05/13

blacktraffic (blacktraffic) · GitHub

https://github.com/blacktraffic
blacktraffic (blacktraffic) · GitHub

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

https://thehackernews.com/2024/05/malicious-python-package-hides-sliver.html
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

escaping_the_safari_sandbox_slides.pdf

https://www.synacktiv.com/sites/default/files/2024-05/escaping_the_safari_sandbox_slides.pdf
escaping_the_safari_sandbox_slides.pdf

INC ransomware source code selling on hacking forums for $300,000

https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/
INC ransomware source code selling on hacking forums for $300,000

X

http://x.com/i/article/1789985692333805568
X

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

https://thehackernews.com/2024/05/severe-vulnerabilities-in-cinterion.html
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

https://thehackernews.com/2024/05/black-basta-ransomware-strikes-500.html
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

Hijacking & Spoofing Context Menu Options | mr.d0x

https://mrd0x.com/sentinelone-persistence-via-menu-context/
Hijacking & Spoofing Context Menu Options | mr.d0x

Visualizing ACLs with Adalanche

https://lsecqt.github.io/Red-Teaming-Army/active-directory/enumeration/visualizing-acls-with-adalanche/
Visualizing ACLs with Adalanche

PyPi package backdoors Macs using the Sliver pen-testing suite

https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/
PyPi package backdoors Macs using the Sliver pen-testing suite

GraphRunner: A Post-Exploitation Toolset for M365 - Black Hat USA 2024 | Arsenal Schedule

https://www.blackhat.com/us-24/arsenal/schedule/index.html#graphrunner-a-post-exploitation-toolset-for-m-38184
GraphRunner: A Post-Exploitation Toolset for M365 - Black Hat USA 2024 | Arsenal Schedule

Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS - SecurityWeek

https://www.securityweek.com/apple-patch-day-code-execution-flaws-in-iphones-ipads-macos/
Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS - SecurityWeek

Hackers use DNS tunneling for network scanning, tracking victims

https://www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/
Hackers use DNS tunneling for network scanning, tracking victims

Kerberos II - Credential Access

https://labs.lares.com/fear-kerberos-pt2/
Kerberos II - Credential Access

Apple backports fix for RTKit iOS zero-day to older iPhones

https://www.bleepingcomputer.com/news/apple/apple-backports-fix-for-rtkit-ios-zero-day-to-older-iphones/
Apple backports fix for RTKit iOS zero-day to older iPhones

Kerberos I - Overview

https://labs.lares.com/fear-kerberos-pt1/
Kerberos I - Overview

How Did Authorities Identify the Alleged Lockbit Boss? – Krebs on Security

https://krebsonsecurity.com/2024/05/how-did-authorities-identify-the-alleged-lockbit-boss/
How Did Authorities Identify the Alleged Lockbit Boss? – Krebs on Security

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices

https://thehackernews.com/2024/05/mitre-unveils-emb3d-threat-modeling.html
MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices