Aggregator
2022 Application Protection Report: In Expectation of Exfiltration
3 years ago
Learn how the threat landscape evolved in 2021 so you can tune your defenses to suit.
POC Released for Critical Cisco Vulnerability
3 years ago
Summary
An advisory from IBM's X-Force Research has uncovered an exploit proof of concept (PoC) involving a vulnerability in several Cisco SSL VPN devices.
Threat Type
Vulnerability
Overview
According IBM's X-Force Research team, a critical vulnerability in Cisco RV340/RV345 series SSL VPN devices has led to the discovery of a PoC that has been released to the public. Should this vulnerability be exploited, a unauthenticated remote adversary obtaining privileged arbitrary code execution. On February 11, 20
Managing Public Domain Names
3 years ago
Good practises for the management of public domain names owned by your organisation.
Log4j Bringing You Down? Try Infection Monkey?s New Log4Shell Attack Simulation
3 years ago
What if you could see how a real cyberattack might unfold in your network? Imagine the insights you would gain into your security posture if you could safely and easily simulate the behavior of malicious actors before they hit your defenses. That?s what the Infection Monkey does.
The Infection Monkey team
1day漏洞反推技巧实战(3) - 飘渺红尘✨
3 years ago
代码审计必备技能,github代码对比,写一笔: 搜索某开源组建漏洞,搜索出来某个版本rce: 通过消息得出:存在漏洞版本:1.10.10 ,修复漏洞版本1.10.11 去github寻找apache-airflow: 打开就是主分支: 切换到漏洞版本分支: 有两个办法: (1)https://gi
飘渺红尘✨
ssrf漏洞利用-攻击redis篇 - 飘渺红尘✨
3 years ago
ssrf深入利用,打redis,不仅仅是打redis,还可以做很多事情,用redis抛砖引玉 打redis重要的两个协议: (1)gopher协议 (2)dict协议 用http(s)判断出网: 如果出网,直接gopher://vps:port/,nc监听即可 机器不出网如何判断支持gopher协议
飘渺红尘✨
redis攻击篇-redis写文件 - 飘渺红尘✨
3 years ago
个人学习笔记1: 主题:redis写文件: 大量知识参考:http://redisdoc.com/ 查看redis所有配置选项 config get * 127.0.0.1:6379> CONFIG GET * 1) "dbfilename" 2) "dump.rdb" 3) "requirepas
飘渺红尘✨
RWCTF 4th Desperate Cat ASCII Jar Writeup
3 years ago
ascii jar构造之旅
美国国防部Thunderdome零信任原型正式启动
3 years ago
这是DISA的一小步,也是DoD的一大步。
我的 2021
3 years ago
2021 又是神奇的一年,因为组织架构调整,由内部安全建设转去做 toB,类似在大公司里创业。以前只是听说安全行业竞争激烈,赚不到钱,亲身入局之后,深感创业不易。近几年零信任很火,国内腾讯、阿里...
0x0d
PHP Everywhere Remote Code Execution
3 years ago
Summary
Wordfence has issued a report detailing a trio of vulnerabilities in the PHP Everywhere plugin for WordPress.
Threat Type
Vulnerabilities
Overview
A critical trio of vulnerabilities has been disclosed by Wordfence. The vulnerabilities could allow for an authenticated user, including subscribers and customers, to execute code on a vulnerable site. All three vulnerabilities, CVE-2022-24663, CVE-2022-24664, and CVE-2022-24665, have a critical rating with a 9.9 CVSS score. Should a website admin install
Exceptional Brand Experiences Go Far Beyond the 30-Second Super Bowl Ad
3 years ago
Super Bowl LVI is almost here, and with that comes one of my favorite pastimes: watching the commercials! And you know I?m not alone ? 30% of viewers tune in to the big game primarily to see the commercials, upping the pressure on CMOs to ?get it right.? But winning the hearts and minds of the more than 100 million anticipated viewers goes far beyond creating a captivating 30- or 60-second spot. In fact, the production, supporting digital assets, celebrity endorsements, talking animals, etc. just scratch the surface when it comes to delivering an exceptional brand experience.
Kim Salem-Jackson
Why You Shouldn't Tie IP Addresses to Tokens
3 years ago
Locking tokens to the client IP address might seem like a good way to prevent content theft, such as sharing of authenticated URLs that include tokens. It might even appear to work in small-scale test environments. However, the internet has evolved to a point where it?s quite common for clients to use multiple source IP addresses. This is especially true when a token is created by a server on one hostname (such as a CMS) but then validated by a server on another hostname, such as an Akamai edge server, when serving content.
Alex Balford & Erik Nygren
Welcome to Akamai TechDocs
3 years ago
We're pleased to announce the launch of Akamai?s brand-new documentation site: techdocs.akamai.com. Powered by ReadMe, our new site offers intuitive and interactive content designed to help you get the most out of your Akamai products.
Beth Favini
An Unprecedented Opportunity to Build Dynamic, Secure Broadband Access for All of the U.S.
3 years ago
All Americans, regardless of background or location, deserve a fast, safe, and reliable digital experience. Whether in Silicon Valley, rural Montana, or an underserved area in Chicago, entrepreneurs, businesses, and consumers should be on an equal footing online. Unfortunately, that is not the current reality, and the pandemic only amplified and exacerbated the existing digital divides we know so well.
Lauren Van Wazer & Robert Blumofe
FritzFrog: P2P Botnet Hops Back on the Scene
3 years ago
FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.
Ben Barnea, Shiran Guez & Ophir Harpaz
realworldctf 2022 hso writeup与nso iMessage 0click漏洞分析
3 years ago
sakura
CodeQL 数据流分析/污点分析 笔记(上篇)
3 years ago
sakura
Polkit本地提权 CVE-2021-4034分析与利用
3 years ago
polkit工具包里的pkexec命令由于越界读写导致内存损坏的本地提权漏洞