New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/
Rapid7
Rapid7 Managed Cybersecurity: Outpace Attackers
SpyNote: Spyware with RAT capabilities targeting Financial Institutions https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions.html
ThreatFabric
SpyNote: Spyware with RAT capabilities targeting Financial Institutions
SpyNote, also known as SpyMax and CypherRat, is a unique and effective Spyware which developed unique interest in banking users
[Crypto][Python] Padding oracle attack: demonstration https://yurichev.org/padding_oracle_attack/
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509) https://infosecwriteups.com/norec-attack-stripping-ble-encryption-from-nordics-library-cve-2020-15509-9798ab893b95
Medium
Norec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)
This article talks about a vulnerability i have found in a library that almost every android application is based on, in a combination…
New RisePro Stealer distributed by the prominent PrivateLoader
https://blog.sekoia.io/new-risepro-stealer-distributed-by-the-prominent-privateloader/
https://blog.sekoia.io/new-risepro-stealer-distributed-by-the-prominent-privateloader/
Sekoia.io Blog
New RisePro Stealer distributed by the prominent PrivateLoader
RisePro is a new undocumented stealer. According to SEKOIA.IO analysts, it has similarities with PrivateLoader.
Introduction to Graph Machine Learning https://huggingface.co/blog/intro-graphml
Corrupting memory without memory corruption https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/
The GitHub Blog
Corrupting memory without memory corruption
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights…
Effectively mitigating CSRF https://exact.realty/blog/posts/2022/12/29/csrf-prevention/
This brings me good memories :') » SoftICE-like kernel debugger for Windows 11 https://github.com/vitoplantamura/BugChecker
GitHub
GitHub - vitoplantamura/BugChecker: SoftICE-like kernel debugger for Windows 11
SoftICE-like kernel debugger for Windows 11. Contribute to vitoplantamura/BugChecker development by creating an account on GitHub.
Analyzing CVE-2022-46330 (DLL Hijacking in Squirrel.Windows)
https://archcloudlabs.com/projects/cve-2022-46330/
https://archcloudlabs.com/projects/cve-2022-46330/
Arch Cloud Labs
Analyzing CVE-2022-46330 (DLL Hijacking in Squirrel.Windows)
About The Project In December of 2022, a DLL Hijacking vulnerability with a CVSS score of 7.8 was reported in the Squirrel.Windows auto-install/update utility. This blog post will analyze the vulnerability, and the root cause of said issue with procmon.
Analyzing…
Analyzing…
Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys
👍1
Unwrapping Ursnifs Gifts https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/
The DFIR Report
Unwrapping Ursnifs Gifts - The DFIR Report
In late August 2022, we investigated an incident involving Ursnif malware, which resulted in Cobalt Strike being deployed. This was followed by the threat actors moving laterally throughout the environment using an admin account. The Ursnif malware family…
DotDumper - An Automatic Unpacker And Logger For DotNet Framework Targeting Files https://www.kitploit.com/2023/01/dotdumper-automatic-unpacker-and-logger.html
KitPloit - PenTest & Hacking Tools
DotDumper - An Automatic Unpacker And Logger For DotNet Framework Targeting Files
A detailed explanation of Kubernetes architecture principles https://medium.com/@Zard-x/a-detailed-explanation-of-kubernetes-architecture-principles-26abcac29f7c
How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack https://www.legitsecurity.com/blog/how-to-continuously-detect-vulnerable-jenkins-plugins-to-avoid-a-software-supply-chain-attack
Legitsecurity
How to Continuously Detect Vulnerable Jenkins Plugins to Avoid a Software Supply Chain Attack
See how attackers used compromised Jenkins plugins to attack the software supply chain and how to continuously detect vulnerable Jenkins plugins at scale.
LuaJIT Sandbox Escape: The Saga Ends https://0xbigshaq.github.io/2022/12/30/luajit-sandbox-escape/
( ͡◕ _ ͡◕)👌
LuaJIT Sandbox Escape: The Saga Ends
👍1