04/09

Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System | by Theori Vulnerability Research | Apr, 2024 | Theori BLOG

https://blog.theori.io/chaining-n-days-to-compromise-all-part-3-windows-driver-lpe-medium-to-system-12f7821d97bb?source=social.tw
Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System | by Theori Vulnerability Research | Apr, 2024 | Theori BLOG

GMER - the art of exposing Windows rootkits in kernel mode | A blog about rootkits research and the Windows kernel

https://artemonsecurity.blogspot.com/2024/04/gmer-art-of-exposing-windows-rootkits.html
GMER - the art of exposing Windows rootkits in kernel mode | A blog about rootkits research and the Windows kernel

Speakers | OffensiveCon

https://www.offensivecon.org/speakers/
Speakers | OffensiveCon

10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet

https://thehackernews.com/2024/04/10-year-old-rubycarp-romanian-hacker.html
10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet

Over 90,000 LG Smart TVs may be exposed to remote attacks

https://www.bleepingcomputer.com/news/security/over-90-000-lg-smart-tvs-may-be-exposed-to-remote-attacks/
Over 90,000 LG Smart TVs may be exposed to remote attacks

Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs

https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2024-patch-tuesday-fixes-150-security-flaws-67-rces/
Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs

Targus discloses cyberattack after hackers detected on file servers

https://www.bleepingcomputer.com/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/
Targus discloses cyberattack after hackers detected on file servers

GHC-SCW: Ransomware gang stole health data of 533,000 people

https://www.bleepingcomputer.com/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/
GHC-SCW: Ransomware gang stole health data of 533,000 people

Ransomware gang’s new extortion trick? Calling the front desk | TechCrunch

https://techcrunch.com/2024/04/09/ransomware-gang-fail-calling-front-desk-extortion/
Ransomware gang’s new extortion trick? Calling the front desk | TechCrunch

New SharePoint flaws help hackers evade detection when stealing files

https://www.bleepingcomputer.com/news/security/new-sharepoint-flaws-help-hackers-evade-detection-when-stealing-files/
New SharePoint flaws help hackers evade detection when stealing files

Tapping into the potential of Memory Dump Emulation

https://blahcat.github.io/posts/2024/01/27/tapping-into-the-potential-of-memory-dump-emulation.html
Tapping into the potential of Memory Dump Emulation

Emulate to Exploitate

https://exploitthis.ctfd.io
Emulate to Exploitate

Security Update Guide - Microsoft

https://msft.it/60119yPTS
Security Update Guide - Microsoft

#100DaysofYARA 2024 – Day 100 – MAILSLOT – Cyber Poking

https://cyberpoking.com/2024/04/09/100daysofyara-2024-day-100-mailslot/
#100DaysofYARA 2024 – Day 100 – MAILSLOT – Cyber Poking

🔃 Security Update Guide - Loading - Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228
🔃 Security Update Guide - Loading - Microsoft

CVS Group Restoring Systems Impacted by Cyberattack - SecurityWeek

https://www.securityweek.com/cvs-group-restoring-systems-impacted-by-cyberattack/
CVS Group Restoring Systems Impacted by Cyberattack - SecurityWeek

35-year long identity theft leads to imprisonment for victim | Malwarebytes

https://www.malwarebytes.com/blog/news/2024/04/35-year-long-identity-theft-leads-to-imprisonment-for-victim
35-year long identity theft leads to imprisonment for victim | Malwarebytes

Critical Rust flaw enables Windows command injection attacks

https://www.bleepingcomputer.com/news/security/critical-rust-flaw-enables-windows-command-injection-attacks/
Critical Rust flaw enables Windows command injection attacks

Shazzer - Shared online fuzzing

https://shazzer.co.uk/
Shazzer - Shared online fuzzing

Zyxel USG SSH Backdoor Attempt | GreyNoise Visualizer

https://viz.greynoise.io/tags/zyxel-usg-ssh-backdoor-attempt?days=10
Zyxel USG SSH Backdoor Attempt | GreyNoise Visualizer

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

https://thehackernews.com/2024/04/attackers-using-obfuscation-tools-to.html
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

bochscpu-python/examples/long_mode_emulate_windows_udump.py at main · hugsy/bochscpu-python · GitHub

https://github.com/hugsy/bochscpu-python/blob/main/examples/long_mode_emulate_windows_udump.py
bochscpu-python/examples/long_mode_emulate_windows_udump.py at main · hugsy/bochscpu-python · GitHub

ScrubCrypt used to drop VenomRAT along with many malicious plugins

https://securityaffairs.com/161639/cyber-crime/scrubcrypt-venomrat-plugins.html
ScrubCrypt used to drop VenomRAT along with many malicious plugins

CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks

https://securityonline.info/cve-2024-24576-cvss-10-rust-flaw-exposes-windows-systems-to-command-injection-attacks/
CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks

Crowdfense is offering a larger $30M exploit acquisition program

https://securityaffairs.com/161584/hacking/crowdfense-30m-exploit-acquisition-program.html
Crowdfense is offering a larger $30M exploit acquisition program

Microsoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988) - Help Net Security

https://www.helpnetsecurity.com/2024/04/09/april-2024-patch-tuesday-cve-2024-29988/
Microsoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988) - Help Net Security

Quick References | The Cyber Yeti

https://www.thecyberyeti.com/quick-references
Quick References | The Cyber Yeti

Microsoft BitLocker Bypasses are Practical – Compass Security Blog

https://blog.compass-security.com/2024/02/microsoft-bitlocker-bypasses-are-practical/
Microsoft BitLocker Bypasses are Practical – Compass Security Blog

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

https://thehackernews.com/2024/04/hackers-targeting-human-rights.html
Hackers Targeting Human Rights Activists in Morocco and Western Sahara

Webinar Registration - Zoom

https://us06web.zoom.us/webinar/register/WN_GjWVolQiRDi7zdLA9gJgWg
Webinar Registration - Zoom

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

https://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

Samuel Groß | OffensiveCon

https://www.offensivecon.org/speakers/2024/samuel-gro%C3%9F.html
Samuel Groß | OffensiveCon

Zero Day Initiative — The April 2024 Security Updates Review

https://www.zerodayinitiative.com/blog/2024/4/9/the-april-2024-security-updates-review
Zero Day Initiative — The April 2024 Security Updates Review

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

https://thehackernews.com/2024/04/researchers-discover-lg-smart-tv.html
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

ICS Patch Tuesday: Siemens Addresses Palo Alto Networks Product Vulnerabilities - SecurityWeek

https://www.securityweek.com/ics-patch-tuesday-siemens-addresses-palo-alto-networks-product-vulnerabilities/
ICS Patch Tuesday: Siemens Addresses Palo Alto Networks Product Vulnerabilities - SecurityWeek

Charles Fol | OffensiveCon

https://www.offensivecon.org/speakers/2024/charles-fol.html
Charles Fol | OffensiveCon

#OBTS v7.0

https://objectivebythesea.org/v7/index.html
#OBTS v7.0