SysAdmin 24x7
4.34K subscribers
41 photos
2 videos
8 files
6.02K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Beware of Emails Asking You to "Confirm Your Unsubscribe" Request

A long-running #scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be clicked on or responded to as they are designed to harvest working email addresses or to perform some other type of scam.

https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/
Package : #proftpd dfsg
CVE ID : CVE-2019-12815
Debian Bug : 932453

Tobias Maedel discovered that the mod_copy module of ProFTPD, a FTP/SFTP/FTPS server, performed incomplete permission validation for the CPFR/CPTO commands.

https://lists.debian.org/debian-security-announce/2019/msg00139.html
Múltiples vulnerabilidades en productos VMware

Fecha de publicación: 05/08/2019
Importancia: 4 - Alta

Recursos afectados: 
VMware vSphere ESXi, versiones 6.5 y 6.7.
VMware Workstation Pro / Player, versiones 14.x y 15.x.
VMware Fusion Pro / Fusion, versiones 10.x y 11.x.

Descripción: 
Piotr Bania, de Cisco Talos, ha reportado dos vulnerabilidades a VMware, de lectura y escritura fuera de límites que afectan a los productos ESXi, Workstation y Fusion.

#Incibe

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-vmware-10
ECh0raix #Ransomware #Decryptor Restores #QNAP Files For Free

A decryptor for the eCh0raix Ransomware, or QNAPCrypt,  has been released that allows victims to recover encrypted files on their QNAP NAS devices.

https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/
¿NECESITAS AYUDA para desbloquear tu vida digital sin pagar el rescate a tus atacantes?

#decryptor #Ransomware

https://www.nomoreransom.org/
Hide *Exploitable* Extended-Rights (including DCSync privs) to remain persistence

#ActiveDirectory

https://medium.com/@huykha/hide-exploitable-extended-rights-to-remain-persistence-92a2e1d3670d
Auditing containers with #osquery

When running containers in production with Docker, bad configurations can easily lead to vulnerable environments: privileged containers, processes inside a container that are running with the root user or lack of AppArmor profiles for security restrictions are some common examples. An attacker who exploits application vulnerabilities in the container could use this lack of restrictions to access to the host or other servers on your network. Using osquery, we will query the Docker daemon like a relational database and quickly identify these security flaws.

https://itnext.io/auditing-containers-with-osquery-389636f8c420