bOt@zerobytes.monsterM · 1 hour agoSolidity Static Analyzers: Reducing False Positives with CodeQLplus-squarewww.coinfabrik.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSolidity Static Analyzers: Reducing False Positives with CodeQLplus-squarewww.coinfabrik.combOt@zerobytes.monsterM · 1 hour agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoVulnerabilities in Open Source C2 Frameworksplus-squareblog.includesecurity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkVulnerabilities in Open Source C2 Frameworksplus-squareblog.includesecurity.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoHertz leaks 60,000 insurance claim reports on their claims websiteplus-squarewww.adversis.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHertz leaks 60,000 insurance claim reports on their claims websiteplus-squarewww.adversis.iobOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 15 hours agoImproved SLEAPING sleepmask using Timers and APCs in order to spoof Timer Callback addresses at sleeping time achieving a more resilient sleep mask that works against great in-memory scanner like ...plus-squareoldboy21.github.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkImproved SLEAPING sleepmask using Timers and APCs in order to spoof Timer Callback addresses at sleeping time achieving a more resilient sleep mask that works against great in-memory scanner like ...plus-squareoldboy21.github.iobOt@zerobytes.monsterM · 15 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 15 hours agoRevisiting MiniFilter Abuse Techniques to Blind EDRplus-squaretierzerosecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkRevisiting MiniFilter Abuse Techniques to Blind EDRplus-squaretierzerosecurity.co.nzbOt@zerobytes.monsterM · 15 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoDirect Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryptionplus-squaresurecloudcyber.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkDirect Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryptionplus-squaresurecloudcyber.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoTaking over Train infrastructure / Traction power substation and lighting systems in Europeplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkTaking over Train infrastructure / Traction power substation and lighting systems in Europeplus-squaremedium.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 day agoA vulnerability in LANCOM LCOS web interface (usually listening on port 443) allows a remote attacker to trigger a heap overflow in the service listening on this portplus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkA vulnerability in LANCOM LCOS web interface (usually listening on port 443) allows a remote attacker to trigger a heap overflow in the service listening on this portplus-squaressd-disclosure.combOt@zerobytes.monsterM · 1 day agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoCVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerabilityplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerabilityplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoHacking the Planet - A DEFCON ICS CTF 2024 Retrospectiveplus-squaremaxwelldulin.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHacking the Planet - A DEFCON ICS CTF 2024 Retrospectiveplus-squaremaxwelldulin.combOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 days agoExploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)plus-squarecsa.limitedexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkExploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)plus-squarecsa.limitedbOt@zerobytes.monsterM · 2 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoAttacking PowerShell CLIXML Deserializationplus-squarewww.truesec.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAttacking PowerShell CLIXML Deserializationplus-squarewww.truesec.combOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 3 days agoEscalating from Reader to Contributor in Azure API Managementplus-squarebinarysecurity.noexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkEscalating from Reader to Contributor in Azure API Managementplus-squarebinarysecurity.nobOt@zerobytes.monsterM · 3 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 4 days agoAcquiring Malicious Browser Extension Samples on a Shoestring Budgetplus-squarepberba.github.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAcquiring Malicious Browser Extension Samples on a Shoestring Budgetplus-squarepberba.github.iobOt@zerobytes.monsterM · 4 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 5 days agoCVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.aiplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.aiplus-squarewww.horizon3.aibOt@zerobytes.monsterM · 5 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 6 days agoCVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection toolplus-squarer.sec-consult.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection toolplus-squarer.sec-consult.combOt@zerobytes.monsterM · 6 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoBlog Post: Intelligent Adversary Emulation with the Bounty Hunterplus-squarelolcads.github.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBlog Post: Intelligent Adversary Emulation with the Bounty Hunterplus-squarelolcads.github.iobOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoWhy Django’s [DEBUG=True] is a Goldmine for Hackersplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkWhy Django’s [DEBUG=True] is a Goldmine for Hackersplus-squaremedium.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoA new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labsplus-squarewww.cleafy.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkA new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labsplus-squarewww.cleafy.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 7 days agoWe Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labsplus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkWe Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labsplus-squarelabs.watchtowr.combOt@zerobytes.monsterM · 7 days agomessage-square0fedilink