New Details Emerge on Windows Zero Day
https://www.darkreading.com/vulnerabilities---threats/new-details-emerge-on-windows-zero-day/d/d-id/1334422
https://www.darkreading.com/vulnerabilities---threats/new-details-emerge-on-windows-zero-day/d/d-id/1334422
Dark Reading
New Details Emerge on Windows Zero Day
The CVE-2019-0859 vulnerability, patched last week, is the latest in a string of Windows local privilege escalation bugs discovered at Kaspersky Lab.
European Commission: No Evidence of Issues With Kaspersky Products
https://www.securityweek.com/european-commission-no-evidence-issues-kaspersky-products
https://www.securityweek.com/european-commission-no-evidence-issues-kaspersky-products
Securityweek
European Commission: No Evidence of Issues With Kaspersky Products | SecurityWeek.Com
The European Commission has no evidence of issues associated with using Kaspersky Lab’s products, a document published this week reveals.
Actualizaciones críticas en Oracle (abril 2019)
Fecha de publicación: 17/04/2019
Importancia: 5 - Crítica
Descripción:
Oracle ha publicado una actualización crítica con parches para corregir vulnerabilidades que afectan a múltiples productos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizaciones-criticas-oracle-abril-2019
Fecha de publicación: 17/04/2019
Importancia: 5 - Crítica
Descripción:
Oracle ha publicado una actualización crítica con parches para corregir vulnerabilidades que afectan a múltiples productos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizaciones-criticas-oracle-abril-2019
INCIBE-CERT
Actualizaciones críticas en Oracle (abril 2019)
Oracle ha publicado una actualización crítica con parches para corregir vulnerabilidades que afectan a múltiples productos.
Malvertising Campaign Abused Chrome to Hijack 500 Million iOS User Sessions
https://www.bleepingcomputer.com/news/security/malvertising-campaign-abused-chrome-to-hijack-500-million-ios-user-sessions/
https://www.bleepingcomputer.com/news/security/malvertising-campaign-abused-chrome-to-hijack-500-million-ios-user-sessions/
BleepingComputer
Malvertising Campaign Abused Chrome to Hijack 500 Million iOS User Sessions
Multiple massive malvertising attacks which targeted iOS users from the U.S. and multiple European Union countries for almost a week used a Chrome for iOS vulnerability to bypass the browser's built-in pop-up blocker.
DNS Hijacking Abuses Trust In Core Internet Service
https://blog.talosintelligence.com/2019/04/seaturtle.html
https://blog.talosintelligence.com/2019/04/seaturtle.html
Cisco Talos Blog
DNS Hijacking Abuses Trust In Core Internet Service
By Danny Adamitis, David Maynor, Warren Mercer, Matthew Olney and Paul Rascagneres.
Update 4/18: A correction has been made to our research based on feedback from Packet Clearing House, we thank them for their assistance
Preface
This blog post discusses…
Update 4/18: A correction has been made to our research based on feedback from Packet Clearing House, we thank them for their assistance
Preface
This blog post discusses…
Facebook uploaded 1.5 million people’s email contacts without permission
https://thenextweb.com/facebook/2019/04/18/facebook-uploaded-1-5-million-peoples-email-contacts-without-permission/amp/
https://thenextweb.com/facebook/2019/04/18/facebook-uploaded-1-5-million-peoples-email-contacts-without-permission/amp/
The Next Web
Facebook uploaded 1.5 million people’s email contacts without permission
Welcome to the newest episode of "Facebook screws up daily." it uploaded contact lists of over 1.5 million people since 2016, without their permission
New Variant of HawkEye Sold on Hacking Forums and Distributed via Excel and DOC Files
https://gbhackers.com/hawkeye-distributed-excel
https://gbhackers.com/hawkeye-distributed-excel
GBHackers On Security
New Variant of HawkEye Sold on Hacking Forums Delivered via Excel
Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information
Drupal Releases Security Updates
Drupal has released security updates to address multiple vulnerabilities in Drupal Core. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
https://www.us-cert.gov/ncas/current-activity/2019/04/17/Drupal-Releases-Security-Updates
Drupal has released security updates to address multiple vulnerabilities in Drupal Core. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
https://www.us-cert.gov/ncas/current-activity/2019/04/17/Drupal-Releases-Security-Updates
www.us-cert.gov
Drupal Releases Security Updates | US-CERT
Drupal has released security updates to address multiple vulnerabilities in Drupal Core. A remote attacker could exploit some of these vulnerabilities to take control of an affected website.The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
Cisco IOS XR 64-Bit Software for Cisco ASR 9000 Series Aggregation Services Routers Network Isolation Vulnerability
Vulnerable Products
This vulnerability affects Cisco ASR 9000 Series Aggregation Services Routers that are running an affected version of Cisco IOS XR 64-bit Software and have the secondary management interface (physically MGT LAN 1 on the route switch processor (RSP)) connected and configured.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-asr9k-exr
Vulnerable Products
This vulnerability affects Cisco ASR 9000 Series Aggregation Services Routers that are running an affected version of Cisco IOS XR 64-bit Software and have the secondary management interface (physically MGT LAN 1 on the route switch processor (RSP)) connected and configured.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-asr9k-exr
Cisco
Cisco Security Advisory: Cisco IOS XR 64-Bit Software for Cisco ASR 9000 Series Aggregation Services Routers Network Isolation…
A vulnerability in the sysadmin virtual machine (VM) on Cisco ASR 9000 Series Aggregation Services Routers running Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to access internal applications running on the sysadmin VM.
The…
The…
Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability
Cisco devices running a vulnerable Cisco IOS XE release are affected by this vulnerability when the following conditions are met:
The CMP subsystem is present on the Cisco IOS XE software image running on the device, and
The device is configured to accept incoming Telnet connections.
Details
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.
The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
Cisco devices running a vulnerable Cisco IOS XE release are affected by this vulnerability when the following conditions are met:
The CMP subsystem is present on the Cisco IOS XE software image running on the device, and
The device is configured to accept incoming Telnet connections.
Details
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.
The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
Cisco
Cisco Security Advisory: Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.…
SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software
To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system.
To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp
To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system.
To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp
Cisco
Cisco Security Advisory: SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.…
Forwarded from Una al día
Scranos: Descubierto nuevo spyware con capacidades de rootkit
https://unaaldia.hispasec.com/2019/04/scranos-descubierto-nuevo-spyware-con-capacidades-de-rootkit.html
https://unaaldia.hispasec.com/2019/04/scranos-descubierto-nuevo-spyware-con-capacidades-de-rootkit.html
Una al Día
Scranos: Descubierto nuevo spyware con capacidades de rootkit
El malware, bautizado como Scranos fue descubierto por primera vez el año pasado, está en constante evolución con continuas mejoras, lo que lo convierte en una amenaza significativa. Scranos se distribuye principalmente en páginas de descargas como software…
Google Bans Embedded Browser Logins In Brutal War Against Phishing Attacks
https://www.hothardware.com/news/google-bans-embedded-browser-logins-war-phishing-attacks
https://www.hothardware.com/news/google-bans-embedded-browser-logins-war-phishing-attacks
HotHardware
Google Bans Embedded Browser Logins In Brutal War Against Phishing Attacks
In an ongoing effort to stay one step ahead of the bad guys (or at least keep pace with them), Google has decided to block sign-ins from embedded browser frameworks, such as the Chromium Embedded Framework (CEF).
Some internet outages predicted for the coming month as '768k Day' approaches
768k Day expected within the month, reminiscent of 512k Day when AT&T, BT, Comcast, Sprint, and Verizon all went down.
https://www.zdnet.com/article/some-internet-outages-predicted-for-the-coming-month-as-768k-day-approaches/
768k Day expected within the month, reminiscent of 512k Day when AT&T, BT, Comcast, Sprint, and Verizon all went down.
https://www.zdnet.com/article/some-internet-outages-predicted-for-the-coming-month-as-768k-day-approaches/
ZDNet
Some internet outages predicted for the coming month as '768k Day' approaches
768k Day expected within the month, reminiscent of 512k Day when AT&T, BT, Comcast, Sprint, and Verizon all went down.
PowerShell script creating a timeline of Active Directory changes with replication metadata
The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest.
Replication metadata gives you the time at which each replicated attribute for a given object was last changed. As a result the timeline of modifications is partial. For each modification of a replicated attribute a version number is incremented.
https://github.com/ANSSI-FR/ADTimeline
The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest.
Replication metadata gives you the time at which each replicated attribute for a given object was last changed. As a result the timeline of modifications is partial. For each modification of a replicated attribute a version number is incremented.
https://github.com/ANSSI-FR/ADTimeline
GitHub
GitHub - ANSSI-FR/ADTimeline: Timeline of Active Directory changes with replication metadata
Timeline of Active Directory changes with replication metadata - ANSSI-FR/ADTimeline
Active Directory Control Paths
Control paths in Active Directory are an aggregation of "control relations" between entities of the domain (users, computers, groups, GPO, containers, etc.) which can be visualized as graphs (such as above) and whose purpose is to answer questions like "Who can get 'Domain Admins' privileges ?" or "What resources can a user control ?" and even "Who can read the CEO's emails ?".
https://github.com/ANSSI-FR/AD-control-paths
Control paths in Active Directory are an aggregation of "control relations" between entities of the domain (users, computers, groups, GPO, containers, etc.) which can be visualized as graphs (such as above) and whose purpose is to answer questions like "Who can get 'Domain Admins' privileges ?" or "What resources can a user control ?" and even "Who can read the CEO's emails ?".
https://github.com/ANSSI-FR/AD-control-paths
GitHub
GitHub - ANSSI-FR/AD-control-paths: Active Directory Control Paths auditing and graphing tools
Active Directory Control Paths auditing and graphing tools - ANSSI-FR/AD-control-paths
Hacker Group Exposes Iranian APT Operations and Members
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government.
https://www.bleepingcomputer.com/news/security/hacker-group-exposes-iranian-apt-operations-and-members/
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government.
https://www.bleepingcomputer.com/news/security/hacker-group-exposes-iranian-apt-operations-and-members/
BleepingComputer
Hacker Group Exposes Iranian APT Operations and Members
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government.
How to extract forensic artifacts from pagefile.sys?
https://www.andreafortuna.org/2019/04/17/how-to-extract-forensic-artifacts-from-pagefile-sys/
@hackplayers
https://www.andreafortuna.org/2019/04/17/how-to-extract-forensic-artifacts-from-pagefile-sys/
@hackplayers
Andrea Fortuna
How to extract forensic artifacts from pagefile.sys?
Microsoft Windows uses a paging file, called pagefile.sys, to store page-size blocks of memory that do not current fit into physical memory. This file, stored in %SystemDrive%\pagefile.sys is a hidden system file and it can never be read or accessed by a…
Exploring, Exploiting Active Directory Pen Test
http://blog.securelayer7.net/exploring-exploiting-active-directory-pen-test/
http://blog.securelayer7.net/exploring-exploiting-active-directory-pen-test/
Penetration Testing and CyberSecurity Solution - SecureLayer7
Exploring, Exploiting Active Directory Pen Test
Active Directory (Pen Test ) is most commonly used in the Enterprise Infrastructure to manage 1000's of computers in the organization with a single point of control as "Domain Controller"....