09/14

Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs

https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/
Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs

Attacking the Android kernel using the Qualcomm TrustZone | Tamir Zahavi-Brunner’s Blog

https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Attacking the Android kernel using the Qualcomm TrustZone | Tamir Zahavi-Brunner’s Blog

RED TEAM Operator: Malware Development Advanced - Vol.1

https://institute.sektor7.net/rto-maldev-adv1
RED TEAM Operator: Malware Development Advanced - Vol.1

New PsExec spinoff lets hackers bypass network security defenses

https://www.bleepingcomputer.com/news/security/new-psexec-spinoff-lets-hackers-bypass-network-security-defenses/
New PsExec spinoff lets hackers bypass network security defenses

Introducing Bishop Fox Security Tool: CloudFox | Bishop Fox

https://bishopfox.com/blog/introducing-cloudfox
Introducing Bishop Fox Security Tool: CloudFox | Bishop Fox

Zero-day in WPGateway Wordpress plugin actively exploited in attacks

https://www.bleepingcomputer.com/news/security/zero-day-in-wpgateway-wordpress-plugin-actively-exploited-in-attacks/
Zero-day in WPGateway Wordpress plugin actively exploited in attacks

Twilio lays off 11% of its staff as it aims for profitability in 2023 | TechCrunch

https://techcrunch.com/2022/09/14/twilio-lays-off-11-of-its-staff-as-it-aims-for-profitability-in-2023/
Twilio lays off 11% of its staff as it aims for profitability in 2023 | TechCrunch

SparklingGoblin APT Hackers Using New Linux Variant of SideWalk Backdoor

https://thehackernews.com/2022/09/sparklinggoblin-apt-hackers-using-new.html
SparklingGoblin APT Hackers Using New Linux Variant of SideWalk Backdoor

CSA_IRGC.PDF

https://media.defense.gov/2022/Sep/14/2003076379/-1/-1/0/CSA_IRGC.PDF
CSA_IRGC.PDF

Dissecting%20PlugX%20to%20Extract%20Its%20Crown%20Jewels.pdf

https://secjoes-reports.s3.eu-central-1.amazonaws.com/Dissecting+PlugX+to+Extract+Its+Crown+Jewels.pdf
Dissecting%20PlugX%20to%20Extract%20Its%20Crown%20Jewels.pdf

Job Application for Security Analyst at Tall Poppy

https://boards.greenhouse.io/tallpoppy/jobs/5297808003
Job Application for Security Analyst at Tall Poppy

You never walk alone: The SideWalk backdoor gets a Linux variant | WeLiveSecurity

https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/
You never walk alone: The SideWalk backdoor gets a Linux variant | WeLiveSecurity

Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability

https://thehackernews.com/2022/09/over-280000-wordpress-sites-attacked.html
Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability

Malware Analysis Series (MAS) – Article 5 – Exploit Reversing

https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/
Malware Analysis Series (MAS) – Article 5 – Exploit Reversing

Firebombs and Shootings: The Rise of IRL Harassment and Violence as a Service

https://www.vice.com/en/article/3advxj/firebombings-shootings-as-a-service-telegram
Firebombs and Shootings: The Rise of IRL Harassment and Violence as a Service

Death of Queen Elizabeth II exploited to steal Microsoft credentials

https://www.bleepingcomputer.com/news/security/death-of-queen-elizabeth-ii-exploited-to-steal-microsoft-credentials/
Death of Queen Elizabeth II exploited to steal Microsoft credentials

GitHub - Accenture/Codecepticon

https://github.com/Accenture/Codecepticon
GitHub - Accenture/Codecepticon

Three Iranian Nationals Charged with Engaging in Computer Intrusions and Ransomware-Style Extortion Against U.S. Critical Infrastructure Providers | OPA | Department of Justice

https://www.justice.gov/opa/pr/three-iranian-nationals-charged-engaging-computer-intrusions-and-ransomware-style-extortion
Three Iranian Nationals Charged with Engaging in Computer Intrusions and Ransomware-Style Extortion Against U.S. Critical Infrastructure Providers | OPA | Department of Justice

Hackers now use ‘sock puppets’ for more realistic phishing attacks

https://www.bleepingcomputer.com/news/security/hackers-now-use-sock-puppets-for-more-realistic-phishing-attacks/
Hackers now use ‘sock puppets’ for more realistic phishing attacks

Iranian Cyber Actors Exploit Known Vulnerabilities to Extort U.S. Critical Infrastructure Organizations, Other Victims > National Security Agency/Central Security Service > Press Release View

https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3157562/iranian-cyber-actors-exploit-known-vulnerabilities-to-extort-us-critical-infras/
Iranian Cyber Actors Exploit Known Vulnerabilities to Extort U.S. Critical Infrastructure Organizations, Other Victims > National Security Agency/Central Security Service > Press Release View