Kali Linux 2019.4 Release
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:
A new default desktop environment, Xfce
New GTK3 theme (for Gnome and Xfce)
Introduction of “Kali Undercover” mode
Kali Documentation has a new home and is now Git powered
Public Packaging – getting your tools into Kali
Kali NetHunter KeX – Full Kali desktop on Android
BTRFS during setup
Added PowerShell
The kernel is upgraded to version 5.3.9
… Plus the normal bugs fixes and updates.
https://www.kali.org/news/kali-linux-2019-4-release/
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:
A new default desktop environment, Xfce
New GTK3 theme (for Gnome and Xfce)
Introduction of “Kali Undercover” mode
Kali Documentation has a new home and is now Git powered
Public Packaging – getting your tools into Kali
Kali NetHunter KeX – Full Kali desktop on Android
BTRFS during setup
Added PowerShell
The kernel is upgraded to version 5.3.9
… Plus the normal bugs fixes and updates.
https://www.kali.org/news/kali-linux-2019-4-release/
Kali Linux
Kali Linux 2019.4 Release (Xfce, Gnome, GTK3, Kali-Undercover, Kali-Docs, KeX, PowerShell & Public Packaging) | Kali Linux Blog
Time to grab yourself a drink, this will take a while!
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:…
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:…
How to get started with security response automation on #AWS
https://aws.amazon.com/es/blogs/security/how-get-started-security-response-automation-aws/
https://aws.amazon.com/es/blogs/security/how-get-started-security-response-automation-aws/
Amazon
How to get started with security response automation on AWS | Amazon Web Services
December 2, 2019: We’ve updated this post to include some additional information about Security Hub. At AWS, we encourage you to use automation to help quickly detect and respond to security events within your AWS environments. In addition to increasing the…
Instagram’s updated security and privacy settings
How to protect your Instagram account and personal photos from prying eyes.
https://www.kaspersky.com/blog/keep-instagram-secure/11045/
How to protect your Instagram account and personal photos from prying eyes.
https://www.kaspersky.com/blog/keep-instagram-secure/11045/
Kaspersky
Instagram’s updated security and privacy settings
How to protect your Instagram account and personal photos from prying eyes.
Múltiples vulnerabilidades en productos F5
Fecha de publicación: 27/11/2019
Importancia: 4 - Alta
Recursos afectados:
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator), versiones:
15.0.0 - 15.0.1;
14.1.0 - 14.1.2;
14.0.0 - 14.0.1;
13.1.0 - 13.1.3.1;
12.1.0 - 12.1.5;
11.5.1 - 11.6.5.
Enterprise Manager, versión 3.1.1.
BIG-IQ Centralized Management, versiones:
6.0.0;
5.2.0 - 5.4.0.
F5 iWorkflow, versión 2.3.0.
Descripción:
Se han publicado múltiples vulnerabilidades en productos F5 que podrían permitir a un atacante configurar el proxy para interceptar el tráfico, denegar el servicio o acceder a los archivos de la cuenta root.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-f5-5
Fecha de publicación: 27/11/2019
Importancia: 4 - Alta
Recursos afectados:
BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator), versiones:
15.0.0 - 15.0.1;
14.1.0 - 14.1.2;
14.0.0 - 14.0.1;
13.1.0 - 13.1.3.1;
12.1.0 - 12.1.5;
11.5.1 - 11.6.5.
Enterprise Manager, versión 3.1.1.
BIG-IQ Centralized Management, versiones:
6.0.0;
5.2.0 - 5.4.0.
F5 iWorkflow, versión 2.3.0.
Descripción:
Se han publicado múltiples vulnerabilidades en productos F5 que podrían permitir a un atacante configurar el proxy para interceptar el tráfico, denegar el servicio o acceder a los archivos de la cuenta root.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-f5-5
INCIBE-CERT
Múltiples vulnerabilidades en productos F5
Se han publicado múltiples vulnerabilidades en productos F5 que podrían permitir a un atacante configurar el proxy para interceptar el tráfico, denegar el servicio o acceder a los archivos de la
#Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network
In a statement at midday today (local time), Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform.
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-forces-prosegur-security-firm-to-shut-down-network/
In a statement at midday today (local time), Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform.
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-forces-prosegur-security-firm-to-shut-down-network/
BleepingComputer
Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network
In a statement at midday today (local time), Spanish multinational security company Prosegur announced that it was the victim of a cybersecurity incident disrupting its telecommunication platform.
#Adobe Hacked – Hackers Exploit The Bug in #Magento Marketplace & Gained Access To The Users Data
Adobe discloses the security breach on its Magento Marketplace portal, in results, attackers gained access to the registered customer’s sensitive account information.
https://gbhackers.com/magento-marketplace/
Adobe discloses the security breach on its Magento Marketplace portal, in results, attackers gained access to the registered customer’s sensitive account information.
https://gbhackers.com/magento-marketplace/
GBHackers On Security
Adobe Hacked - Hackers Exploit the Vulnerability in Magento Marketplace
Adobe discloses the security breach on its Magento Marketplace portal, in results, attackers gained access to the customer's sensitive account information.
Tácticas CNA: una primera propuesta
https://www.securityartwork.es/2019/11/11/tacticas-cna-una-primera-propuesta/
https://www.securityartwork.es/2019/11/11/tacticas-cna-una-primera-propuesta/
Security Art Work
Tácticas CNA: una primera propuesta - Security Art Work
Hoy toca un artículo doctrinal y algo metafísico…. Vamos, algo denso. Avisados estáis :) Dentro las operaciones CNO (Computer Network Operations) encontramos tres tipos de capacidades o acciones: CND, CNA y CNE (Defensa, Ataque y Explotación respectivamente);…
#OwnCloud version 8.1.8 (stable) are vulnerable to recovery all username login list.
https://packetstormsecurity.com/files/155499/owncloud818-disclose.txt
https://packetstormsecurity.com/files/155499/owncloud818-disclose.txt
Packetstormsecurity
OwnCloud 8.1.8 Username Disclosure ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
SUPPORT COMMUNICATION - CUSTOMER BULLETIN
Document ID: a00092491en_us
Version: 1
Bulletin: HPE SAS Solid State Drives - Critical Firmware Upgrade Required for Certain HPE SAS Solid State Drive Models to Prevent Drive Failure at 32,768 Hours of Operation
Release Date: 2019-11-19
Last Updated: 2019-11-22
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us
Document ID: a00092491en_us
Version: 1
Bulletin: HPE SAS Solid State Drives - Critical Firmware Upgrade Required for Certain HPE SAS Solid State Drive Models to Prevent Drive Failure at 32,768 Hours of Operation
Release Date: 2019-11-19
Last Updated: 2019-11-22
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us
Actively Exploited StrandHogg Vulnerability Affects #Android OS
A newly discovered Android vulnerability is actively exploited by malware such as the BankBot banking Trojan and it impacts all versions of the operating system up to and including Android 10.
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/
A newly discovered Android vulnerability is actively exploited by malware such as the BankBot banking Trojan and it impacts all versions of the operating system up to and including Android 10.
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/
BleepingComputer
Actively Exploited StrandHogg Vulnerability Affects Android OS
A newly discovered Android vulnerability is actively exploited by malware such as the BankBot banking Trojan and it impacts all versions of the operating system up to and including Android 10.
Windows Users Beware! – More than 60% of Malicious Ads Targeting Windows Computer Systems
A new report shows that 61% of malicious ads on the Internet targeting Windows computers to infect with malware or to steal the information.
The malicious ads act as a platform to distribute malware, by attracting users and redirect them to malicious websites which results in downloading the malware.
https://gbhackers.com/malicious-ads-windows/
A new report shows that 61% of malicious ads on the Internet targeting Windows computers to infect with malware or to steal the information.
The malicious ads act as a platform to distribute malware, by attracting users and redirect them to malicious websites which results in downloading the malware.
https://gbhackers.com/malicious-ads-windows/
GBHackers On Security
More than 60% of Malicious Ads Targeting Windows Computer Systems
A new report shows that 61% of malicious ads on the Internet targeting Windows computers to infect with malware or to steal the information.
RHSA-2019:4056 - Security Advisory
Important: kernel security update
Security Advisory: Important
Tema:
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
https://access.redhat.com/errata/RHSA-2019:4056
Important: kernel security update
Security Advisory: Important
Tema:
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
https://access.redhat.com/errata/RHSA-2019:4056
Critical Flaw in #GoAhead Web Server Could Affect Wide Range of #IoT Devices
Cybersecurity researchers today uncovered details of two new vulnerabilities in the GoAhead web server software, a tiny application widely embedded in hundreds of millions of Internet-connected smart devices.
One of the two vulnerabilities, assigned as CVE-2019-5096, is a critical code execution flaw that can be exploited by attackers to execute malicious code on vulnerable devices and take control over them.
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
Cybersecurity researchers today uncovered details of two new vulnerabilities in the GoAhead web server software, a tiny application widely embedded in hundreds of millions of Internet-connected smart devices.
One of the two vulnerabilities, assigned as CVE-2019-5096, is a critical code execution flaw that can be exploited by attackers to execute malicious code on vulnerable devices and take control over them.
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
Critical Vulnerability in #Microsoft #Azure Let Hackers Take Over the Complete Control of the Azure Accounts
Researchers discovered a critical vulnerability in Microsoft Azure named “ #BlackDirect ” that allows attackers to take over the Azure user’s accounts and creating the Token with the victim’s permissions.
The vulnerability specifically affected Microsoft’s OAuth 2.0 applications that allow malicious attacker access and control a victim’s account
https://gbhackers.com/microsoft-azure/
Researchers discovered a critical vulnerability in Microsoft Azure named “ #BlackDirect ” that allows attackers to take over the Azure user’s accounts and creating the Token with the victim’s permissions.
The vulnerability specifically affected Microsoft’s OAuth 2.0 applications that allow malicious attacker access and control a victim’s account
https://gbhackers.com/microsoft-azure/
GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts
Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts
#Cisco and #AWS Team Up for Better Application Performance, Enhanced Security
https://blogs.cisco.com/enterprise/cisco-and-aws-extend-partnership-in-campus-datacenter
https://blogs.cisco.com/enterprise/cisco-and-aws-extend-partnership-in-campus-datacenter
Cisco Blogs
Cisco and AWS Team Up for Better Application Performance, Enhanced Security - Cisco Blogs
Cisco's enhanced integration partnership with AWS will lead to cloud apps that perform better and more securely. We will make it more straightforward for you to deploy new apps on hybrid networks, to make apps more manageable using the Cisco network tools…
Breaking the Rules: A Tough #Outlook for Home Page Attacks (CVE-2017-11774)
Attackers have a dirty little secret that is being used to conduct big intrusions. We’ll explain how they're "unpatching" an exploit and then provide new Outlook hardening guidance that is not available elsewhere. Specifically, this blog post covers field-tested automated registry processing for registry keys to protect against attacker attempts to reverse Microsoft’s CVE-2017-11774 patch functionality.
https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
Attackers have a dirty little secret that is being used to conduct big intrusions. We’ll explain how they're "unpatching" an exploit and then provide new Outlook hardening guidance that is not available elsewhere. Specifically, this blog post covers field-tested automated registry processing for registry keys to protect against attacker attempts to reverse Microsoft’s CVE-2017-11774 patch functionality.
https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
Google Cloud Blog
Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774) | Mandiant | Google Cloud Blog
[SECURITY] [DLA 2020-1] libonig security update
Package : libonig
Version : 5.9.5-3.2+deb8u4
CVE ID : CVE-2019-19012 CVE-2019-19204 CVE-2019-19246
Debian Bug : 944959 945313
Several vulnerabilities were discovered in the Oniguruma regular expressions library, notably used in PHP mbstring. CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Package : libonig
Version : 5.9.5-3.2+deb8u4
CVE ID : CVE-2019-19012 CVE-2019-19204 CVE-2019-19246
Debian Bug : 944959 945313
Several vulnerabilities were discovered in the Oniguruma regular expressions library, notably used in PHP mbstring. CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter
Exposed private cert key may also be an issue for IBM Aspera
Updated Twitter security celeb SwiftOnSecurity on Tuesday inadvertently disclosed a zero-day vulnerability affecting enterprise software biz Atlassian, a flaw that may be echoed in IBM's Aspera software.
The SwiftOnSecurity Twitter account revealed that Atlassian provided a domain that resolved to a local server with a common SSL certificate for its Confluence cloud service, to enable the Atlassian Companion app to edit files in a preferred local application and save the files back to Confluence.
https://www.theregister.co.uk/2019/12/05/atlassian_zero_day_bug/
Exposed private cert key may also be an issue for IBM Aspera
Updated Twitter security celeb SwiftOnSecurity on Tuesday inadvertently disclosed a zero-day vulnerability affecting enterprise software biz Atlassian, a flaw that may be echoed in IBM's Aspera software.
The SwiftOnSecurity Twitter account revealed that Atlassian provided a domain that resolved to a local server with a common SSL certificate for its Confluence cloud service, to enable the Atlassian Companion app to edit files in a preferred local application and save the files back to Confluence.
https://www.theregister.co.uk/2019/12/05/atlassian_zero_day_bug/
www.theregister.co.uk
Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter
Exposed private cert key may also be an issue for IBM Aspera
Mozilla Releases Security Updates for Firefox and Firefox ESR
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisories for Firefox 71 and Firefox ESR 68.3.
https://www.us-cert.gov/ncas/current-activity/2019/12/04/mozilla-releases-security-updates-firefox-and-firefox-esr
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisories for Firefox 71 and Firefox ESR 68.3.
https://www.us-cert.gov/ncas/current-activity/2019/12/04/mozilla-releases-security-updates-firefox-and-firefox-esr
www.us-cert.gov
Mozilla Releases Security Updates for Firefox and Firefox ESR | CISA
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…