08/08

r-tec Blog | Evade signature-based phishing detections - r-tec Cyber Security

https://www.r-tec.net/r-tec-blog-evade-signature-based-phishing-detections.html
r-tec Blog | Evade signature-based phishing detections - r-tec Cyber Security

Webinar Registration - Zoom

https://ghst.ly/3Om0jDo
Webinar Registration - Zoom

BloodHound Community Edition: A New Era | by Andy Robbins | Aug, 2023 | Posts By SpecterOps Team Members

https://posts.specterops.io/bloodhound-community-edition-a-new-era-d64689806e90
BloodHound Community Edition: A New Era | by Andy Robbins | Aug, 2023 | Posts By SpecterOps Team Members

https://github.com/SpecterOps/BloodHound/raw/main/examples/docker-compose/docker-compose.yml

https://github.com/SpecterOps/BloodHound/raw/main/examples/docker-compose/docker-compose.yml

China hacked Japan’s classified defense cyber networks, officials say - The Washington Post

https://www.washingtonpost.com/national-security/2023/08/07/china-japan-hack-pentagon/
China hacked Japan’s classified defense cyber networks, officials say - The Washington Post

LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes

https://thehackernews.com/2023/08/lolbas-in-wild-11-living-off-land.html
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes

QakBot Malware Operators Expand C2 Network with 15 New Servers

https://thehackernews.com/2023/08/qakbot-malware-operators-expand-c2.html
QakBot Malware Operators Expand C2 Network with 15 New Servers

Ozzie Osband, Originator of "3-2-1" Telephone Area Code and "Rocket Hobo," Passes Away at 72

https://talkoftitusville.com/2023/08/06/ozzie-osband-originator-of-3-2-1-telephone-area-code-and-rocket-hobo-passes-away-at-72/
Ozzie Osband, Originator of "3-2-1" Telephone Area Code and "Rocket Hobo," Passes Away at 72

Black Hat Preview: The Business of Cyber Takes Center Stage - SecurityWeek

https://www.securityweek.com/black-hat-preview-the-business-of-cyber-takes-center-stage/
Black Hat Preview: The Business of Cyber Takes Center Stage - SecurityWeek

Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws

https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2023-patch-tuesday-warns-of-2-zero-days-87-flaws/
Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws

How we made $5000 with this exploit - YouTube

https://www.youtube.com/watch?v=Wgo3bGv6KqI
How we made $5000 with this exploit - YouTube

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

https://thehackernews.com/2023/08/new-yashma-ransomware-variant-targets.html
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

Intel BIOS Advisory – Memory Corruption in HID Drivers  | NCC Group Research Blog | Making the world safer and more secure

https://research.nccgroup.com/2023/08/08/intel-bios-advisory-memory-corruption-in-hid-drivers/
Intel BIOS Advisory – Memory Corruption in HID Drivers  | NCC Group Research Blog | Making the world safer and more secure

DEF CON 31 Living Next Door to Russia

https://info.defcon.org/event/?id=50859
DEF CON 31 Living Next Door to Russia

Understanding Active Directory Attack Paths to Improve Security

https://thehackernews.com/2023/08/understanding-active-directory-attack.html
Understanding Active Directory Attack Paths to Improve Security

Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899) | Soroush Dalili (@irsdl) Blog

https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/
Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899) | Soroush Dalili (@irsdl) Blog

Android 14 to let you block connections to unencrypted cellular networks

https://www.bleepingcomputer.com/news/google/android-14-to-block-connections-to-unencrypted-cellular-networks/
Android 14 to let you block connections to unencrypted cellular networks

Interpol takes down 16shop phishing-as-a-service platform

https://www.bleepingcomputer.com/news/security/interpol-takes-down-16shop-phishing-as-a-service-platform/
Interpol takes down 16shop phishing-as-a-service platform

Hackers increasingly abuse Cloudflare Tunnels for stealthy connections

https://www.bleepingcomputer.com/news/security/hackers-increasingly-abuse-cloudflare-tunnels-for-stealthy-connections/
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections

New Downfall attacks on Intel CPUs steal encryption keys, data

https://www.bleepingcomputer.com/news/security/new-downfall-attacks-on-intel-cpus-steal-encryption-keys-data/
New Downfall attacks on Intel CPUs steal encryption keys, data

Notorious phishing platform shut down, arrests in international police operation

https://www.interpol.int/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation
Notorious phishing platform shut down, arrests in international police operation

https://redsiege.com/jargon

https://redsiege.com/jargon

Authorities Warn Health Sector of Attacks by Rhysida Group

https://www.healthcareinfosecurity.com/authorities-warn-health-sector-attacks-by-rhysida-group-a-22753
Authorities Warn Health Sector of Attacks by Rhysida Group

20230808_press.pdf

https://www.npa.go.jp/bureau/cyber/pdf/20230808_press.pdf
20230808_press.pdf

Google Online Security Blog: Downfall and Zenbleed: Googlers helping secure the ecosystem

https://security.googleblog.com/2023/08/downfall-and-zenbleed-googlers-helping.html
Google Online Security Blog: Downfall and Zenbleed: Googlers helping secure the ecosystem

New Inception attack leaks sensitive data from all AMD Zen CPUs

https://www.bleepingcomputer.com/news/security/new-inception-attack-leaks-secrets-from-all-amd-zen-cpus/
New Inception attack leaks sensitive data from all AMD Zen CPUs

CVE-2023-39526: Critical SQL injection in PrestaShop

https://securityonline.info/cve-2023-39526-critical-sql-injection-in-prestashop/
CVE-2023-39526: Critical SQL injection in PrestaShop

eSentire | eSentire Threat Intelligence Malware Analysis: Raccoon…

https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-raccoon-stealer-v2-part-2
eSentire | eSentire Threat Intelligence Malware Analysis: Raccoon…

UK Electoral Commission data breach exposes 8 years of voter data

https://www.bleepingcomputer.com/news/security/uk-electoral-commission-data-breach-exposes-8-years-of-voter-data/
UK Electoral Commission data breach exposes 8 years of voter data

DNS Takeover Explained: Protect Your Online Domain | Trickest

https://trickest.com/blog/dns-takeover-explained-protect-your-online-domain/
DNS Takeover Explained: Protect Your Online Domain | Trickest

technical-report.pdf

https://ssu.gov.ua/uploads/files/DKIB/technical-report.pdf
technical-report.pdf

Honeypot Recon: New Variant of SkidMap Targeting Redis | Trustwave

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-recon-new-variant-of-skidmap-targeting-redis/
Honeypot Recon: New Variant of SkidMap Targeting Redis | Trustwave

TikTok facing fines for violating children’s privacy

https://www.malwarebytes.com/blog/news/2023/08/tiktok-facing-fines-for-violating-childrens-privacy
TikTok facing fines for violating children’s privacy

CVE-2023-34034 Spring WebFlux Security Bypass Write-up & PoC

https://jfrog.com/blog/spring-webflux-cve-2023-34034-write-up-and-proof-of-concept/
CVE-2023-34034 Spring WebFlux Security Bypass Write-up & PoC

RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale | Recorded Future

https://www.recordedfuture.com/redhotel-a-prolific-chinese-state-sponsored-group-operating-at-a-global-scale
RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale | Recorded Future

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns - SecurityWeek

https://www.securityweek.com/patch-tuesday-adobe-patches-30-acrobat-reader-vulns/
Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns - SecurityWeek

Microsoft Office update breaks actively exploited RCE attack chain

https://www.bleepingcomputer.com/news/security/microsoft-office-update-breaks-actively-exploited-rce-attack-chain/
Microsoft Office update breaks actively exploited RCE attack chain

Google Online Security Blog: Android 14 introduces first-of-its-kind cellular connectivity security features

https://security.googleblog.com/2023/08/android-14-introduces-first-of-its-kind.html
Google Online Security Blog: Android 14 introduces first-of-its-kind cellular connectivity security features

Hackers Abusing Cloudflare Tunnels for Covert Communications

https://thehackernews.com/2023/08/hackers-abusing-cloudflare-tunnels-for.html
Hackers Abusing Cloudflare Tunnels for Covert Communications

2022's most routinely exploited vulnerabilities—history repeats

https://www.malwarebytes.com/blog/news/2023/08/the-2022-top-routinely-exploited-vulnerabilities-history-repeats
2022's most routinely exploited vulnerabilities—history repeats