home.social

#infosecexchange — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #infosecexchange, aggregated by home.social.

  1. I just got the "please enable 2FA" message on #InfosecExchange

    While I fully support this message, I wonder how to do this with a shared account/team/org account? E.g in my case the @OSCo account?

    @jerry, @Mastodon any ideas or pointers

    #Mastdon

  2. Hey everyone! Just FYI, I am going to be changing my username on here to @ cyberseckyle. Of course, as y'all know, I am going to have to create a new account. 😒

    Be on the lookout for this change and me refriending you during the upcoming days.

    Thanks!

    #Mastodon #Fediverse #FediFriends #SocialMedia #InfosecExchange #CybersecKyle

  3. Posted about it yesterday already. But it looks like archive.today shows the default page of #Apache #webserver on #Ubuntu. The alternative domain name archive.is instead redirects with a 301 - Moved Permanently to a new domain krola.org, a website apparently comparing pet rabbit species?? It's also interesting, that the redirect to the new domain responds with an #HTTP header server: nginx/1.18 (Ubuntu). Apparently, the default Apache landing page also returns the same HTTP header information on the server. Perhaps the landing page is a decoy/deflection?

    Anyone on #infosecexchange has any speculations on the website?

    #InternetArchive #ArchiveOrg #ArchiveToday #InfoSec #AskFedi #AskMastodon #AskMastodonMondays #AskInfosec

  4. @bazkie I am inclined to go to #infosecexchange but they also block Threads - The #mit server has a 500 limit so that's out.

    Hummm - No wonder people have problems joining #Mastodon

    Where is #JohnMastodon when you need him!?

    #infosec #security #cybersecurity #risk #fedi22

  5. The optics of two Harvard CEO's & another #FreeWebHostingCulture rival platform as a ' deal maker / decider of their fates who is $2+B in debt ' side by side while their #malware platforms shed users via the products/services decline is an interesting visual for kicking off 2025.

    🔥☣️🔥☣️🔥☣️🔥☣️🔥

    #infosec #InfoSeceXchange

  6. Publishing a video to the #Glassof0J peertube on #infosecexchange now!

    video.infosec.exchange/c/glass

    Going to be working on uploading all the youtube videos to peertube so be on the lookout for new uploads and a lot of opportunities to rewatch favorite episodes or discover past conversations.

    This one is with @dnsprincess from 2023 for the #WoldWideWarDrive #WWWD

  7. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on IPs LARGE LIST

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on these IPs LARGE LIST hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    40.115.118.6

    ²
    40.115.117.30

    ³ (fast .ly)
    151.101.41.184


    172.56.140.14


    173.194.166.106


    173.194.166.106


    199.232.92.157

    ⁸ Twitter
    104.244.42.66


    151.101.190.110

    ¹⁰
    138.91.55.166

    ¹¹
    192.229.173.16

    ¹² Twitter
    104.244.42.139

    ¹³
    173.194.166.171

    ¹⁴
    152.199.24.185

    ¹⁵
    165.254.198.210

    ¹⁶ Fast .ly
    151.101.42.2

    ¹⁷ Twitter
    104.244.42.70

    ¹⁸ Fast .ly
    151.101.40.193

    ¹⁹ Twitter
    104.244.42.134

    ²⁰ Fast .ly
    151.101.40.84

    ²¹
    216.239.34.117

    ²²
    104.26.2.192

    ²³
    104.26.3.192

    ²⁴
    172.67.72.251

    ²⁵
    redirect.redhat.com

    ²⁶
    192.229.210.163

    ²⁷
    172.67.28.154

    ²⁸
    104.18.10.19

    ²⁹
    104.244.42.69

    ³⁰
    944ellb0102-vip01.blackmesh.com

    ³¹
    151.101.41.67

    ³² Fast .ly
    151.101.40.81

    ³³
    104.26.10.153

    ³⁴
    151.101.41.188

    ³⁵
    104.26.13.149

    ³⁶
    104.26.12.149

    ³⁷
    63.241.199.113

    ³⁸ Local ISP exploit try ip (private)
    192.0.66.2

    ³⁹
    162.159.153.4

    ⁴⁰
    104.18.16.202

    ⁴¹
    104.26.3.29

    ⁴²
    104.26.2.29

    ⁴³ NYC Twitter
    72.21.91.70

    ⁴⁴ Fast .ly
    151.101.2.187

    ⁴⁵ Fast .ly
    151.101.66.187

    ⁴⁶
    13.86.218.255

    ⁴⁷
    209.234.235.188

    ⁴⁸
    104.26.15.185

    ⁴⁹
    172.67.69.125

    ⁵⁰
    52.239.139.228

    ⁵¹
    104.17.83.11

    ⁵²
    104.17.32.62

    ⁵³
    104.244.42.130

    ⁵⁴
    20.189.172.0

    ⁵⁵
    172.67.222.28

    ⁵⁶
    151.101.41.73

    ⁵⁷
    13.86.218.248

    ⁵⁸
    104.27.203.89

    ⁵⁹
    104.16.13.194

    ⁶⁰
    104.244.42.133

    ⁶¹
    151.101.130.132

    ⁶²
    172.67.73.80

    ⁶³
    104.26.6.15

    ⁶⁴
    104.22.33.123

    ⁶⁵
    dns11.quad9.net

    ⁶⁶
    104.244.42.198

    ⁶⁷
    104.244.42.2

    ⁶⁸
    104.244.43.131

    ⁶⁹
    208.54.152.122

    ⁷⁰
    208.54.150.98

    ⁷¹
    52.236.40.36

    ⁷²
    104.18.23.15

    ⁷³
    104.26.1.5

    ⁷⁴
    172.67.71.43

    ⁷⁵
    199.232.93.184

    ⁷⁶
    151.101.2.217

    ⁷⁷
    199.232.92.81

    ⁷⁸
    104.26.0.5

    ⁷⁹
    151.101.130.217

    ⁸⁰
    151.101.66.217

    ⁸¹
    104.26.6.18

    ⁸²
    104.18.22.15

    ⁸³
    104.26.7.18

    ⁸⁴
    104.21.78.132

    ⁸⁵
    104.244.42.6

    ⁸⁶
    199.232.92.200

    ⁸⁷
    20.60.40.36

    ⁸⁸
    52.245.40.74

    ⁸⁹
    104.244.42.194

    ⁹⁰
    199.232.94.110

    ⁹¹
    172.67.72.57

    ⁹²
    192.229.173.16

    ⁹³
    104.244.42.193

    ⁹⁴
    208.54.106.98

    ⁹⁵
    104.244.42.65

    ⁹⁶
    104.244.42.193

    ⁹⁷
    151.101.67.52

    ⁹⁸
    104.244.42.3

    ⁹⁹
    151.101.67.52

    ¹⁰⁰
    104.244.42.1

    ¹⁰¹
    192.229.173.16

    ¹⁰²
    151.101.40.159

    ¹⁰³
    104.244.42.11

    ¹⁰⁴
    152.199.24.185

    ¹⁰⁵
    152.199.24.185

    This is just # attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  8. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #CloudFront
  9. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #akamai

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #akamai hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    a23-2-76-180.deploy.static.akamaitechnologies.com

    ²
    a96-7-153-84.deploy.static.akamaitechnologies.com

    ³
    a104-86-4-102.deploy.static.akamaitechnologies.com


    a184-31-10-236.deploy.static.akamaitechnologies.com


    a96-6-226-157.deploy.static.akamaitechnologies.com


    a23-50-34-13.deploy.static.akamaitechnologies.com


    a23-15-137-146.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com

    ¹⁰
    a23-11-22-101.deploy.static.akamaitechnologies.com

    ¹¹
    a23-59-206-230.deploy.static.akamaitechnologies.com

    ¹²
    a104-125-55-184.deploy.static.akamaitechnologies.com

    ¹³
    a23-78-154-233.deploy.static.akamaitechnologies.com

    ¹⁴
    a23-7-132-30.deploy.static.akamaitechnologies.com

    ¹⁵
    a104-86-104-224.deploy.static.akamaitechnologies.com

    ¹⁶
    a104-122-42-39.deploy.static.akamaitechnologies.com

    ¹⁷
    a23-202-60-225.deploy.static.akamaitechnologies.com

    ¹⁸
    a104-86-184-250.deploy.static.akamaitechnologies.com

    ¹⁹
    a184-51-48-250.deploy.static.akamaitechnologies.com

    ²⁰
    a104-121-159-217.deploy.static.akamaitechnologies.com

    ²¹
    a104-121-159-225.deploy.static.akamaitechnologies.com

    ²²
    a104-84-227-133.deploy.static.akamaitechnologies.com

    ²³
    a23-42-151-231.deploy.static.akamaitechnologies.com

    ²⁴
    a23-40-167-73.deploy.static.akamaitechnologies.com

    ²⁵
    a23-223-16-122.deploy.static.akamaitechnologies.com

    ²⁶
    a184-31-10-237.deploy.static.akamaitechnologies.com

    ²⁷
    a23-48-32-80.deploy.static.akamaitechnologies.com

    ²⁸
    a23-48-32-75.deploy.static.akamaitechnologies.com

    ²⁹
    a173-222-162-31.deploy.static.akamaitechnologies.com

    ³⁰
    a23-45-32-210.deploy.static.akamaitechnologies.com

    ³¹
    a184-30-164-84.deploy.static.akamaitechnologies.com

    ³²
    a23-59-200-173.deploy.static.akamaitechnologies.com

    ³³
    a23-43-191-224.deploy.static.akamaitechnologies.com

    This is just #akamai attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  10. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #Google

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #Google hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    sfo07s13-in-f174.1e100.net

    ²
    159.240.178.107.bc.googleusercontent.com

    ³
    25.25.190.35.bc.googleusercontent.com


    51.241.186.35.bc.googleusercontent.com


    183.34.211.130.bc.googleusercontent.com


    173.194.166.198


    74.125.166.169


    173.194.166.106


    173.194.167.9

    ¹⁰
    142.250.138.97

    ¹¹
    142.250.138.95

    ¹²
    142.250.138.94

    ¹³
    142.250.114.97

    ¹⁴
    142.250.138.100

    ¹⁵
    142.250.138.101

    ¹⁶
    142.250.138.138

    ¹⁷
    142.250.138.139

    ¹⁸
    142.250.138.113

    ¹⁹
    142.250.114.95

    ²⁰
    142.250.138.102

    ²¹
    sfo07s16-in-f78.1e100.net

    ²²
    dns.google

    ²³
    74.125.20.94

    ²⁴
    142.250.101.188

    ²⁵
    172.253.112.188

    ²⁶
    238.105.188.35.bc.googleusercontent.com

    ²⁷
    sfo03s26-in-f10.1e100.net

    ²⁷
    sfo03s25-in-f10.1e100.net

    ²⁸
    sfo03s24-in-f10.1e100.net

    ²⁹
    nuq04s45-in-f10.1e100.net

    ³⁰
    sfo03s27-in-f10.1e100.net

    ³¹
    sfo03s21-in-f10.1e100.net

    ³²
    nuq04s42-in-f10.1e100.net

    ³³
    nuq04s39-in-f10.1e100.net

    ³⁴
    sfo03s18-in-f10.1e100.net

    ³⁵
    142.250.176.10

    ³⁶
    lax17s50-in-f3.1e100.net

    ³⁷
    sfo03s33-in-f10.1e100.net

    ³⁸
    142.251.46.163

    This is just #Google attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  11. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #AWS

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER & #EU on #AWS hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com

    ²
    ec2-52-42-61-176.us-west-2.compute.amazonaws.com

    ³
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com


    ec2-44-236-58-13.us-west-2.compute.amazonaws.com


    ec2-44-240-164-68.us-west-2.compute.amazonaws.com


    ec2-52-41-118-210.us-west-2.compute.amazonaws.com


    ec2-52-35-177-24.us-west-2.compute.amazonaws.com


    35.82.205.248


    ec2-54-191-45-53.us-west-2.compute.amazonaws.com

    ¹⁰
    ec2-44-241-110-131.us-west-2.compute.amazonaws.com

    ¹¹
    ec2-35-82-235-74.us-west-2.compute.amazonaws.com

    ¹²
    ec2-54-68-18-200.us-west-2.compute.amazonaws.com

    ¹³
    ec2-54-184-79-208.us-west-2.compute.amazonaws.com

    ¹⁴
    ec2-52-10-247-144.us-west-2.compute.amazonaws.com

    ¹⁵
    ec2-54-186-72-30.us-west-2.compute.amazonaws.com

    ¹⁶
    ec2-13-234-145-166.ap-south-1.compute.amazonaws.com

    ¹⁷
    ec2-52-21-175-83.compute-1.amazonaws.com

    ¹⁸
    ec2-44-229-72-171.us-west-2.compute.amazonaws.com

    ¹⁹
    ec2-44-230-23-250.us-west-2.compute.amazonaws.com

    ²⁰
    ec2-52-20-36-26.compute-1.amazonaws.com

    ²¹
    ec2-52-204-216-203.compute-1.amazonaws.com

    ²²
    ec2-13-235-220-86.ap-south-1.compute.amazonaws.com

    ²³
    ec2-18-235-29-229.compute-1.amazonaws.com

    ²⁴
    ec2-15-207-179-172.ap-south-1.compute.amazonaws.com

    ²⁵
    ec2-176-34-188-147.eu-west-1.compute.amazonaws.com

    ²⁶
    ec2-176-34-188-143.eu-west-1.compute.amazonaws.com

    ²⁷
    ec2-18-218-105-211.us-east-2.compute.amazonaws.com

    ²⁸
    ec2-3-21-177-140.us-east-2.compute.amazonaws.com

    ²⁹
    ec2-34-205-198-58.compute-1.amazonaws.com

    ³⁰
    ec2-3-20-61-88.us-east-2.compute.amazonaws.com

    ³¹
    ec2-13-59-255-164.us-east-2.compute.amazonaws.com

    ³²
    ec2-3-221-252-182.compute-1.amazonaws.com

    ³³
    ec2-54-236-219-191.compute-1.amazonaws.com

    ³⁴
    ec2-18-156-155-177.eu-central-1.compute.amazonaws.com

    ³⁵
    ec2-34-212-53-52.us-west-2.compute.amazonaws.com

    ³⁶
    ec2-54-246-112-81.eu-west-1.compute.amazonaws.com

    ³⁷
    ec2-54-217-236-154.eu-west-1.compute.amazonaws.com

    ³⁸
    ec2-46-137-158-3.eu-west-1.compute.amazonaws.com

    ³⁹
    ec2-176-34-105-145.eu-west-1.compute.amazonaws.com

    ⁴⁰
    ec2-52-0-252-134.compute-1.amazonaws.com

    ⁴¹
    ec2-176-34-123-171.eu-west-1.compute.amazonaws.com

    ⁴²
    ec2-54-228-232-250.eu-west-1.compute.amazonaws.com

    ⁴³
    ec2-54-217-245-217.eu-west-1.compute.amazonaws.com

    ⁴⁴
    ec2-52-0-252-1.compute-1.amazonaws.com

    ⁴⁵
    ec2-52-0-252-3.compute-1.amazonaws.com

    ⁴⁶
    ec2-52-0-252-2.compute-1.amazonaws.com

    ⁴⁷
    ec2-54-246-123-138.eu-west-1.compute.amazonaws.com

    ⁴⁸
    ec2-54-191-65-148.us-west-2.compute.amazonaws.com

    This is just #AWS attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  12. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #BunnyNet via #DataPacket

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    143-244-49-183.bunnyinfra.net

    ²
    143-244-50-83.bunnyinfra.net

    ³
    169.150.221.147


    143-244-50-88.bunnyinfra.net


    143-244-50-211.bunnyinfra.net


    169-150-249-163.bunnyinfra.net


    169-150-221-147.bunnyinfra.net


    143-244-50-82.bunnyinfra.net


    143-244-50-213.bunnyinfra.net

    ¹⁰
    143-244-50-209.bunnyinfra.net

    ¹¹
    143-244-49-180.bunnyinfra.net

    ¹²
    143.244.50.214

    ¹³
    185-93-1-251.bunnyinfra.net

    ¹⁴
    unn-169-150-249-163.datapacket.com

    ¹⁵
    unn-169-150-249-165.datapacket.com

    ¹⁶
    unn-169-150-249-164.datapacket.com

    ¹⁷
    unn-169-150-249-166.datapacket.com

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  13. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.

  14. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.

  15. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.

  16. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.

  17. Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.

    One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.

    #Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin

    Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.

  18. "🚨 Critical #VMware Vulnerabilities Alert! 🚨 - Patch Now to Shield Your Virtual Environments 🛡️💻"

    VMware has patched multiple critical vulnerabilities across its #VMware_ESXi, #VMware_Workstation, and #VMWare_Fusion products, including #CVE-2024-22252, #CVE-2024-22253, #CVE-2024-22254, and #CVE-2024-22255. These flaws span from use-after-free issues in both XHCI and UHCI USB controllers to an out-of-bounds write in ESXi, potentially allowing malicious actors with local administrative privileges to execute code or leak sensitive memory information from the host system. The severity of these vulnerabilities cannot be overstated, as they could lead to sandbox escape and unauthorized code execution on the host machine. This is especially worrisome when CVE-2024-22254 would be chained with CVE-2024-22252. VMware users are strongly urged to apply these updates to mitigate the risks associated with these vulnerabilities.

    Ensure your systems are patched to avoid becoming a foothold for attackers.

    Sources: VMware Security Advisory, The Hacker News

    Tags: #Cybersecurity #InfoSec #Patching #VirtualizationSecurity #VulnerabilityManagement #InfosecExchange 🌍🔑🛡️

  19. "🔐 #KeyTrap DoS: The DNSSEC Dilemma - A 25-Year-Old Design Flaw Exposed 🚨"

    In a groundbreaking discovery, researchers from the National Research Center for Applied Cybersecurity ATHENE have unveiled #KeyTrap (CVE-2023-50387), a critical flaw in DNSSEC's design that could bring the internet to its knees. With a severity rating of 7.5/10, this flaw in DNSSEC has been lurking since 1999, and affects 31% of global DNSSEC-validating DNS resolvers, risking widespread internet service disruptions. KeyTrap, an Algorithmic Complexity Attack, can overload a DNS server with a single packet, stalling major DNS providers like Google and Cloudflare for up to 16 hours. This vulnerability not only jeopardizes internet access but could also cripple essential security mechanisms like anti-spam defenses and PKI. Despite patches being rolled out, a permanent fix may necessitate a DNSSEC standard overhaul. 🌍💻🛡️

    CVE Details: mitre & nvd

    Tags: #CyberSecurity #DNSSEC #Vulnerability #InternetSafety #PatchNow #TechNews #InfoSecExchange #SecurityFlaw #DigitalInfrastructure 🚀🔒💡

    Source: ATHENE Press Portal

  20. "🚨 #QNAPAlert: Multiple Vulnerabilities Unveiled Across QNAP Devices 🚨"

    Recent security advisories highlight critical vulnerabilities in QNAP NAS systems, potentially affecting thousands of users globally. These flaws range from command injection to SQL injection. 🛡️💻

    Highlights:

    • QSA-23-47 addresses a command injection vulnerability, enabling attackers to execute arbitrary commands.
    • QSA-23-30 and QSA-24-03 reveal OS injection and improper access control issues.
    • QSA-24-05 warns of an OS command and SQL injection vulnerability flaw, granting authenticated users to inject malicious code via a network vector.

    Mitigation: Users are urged to update their devices immediately to the latest firmware to protect against these vulnerabilities.

    Tags: #CyberSecurity #Vulnerability #QNAP #NAS #CommandInjection #SQLInjection #DataProtection #FirmwareUpdate 🛠️🔐

    Source: QNAP Security Advisories & HKCERT Bulletin

    #InfoSecExchange #TechTalks 💬🔍

  21. "⚠️ Alert: Google Chrome Zero-Day CVE-2023-7024 Exploited in the Wild! 🌐💥"

    Google's latest patch addresses a critical zero-day vulnerability in Chrome, CVE-2023-7024. Identified as a heap-based buffer overflow in WebRTC, it's exploited in the wild. Chrome versions before 120.0.6099.129 are vulnerable. 🚨

    Details: CVE-2023-7024, discovered by Google TAG, affects several browsers using WebRTC. It's the eighth zero-day patched by Google this year, underscoring the evolving cybersecurity landscape.

    Mitigation: Users should urgently update to Chrome 120.0.6099.129/130 (for Windows) or 120.0.6099.129 (for Mac/Linux) to protect against this and other security fixes included in recent Chrome updates. 🛡️

    Source: Qualys ThreatPROTECT by Diksha Ojha; Chrome Releases Blog

    Tags: #Cybersecurity #GoogleChrome #ZeroDay #CVE2023 #WebRTC #UpdateNow #CyberAttack #InfoSecExchange

  22. Here is an #introduction post of sorts!

    Maybe some of you have already been following me. In case you weren’t, don’t know who I am, or want to know more: Fear not!

    I’m just a chonky purple raccoon that loves carbs and deadlifts! (My avatar has a name! It’s “Mittens”!)

    That’s it! That’s the post. 👋

    But, no… For real! My name is Stacy and I’m a Senior Solutions Engineer. I currently work in Cybersecurity Education and Training, but prior to that, I’d worked as an Information Security Analyst for a CISO of a sizable financial organization and was a Security Engineer and Solutions engineer at two other cybersecurity vendors, respectively.

    I like to say I “specialize” in Security Strategy, Leadership, Security Awareness, Mitigating Human Risk, as well as high-level Cloud and DevSecOps Security and Compliance.

    Aside from all that, I enjoy public speaking, learning new things, solving problems, creating art, making comics, writing blogs and stories, working out, powerlifting (aka picking up heavy things and putting them down again), playing video games, watching animation and anime, cosplaying, hanging out with my partner (who is a pentester), and doing the most good!

    Now that you know what gets me that sweet, sweet dopamine, you may also be interested in knowing what I’m passionate about: Diversity, equity, inclusion, mental health, and advocating to minimize harassment, discrimination, bigotry, abuse, domestic violence, and sexual assault.

    Anyway! It’s great to see an amazing #infosec #community being built here!

    (Note: I don’t *always* post about work or infosec-related stuff, especially when I’m not at work (as to not burn myself out), so expect a slice of life and variety of things from me!)

    #infosecexchange #informationsecurity #cybersecurity #artist #writer #powerlifter #engineer #womenwholift #wehackhealth #infosecsie