05/09

SEO Poisoning – A Gootloader Story – The DFIR Report

https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/
SEO Poisoning – A Gootloader Story – The DFIR Report

PHMSA Issues Proposed Civil Penalty of Nearly $1 Million to Colonial Pipeline Company for Control Room Management Failures | PHMSA

https://www.phmsa.dot.gov/news/phmsa-issues-proposed-civil-penalty-nearly-1-million-colonial-pipeline-company-control-room
PHMSA Issues Proposed Civil Penalty of Nearly $1 Million to Colonial Pipeline Company for Control Room Management Failures | PHMSA

BIG-IP iControl REST vulnerability CVE-2022-1388

https://support.f5.com/csp/article/K23605346
BIG-IP iControl REST vulnerability CVE-2022-1388

Vulnerabilidades/CVE-2022-1040_checker at main · CronUp/Vulnerabilidades · GitHub

https://github.com/CronUp/Vulnerabilidades/blob/main/CVE-2022-1040_checker
Vulnerabilidades/CVE-2022-1040_checker at main · CronUp/Vulnerabilidades · GitHub

Costa Rica declares national emergency after Conti ransomware attacks

https://www.bleepingcomputer.com/news/security/costa-rica-declares-national-emergency-after-conti-ransomware-attacks/
Costa Rica declares national emergency after Conti ransomware attacks

GitHub - FuzzySecurity/WWHF-WayWest-2022

https://github.com/FuzzySecurity/WWHF-WayWest-2022
GitHub - FuzzySecurity/WWHF-WayWest-2022

Kevin Beaumont on Twitter: "PoC is public, exploit path on left." / Twitter

https://twitter.com/GossiTheDog/status/1523566937414193153
Kevin Beaumont on Twitter: "PoC is public, exploit path on left." / Twitter

Hackers are now hiding malware in Windows Event Logs

https://www.bleepingcomputer.com/news/security/hackers-are-now-hiding-malware-in-windows-event-logs/
Hackers are now hiding malware in Windows Event Logs

Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability

https://thehackernews.com/2022/05/researchers-develop-rce-exploit-for.html
Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability

New tool release: Discovering the origin host to bypass web application firewalls - Detectify Labs

https://labs.detectify.com/2022/05/09/discovering-the-origin-host-to-bypass-waf/
New tool release: Discovering the origin host to bypass web application firewalls - Detectify Labs

GitHub - horizon3ai/CVE-2022-1388: POC for CVE-2022-1388

https://github.com/horizon3ai/CVE-2022-1388
GitHub - horizon3ai/CVE-2022-1388: POC for CVE-2022-1388

Ransomware attack, Covid combine to shutter Illinois college

https://www.nbcnews.com/tech/security/ransomware-attack-covid-combine-shutter-illinois-college-rcna24905
Ransomware attack, Covid combine to shutter Illinois college

Vulnerability Analysis - CVE-2022-1388  - Randori

https://www.randori.com/blog/vulnerability-analysis-cve-2022-1388/
Vulnerability Analysis - CVE-2022-1388  - Randori

CVE-2022-1388/CVE-2022-1388.py at main · horizon3ai/CVE-2022-1388 · GitHub

https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py
CVE-2022-1388/CVE-2022-1388.py at main · horizon3ai/CVE-2022-1388 · GitHub

U.S. Offering $10 Million Reward for Information on Conti Ransomware Hackers

https://thehackernews.com/2022/05/us-offering-10-million-reward-for.html
U.S. Offering $10 Million Reward for Information on Conti Ransomware Hackers

Zer0Con_2022_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf

https://github.com/potmdehex/slides/blob/main/Zer0Con_2022_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf
Zer0Con_2022_Tales_from_the_iOS_macOS_Kernel_Trenches.pdf

Exclusive: Ukraine war spurs U.S. to ramp up security probe of software maker Kaspersky | Reuters

https://www.reuters.com/technology/exclusive-ukraine-war-spurs-us-ramp-up-security-probe-software-maker-kaspersky-2022-05-09/
Exclusive: Ukraine war spurs U.S. to ramp up security probe of software maker Kaspersky | Reuters

Experts Sound Alarm on DCRat Backdoor Being Sold on Russian Hacking Forums

https://thehackernews.com/2022/05/experts-sound-alarm-on-dcrat-backdoor.html
Experts Sound Alarm on DCRat Backdoor Being Sold on Russian Hacking Forums

Defending the Three Headed Relay. A joint blog written by Andrew… | by Jonathan Johnson | Medium

https://jsecurity101.medium.com/defending-the-three-headed-relay-17e1d6b6a339
Defending the Three Headed Relay. A joint blog written by Andrew… | by Jonathan Johnson | Medium

Abusing HTTP hop-by-hop request headers - Nathan Davison

https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
Abusing HTTP hop-by-hop request headers - Nathan Davison

GitHub - Sq00ky/SMB-Session-Spoofing

https://github.com/Sq00ky/SMB-Session-Spoofing
GitHub - Sq00ky/SMB-Session-Spoofing

A Sticky Situation Part 1: The Pervasive Nature of Credit Card Skimmers - DomainTools | Start Here. Know Now.

https://www.domaintools.com/resources/blog/a-sticky-situation-part-1-the-pervasive-nature-of-credit-card-skimmers
A Sticky Situation Part 1: The Pervasive Nature of Credit Card Skimmers - DomainTools | Start Here. Know Now.

Risky Biz News: Costa Rica declares national emergency after ransomware attack

https://riskybiznews.substack.com/p/risky-biz-news-costa-rica-declares
Risky Biz News: Costa Rica declares national emergency after ransomware attack

MER CONFERENCE

https://www.merconference.com/page/1901703/registration
MER CONFERENCE

Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware

https://thehackernews.com/2022/05/ukrainian-cert-warns-citizens-of-new.html
Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware