11/20

Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign

https://blogs.blackberry.com/en/2024/11/suspected-nation-state-adversary-targets-pakistan-navy-in-cyber-espionage-campaign
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

https://thehackernews.com/2024/11/decades-old-security-vulnerabilities.html
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

Unveiling LIMINAL PANDA - Threats to Telecom Sector | CrowdStrike

https://www.crowdstrike.com/en-us/blog/liminal-panda-telecom-sector-threats/
Unveiling LIMINAL PANDA - Threats to Telecom Sector | CrowdStrike

Helldown Ransomware: an overview of this emerging threat - Sekoia.io Blog

https://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/
Helldown Ransomware: an overview of this emerging threat - Sekoia.io Blog

US charges five linked to Scattered Spider cybercrime gang

https://www.bleepingcomputer.com/news/security/us-charges-five-linked-to-scattered-spider-cybercrime-gang/
US charges five linked to Scattered Spider cybercrime gang

Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root

https://www.bleepingcomputer.com/news/security/ubuntu-linux-impacted-by-decade-old-needrestart-flaw-that-gives-root/
Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root

JSAC2025 - Registration -

https://jsac.jpcert.or.jp/registration.html
JSAC2025 - Registration -

Apple Confirms Zero-Day Attacks Hitting macOS Systems - SecurityWeek

https://www.securityweek.com/apple-confirms-zero-day-attacks-hitting-intel-based-macs/
Apple Confirms Zero-Day Attacks Hitting macOS Systems - SecurityWeek

Chromium

https://issues.chromium.org/issues/338381304
Chromium

CISA Warns of Progress Kemp LoadMaster Vulnerability Exploitation - SecurityWeek

https://www.securityweek.com/cisa-warns-of-progress-kemp-loadmaster-vulnerability-exploitation/
CISA Warns of Progress Kemp LoadMaster Vulnerability Exploitation - SecurityWeek

MalwareBazaar | 167-114-47-186

https://bazaar.abuse.ch/browse/tag/167-114-47-186/
MalwareBazaar | 167-114-47-186

MalwareBazaar | FUJI FURUKAWA E C VIETNAM CO LTD

https://bazaar.abuse.ch/browse/tag/FUJI%20FURUKAWA%20E%20C%20VIETNAM%20CO%20LTD/
MalwareBazaar | FUJI FURUKAWA E C VIETNAM CO LTD

Google Online Security Blog: Leveling Up Fuzzing: Finding more vulnerabilities with AI

https://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html
Google Online Security Blog: Leveling Up Fuzzing: Finding more vulnerabilities with AI

Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater” – Sophos News

https://news.sophos.com/en-us/2024/11/20/sophos-mdr-blocks-and-tracks-activity-from-probable-iranian-state-actor-muddywater/
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater” – Sophos News

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

https://thehackernews.com/2024/11/ghost-tap-hackers-exploiting-nfcgate-to.html
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

How a YouTube Video lead to pwning a web application via SQL Injection worth $4324 bounty | by Vishal Saini | InfoSec Write-ups

https://infosecwriteups.com/how-a-youtube-video-lead-to-pwning-a-web-application-via-sql-injection-worth-4324-bounty-285f0a9b9f6c
How a YouTube Video lead to pwning a web application via SQL Injection worth $4324 bounty | by Vishal Saini | InfoSec Write-ups

win32-shellcode.pdf

https://www.hick.org/code/skape/papers/win32-shellcode.pdf
win32-shellcode.pdf

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

https://thehackernews.com/2024/11/oracle-warns-of-agile-plm-vulnerability.html
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

MITRE shares 2024's top 25 most dangerous software weaknesses

https://www.bleepingcomputer.com/news/security/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses/
MITRE shares 2024's top 25 most dangerous software weaknesses

Token Analysis Tool

http://teletoken.info
Token Analysis Tool

Ford Investigating Potential Breach After Hackers Claim Data Theft - SecurityWeek

https://www.securityweek.com/ford-investigating-potential-breach-after-hackers-claim-data-theft/
Ford Investigating Potential Breach After Hackers Claim Data Theft - SecurityWeek

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

https://thehackernews.com/2024/11/china-backed-hackers-leverage-sigtran.html
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

Writing a Self-Mutating Malware - Malware - 0x00sec - The Home of the Hacker

https://0x00sec.org/t/writing-a-self-mutating-malware/40213
Writing a Self-Mutating Malware - Malware - 0x00sec - The Home of the Hacker

Log in to X / X

https://x.com/gnaphos
Log in to X / X

Extracting Plaintext Credentials from Palo Alto Global Protect - Shells.Systems

https://shells.systems/extracting-plaintext-credentials-from-palo-alto-global-protect/
Extracting Plaintext Credentials from Palo Alto Global Protect - Shells.Systems