 and Black Hat 2018. Our research involves many in-veh
Decentralized Identity Attack Surface – Part 1 https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-1
Cyberark
Decentralized Identity Attack Surface – Part 1
Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with this question for years. Who are you in cyberspace? Your digital identity is comprised of...
Techniques In Email Forensic Analysis https://digitalinvestigator.blogspot.com/2022/11/techniques-in-email-forensic-analysis.html
Digital Investigator
Techniques In Email Forensic Analysis
This post attempts to illustrate email architecture
from a forensics perspective. It further describes techniques employed in email forensic analysis
from a forensics perspective. It further describes techniques employed in email forensic analysis
P2723R0 Zero-initialize objects of automatic storage duration https://isocpp.org/files/papers/P2723R0.html
A Deep Dive on AWS KMS Key Access and AWS Key Grants https://www.cloudquery.io/blog/aws-kms-key-grants-deep-dive
CloudQuery
A Deep Dive on AWS KMS Key Access and AWS Key Grants | CloudQuery
A Technical Deep Dive on AWS KMS Key Access and AWS Key Grants.
Gregor Samsa: Exploiting Java's XML Signature Verification https://googleprojectzero.blogspot.com/2022/11/gregor-samsa-exploiting-java-xml.html
Blogspot
Gregor Samsa: Exploiting Java's XML Signature Verification
By Felix Wilhelm, Project Zero Earlier this year, I discovered a surprising attack surface hidden deep inside Java’s standard library: A cus...
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures https://www.rapid7.com/blog/post/2022/11/16/cve-2022-41622-and-cve-2022-41800-fixed-f5-big-ip-and-icontrol-rest-vulnerabilities-and-exposures/
Rapid7
CVE-2022-41622 and CVE-2022-41800 (FIXED): F5 BIG-IP and iControl REST Vulnerabilities and Exposures | Rapid7 Blog
Dark Web Price Index 2022 https://www.privacyaffairs.com/dark-web-price-index-2022/ good plot here » https://www.visualcapitalist.com/wp-content/uploads/2022/11/Charted-The-Dark-Web-Price-Index-2022-Full.html
Privacy Affairs
Dark Web Price Index 2022 - Dark Web Prices of Personal Data
To see just how prevalent items of personal data are being listed on the dark web in 2022, and at what price, we went on a data-gathering mission.
Bypassing AV/EDR Hooks via Vectored Syscall - POC https://www.cyberwarfare.live/blog/vectored-syscall-poc
CyberWarfare Labs
Blog - CWL : Advanced Cyber Attack & Detection Learning Platform
Investigating Powercat Reverse Shell Activity OVERVIEW The primary objective of adversaries or attackers is to maintain persistence within the targeted infrastructure. To […]
Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
Zero Day Initiative
Zero Day Initiative — Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend
By now you have likely already heard about the in-the-wild exploitation of Exchange Server, chaining CVE-2022-41040 and CVE-2022-41082. It was originally submitted to the ZDI program by the researcher known as “DA-0x43-Dx4-DA-Hx2-Tx2-TP-S-Q from GTSC”. After…
Windows Kernel: Exploit CVE-2022-35803 in Common Log File System https://blog.northseapwn.top/2022/11/11/Windows-Kernel-Exploit-CVE-2022-35803-in-Common-Log-File-System/index.html
blog.northseapwn.top
Windows Kernel: Exploit CVE-2022-35803 in Common Log File System
NorthSea's Blog
Reversing and Exploiting Samsung's NPU (Part 1) https://blog.impalabs.com/2103_reversing-samsung-npu.html
Impalabs
Reversing and Exploiting Samsung's NPU (Part 1)
This series of blog posts aims to describe and explain the internals of a recent addition to Samsung's system-on-chips, namely their Neural Processing Unit. The first part digs into the internals of the NPU and the second one focuses on the exploitation of…
Technical Advisory – NXP i.MX SDP_READ_DISABLE Fuse Bypass (CVE-2022-45163) https://research.nccgroup.com/2022/11/17/cve-2022-45163/
NCC Group Research Blog
Technical Advisory – NXP i.MX SDP_READ_DISABLE Fuse Bypass (CVE-2022-45163)
Vendor: NXP Semiconductors Vendor URL: Affected Devices: i.MX RT 101x, i.MX RT102x, i.MX RT1050/6x, i.MX 6 Family, i.MX 7 Family, i.MX8M Quad/Mini, Vybrid Author: Jon Szymaniak <jon.szymaniak(at…
GRU 26165: The Russian cyber unit that hacks targets on-site https://www.atlanticcouncil.org/content-series/tech-at-the-leading-edge/the-russian-cyber-unit-that-hacks-targets-on-site/
Atlantic Council
GRU 26165: The Russian cyber unit that hacks targets on-site
Russian hackers are not always breaching targets from afar, typing on their keyboards in Moscow bunkers or St. Petersburg apartment buildings. Enter GRU Unit 26165, a military cyber unit with hackers operating remotely and on-site. Going forward, Western…
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns
https://blog.cyble.com/2022/11/18/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns/
https://blog.cyble.com/2022/11/18/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns/