#infosecexchange — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #infosecexchange, aggregated by home.social.
-
I just got the "please enable 2FA" message on #InfosecExchange
While I fully support this message, I wonder how to do this with a shared account/team/org account? E.g in my case the @OSCo account?
-
Hey everyone! Just FYI, I am going to be changing my username on here to @ cyberseckyle. Of course, as y'all know, I am going to have to create a new account. 😒
Be on the lookout for this change and me refriending you during the upcoming days.
Thanks!
#Mastodon #Fediverse #FediFriends #SocialMedia #InfosecExchange #CybersecKyle
-
Posted about it yesterday already. But it looks like
archive.todayshows the default page of #Apache #webserver on #Ubuntu. The alternative domain namearchive.isinstead redirects with a301 - Moved Permanentlyto a new domainkrola.org, a website apparently comparing pet rabbit species?? It's also interesting, that the redirect to the new domain responds with an #HTTP headerserver: nginx/1.18 (Ubuntu). Apparently, the default Apache landing page also returns the same HTTP header information on the server. Perhaps the landing page is a decoy/deflection?Anyone on #infosecexchange has any speculations on the website?
#InternetArchive #ArchiveOrg #ArchiveToday #InfoSec #AskFedi #AskMastodon #AskMastodonMondays #AskInfosec
-
@bazkie I am inclined to go to #infosecexchange but they also block Threads - The #mit server has a 500 limit so that's out.
Hummm - No wonder people have problems joining #Mastodon
Where is #JohnMastodon when you need him!?
-
The optics of two Harvard CEO's & another #FreeWebHostingCulture rival platform as a ' deal maker / decider of their fates who is $2+B in debt ' side by side while their #malware platforms shed users via the products/services decline is an interesting visual for kicking off 2025.
🔥☣️🔥☣️🔥☣️🔥☣️🔥
-
Publishing a video to the #Glassof0J peertube on #infosecexchange now!
https://video.infosec.exchange/c/glassof0j/
Going to be working on uploading all the youtube videos to peertube so be on the lookout for new uploads and a lot of opportunities to rewatch favorite episodes or discover past conversations.
This one is with @dnsprincess from 2023 for the #WoldWideWarDrive #WWWD
-
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on IPs LARGE LIST
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on these IPs LARGE LIST hosting since November 2022ish for #Prosecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
40.115.118.6²
40.115.117.30³ (fast .ly)
151.101.41.184⁴
172.56.140.14⁵
173.194.166.106⁶
173.194.166.106⁷
199.232.92.157⁸ Twitter
104.244.42.66⁹
151.101.190.110¹⁰
138.91.55.166¹¹
192.229.173.16¹² Twitter
104.244.42.139¹³
173.194.166.171¹⁴
152.199.24.185¹⁵
165.254.198.210¹⁶ Fast .ly
151.101.42.2¹⁷ Twitter
104.244.42.70¹⁸ Fast .ly
151.101.40.193¹⁹ Twitter
104.244.42.134²⁰ Fast .ly
151.101.40.84²¹
216.239.34.117²²
104.26.2.192²³
104.26.3.192²⁴
172.67.72.251²⁵
redirect.redhat.com²⁶
192.229.210.163²⁷
172.67.28.154²⁸
104.18.10.19²⁹
104.244.42.69³⁰
944ellb0102-vip01.blackmesh.com³¹
151.101.41.67³² Fast .ly
151.101.40.81³³
104.26.10.153³⁴
151.101.41.188³⁵
104.26.13.149³⁶
104.26.12.149³⁷
63.241.199.113³⁸ Local ISP exploit try ip (private)
192.0.66.2³⁹
162.159.153.4⁴⁰
104.18.16.202⁴¹
104.26.3.29⁴²
104.26.2.29⁴³ NYC Twitter
72.21.91.70⁴⁴ Fast .ly
151.101.2.187⁴⁵ Fast .ly
151.101.66.187⁴⁶
13.86.218.255⁴⁷
209.234.235.188⁴⁸
104.26.15.185⁴⁹
172.67.69.125⁵⁰
52.239.139.228⁵¹
104.17.83.11⁵²
104.17.32.62⁵³
104.244.42.130⁵⁴
20.189.172.0⁵⁵
172.67.222.28⁵⁶
151.101.41.73⁵⁷
13.86.218.248⁵⁸
104.27.203.89⁵⁹
104.16.13.194⁶⁰
104.244.42.133⁶¹
151.101.130.132⁶²
172.67.73.80⁶³
104.26.6.15⁶⁴
104.22.33.123⁶⁵
dns11.quad9.net⁶⁶
104.244.42.198⁶⁷
104.244.42.2⁶⁸
104.244.43.131⁶⁹
208.54.152.122⁷⁰
208.54.150.98⁷¹
52.236.40.36⁷²
104.18.23.15⁷³
104.26.1.5⁷⁴
172.67.71.43⁷⁵
199.232.93.184⁷⁶
151.101.2.217⁷⁷
199.232.92.81⁷⁸
104.26.0.5⁷⁹
151.101.130.217⁸⁰
151.101.66.217⁸¹
104.26.6.18⁸²
104.18.22.15⁸³
104.26.7.18⁸⁴
104.21.78.132⁸⁵
104.244.42.6⁸⁶
199.232.92.200⁸⁷
20.60.40.36⁸⁸
52.245.40.74⁸⁹
104.244.42.194⁹⁰
199.232.94.110⁹¹
172.67.72.57⁹²
192.229.173.16⁹³
104.244.42.193⁹⁴
208.54.106.98⁹⁵
104.244.42.65⁹⁶
104.244.42.193⁹⁷
151.101.67.52⁹⁸
104.244.42.3⁹⁹
151.101.67.52¹⁰⁰
104.244.42.1¹⁰¹
192.229.173.16¹⁰²
151.101.40.159¹⁰³
104.244.42.11¹⁰⁴
152.199.24.185¹⁰⁵
152.199.24.185This is just # attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.
Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #CloudFront
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #CloudFront hosting since November 2022ish for #Prosecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
server-18-155-192-115.sfo53.r.cloudfront.net²
65.8.17.126³
65.8.166.214This is just #CloudFront attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.
Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #akamai
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #akamai hosting since November 2022ish for #Prosecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
a23-2-76-180.deploy.static.akamaitechnologies.com²
a96-7-153-84.deploy.static.akamaitechnologies.com³
a104-86-4-102.deploy.static.akamaitechnologies.com⁴
a184-31-10-236.deploy.static.akamaitechnologies.com⁵
a96-6-226-157.deploy.static.akamaitechnologies.com⁶
a23-50-34-13.deploy.static.akamaitechnologies.com⁷
a23-15-137-146.deploy.static.akamaitechnologies.com⁸
a23-213-123-78.deploy.static.akamaitechnologies.com⁹
a23-213-123-78.deploy.static.akamaitechnologies.com¹⁰
a23-11-22-101.deploy.static.akamaitechnologies.com¹¹
a23-59-206-230.deploy.static.akamaitechnologies.com¹²
a104-125-55-184.deploy.static.akamaitechnologies.com¹³
a23-78-154-233.deploy.static.akamaitechnologies.com¹⁴
a23-7-132-30.deploy.static.akamaitechnologies.com¹⁵
a104-86-104-224.deploy.static.akamaitechnologies.com¹⁶
a104-122-42-39.deploy.static.akamaitechnologies.com¹⁷
a23-202-60-225.deploy.static.akamaitechnologies.com¹⁸
a104-86-184-250.deploy.static.akamaitechnologies.com¹⁹
a184-51-48-250.deploy.static.akamaitechnologies.com²⁰
a104-121-159-217.deploy.static.akamaitechnologies.com²¹
a104-121-159-225.deploy.static.akamaitechnologies.com²²
a104-84-227-133.deploy.static.akamaitechnologies.com²³
a23-42-151-231.deploy.static.akamaitechnologies.com²⁴
a23-40-167-73.deploy.static.akamaitechnologies.com²⁵
a23-223-16-122.deploy.static.akamaitechnologies.com²⁶
a184-31-10-237.deploy.static.akamaitechnologies.com²⁷
a23-48-32-80.deploy.static.akamaitechnologies.com²⁸
a23-48-32-75.deploy.static.akamaitechnologies.com²⁹
a173-222-162-31.deploy.static.akamaitechnologies.com³⁰
a23-45-32-210.deploy.static.akamaitechnologies.com³¹
a184-30-164-84.deploy.static.akamaitechnologies.com³²
a23-59-200-173.deploy.static.akamaitechnologies.com³³
a23-43-191-224.deploy.static.akamaitechnologies.comThis is just #akamai attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.
Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #Google
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #Google hosting since November 2022ish for #Prosecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
sfo07s13-in-f174.1e100.net²
159.240.178.107.bc.googleusercontent.com³
25.25.190.35.bc.googleusercontent.com⁴
51.241.186.35.bc.googleusercontent.com⁵
183.34.211.130.bc.googleusercontent.com⁶
173.194.166.198⁷
74.125.166.169⁸
173.194.166.106⁹
173.194.167.9¹⁰
142.250.138.97¹¹
142.250.138.95¹²
142.250.138.94¹³
142.250.114.97¹⁴
142.250.138.100¹⁵
142.250.138.101¹⁶
142.250.138.138¹⁷
142.250.138.139¹⁸
142.250.138.113¹⁹
142.250.114.95²⁰
142.250.138.102²¹
sfo07s16-in-f78.1e100.net²²
dns.google²³
74.125.20.94²⁴
142.250.101.188²⁵
172.253.112.188²⁶
238.105.188.35.bc.googleusercontent.com²⁷
sfo03s26-in-f10.1e100.net²⁷
sfo03s25-in-f10.1e100.net²⁸
sfo03s24-in-f10.1e100.net²⁹
nuq04s45-in-f10.1e100.net³⁰
sfo03s27-in-f10.1e100.net³¹
sfo03s21-in-f10.1e100.net³²
nuq04s42-in-f10.1e100.net³³
nuq04s39-in-f10.1e100.net³⁴
sfo03s18-in-f10.1e100.net³⁵
142.250.176.10³⁶
lax17s50-in-f3.1e100.net³⁷
sfo03s33-in-f10.1e100.net³⁸
142.251.46.163This is just #Google attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.
Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #AWS
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER & #EU on #AWS hosting since November 2022ish for #Prosecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
ec2-52-25-170-148.us-west-2.compute.amazonaws.com²
ec2-52-42-61-176.us-west-2.compute.amazonaws.com³
ec2-52-25-170-148.us-west-2.compute.amazonaws.com⁴
ec2-44-236-58-13.us-west-2.compute.amazonaws.com⁵
ec2-44-240-164-68.us-west-2.compute.amazonaws.com⁶
ec2-52-41-118-210.us-west-2.compute.amazonaws.com⁷
ec2-52-35-177-24.us-west-2.compute.amazonaws.com⁸
35.82.205.248⁹
ec2-54-191-45-53.us-west-2.compute.amazonaws.com¹⁰
ec2-44-241-110-131.us-west-2.compute.amazonaws.com¹¹
ec2-35-82-235-74.us-west-2.compute.amazonaws.com¹²
ec2-54-68-18-200.us-west-2.compute.amazonaws.com¹³
ec2-54-184-79-208.us-west-2.compute.amazonaws.com¹⁴
ec2-52-10-247-144.us-west-2.compute.amazonaws.com¹⁵
ec2-54-186-72-30.us-west-2.compute.amazonaws.com¹⁶
ec2-13-234-145-166.ap-south-1.compute.amazonaws.com¹⁷
ec2-52-21-175-83.compute-1.amazonaws.com¹⁸
ec2-44-229-72-171.us-west-2.compute.amazonaws.com¹⁹
ec2-44-230-23-250.us-west-2.compute.amazonaws.com²⁰
ec2-52-20-36-26.compute-1.amazonaws.com²¹
ec2-52-204-216-203.compute-1.amazonaws.com²²
ec2-13-235-220-86.ap-south-1.compute.amazonaws.com²³
ec2-18-235-29-229.compute-1.amazonaws.com²⁴
ec2-15-207-179-172.ap-south-1.compute.amazonaws.com²⁵
ec2-176-34-188-147.eu-west-1.compute.amazonaws.com²⁶
ec2-176-34-188-143.eu-west-1.compute.amazonaws.com²⁷
ec2-18-218-105-211.us-east-2.compute.amazonaws.com²⁸
ec2-3-21-177-140.us-east-2.compute.amazonaws.com²⁹
ec2-34-205-198-58.compute-1.amazonaws.com³⁰
ec2-3-20-61-88.us-east-2.compute.amazonaws.com³¹
ec2-13-59-255-164.us-east-2.compute.amazonaws.com³²
ec2-3-221-252-182.compute-1.amazonaws.com³³
ec2-54-236-219-191.compute-1.amazonaws.com³⁴
ec2-18-156-155-177.eu-central-1.compute.amazonaws.com³⁵
ec2-34-212-53-52.us-west-2.compute.amazonaws.com³⁶
ec2-54-246-112-81.eu-west-1.compute.amazonaws.com³⁷
ec2-54-217-236-154.eu-west-1.compute.amazonaws.com³⁸
ec2-46-137-158-3.eu-west-1.compute.amazonaws.com³⁹
ec2-176-34-105-145.eu-west-1.compute.amazonaws.com⁴⁰
ec2-52-0-252-134.compute-1.amazonaws.com⁴¹
ec2-176-34-123-171.eu-west-1.compute.amazonaws.com⁴²
ec2-54-228-232-250.eu-west-1.compute.amazonaws.com⁴³
ec2-54-217-245-217.eu-west-1.compute.amazonaws.com⁴⁴
ec2-52-0-252-1.compute-1.amazonaws.com⁴⁵
ec2-52-0-252-3.compute-1.amazonaws.com⁴⁶
ec2-52-0-252-2.compute-1.amazonaws.com⁴⁷
ec2-54-246-123-138.eu-west-1.compute.amazonaws.com⁴⁸
ec2-54-191-65-148.us-west-2.compute.amazonaws.comThis is just #AWS attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.
Cities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #BunnyNet via #DataPacket
Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.
#FinFisherCom🤝#EnemyOfTheInternet
#CALEA #greymarket #CALEAmalware 🔍🧐#infosec
¹
143-244-49-183.bunnyinfra.net²
143-244-50-83.bunnyinfra.net³
169.150.221.147⁴
143-244-50-88.bunnyinfra.net⁵
143-244-50-211.bunnyinfra.net⁶
169-150-249-163.bunnyinfra.net⁷
169-150-221-147.bunnyinfra.net⁸
143-244-50-82.bunnyinfra.net⁹
143-244-50-213.bunnyinfra.net¹⁰
143-244-50-209.bunnyinfra.net¹¹
143-244-49-180.bunnyinfra.net¹²
143.244.50.214¹³
185-93-1-251.bunnyinfra.net¹⁴
unn-169-150-249-163.datapacket.com¹⁵
unn-169-150-249-165.datapacket.com¹⁶
unn-169-150-249-164.datapacket.com¹⁷
unn-169-150-249-166.datapacket.comCities:
¹
https://www.reddit.com/r/netzpolitik/comments/jax0e3/our_criminal_complaint_german_statemalware/²
https://en.wikipedia.org/wiki/FinFisher⁵
https://www.securityweek.com/german-authorities-seize-spyware-firm-finfishers-accounts/ -
CW: re: 👉#AIPolicies #AI #meme
Same post at Twitter... LOL#AIPushback #Twitter #RTDNA #news #infosec #infosecexchange #AI #journalism #twitter_thread #AImeme
#Twitter removing & blocking #AI #memes 🧾's as screenshots #RTDNA #malware #Xchan #XCom #Xitter👉A🤖I💩🔍🤏🕶️
Citation:
https://twitter.com/infosec_jcp/status/1800611643019411486 -
CW: re: 👉#AIPolicies #AI #meme
Same post at Twitter... LOL#AIPushback #Twitter #RTDNA #news #infosec #infosecexchange #AI #journalism #twitter_thread #AImeme
#Twitter removing & blocking #AI #memes 🧾's as screenshots #RTDNA #malware #Xchan #XCom #Xitter👉A🤖I💩🔍🤏🕶️
Citation:
https://twitter.com/infosec_jcp/status/1800611643019411486 -
CW: re: 👉#AIPolicies #AI #meme
Same post at Twitter... LOL#AIPushback #Twitter #RTDNA #news #infosec #infosecexchange #AI #journalism #twitter_thread #AImeme
#Twitter removing & blocking #AI #memes 🧾's as screenshots #RTDNA #malware #Xchan #XCom #Xitter👉A🤖I💩🔍🤏🕶️
Citation:
https://twitter.com/infosec_jcp/status/1800611643019411486 -
CW: re: 👉#AIPolicies #AI #meme
Same post at Twitter... LOL#AIPushback #Twitter #RTDNA #news #infosec #infosecexchange #AI #journalism #twitter_thread #AImeme
#Twitter removing & blocking #AI #memes 🧾's as screenshots #RTDNA #malware #Xchan #XCom #Xitter👉A🤖I💩🔍🤏🕶️
Citation:
https://twitter.com/infosec_jcp/status/1800611643019411486 -
CW: re: 👉#AIPolicies #AI #meme
Same post at Twitter... LOL#AIPushback #Twitter #RTDNA #news #infosec #infosecexchange #AI #journalism #twitter_thread #AImeme
#Twitter removing & blocking #AI #memes 🧾's as screenshots #RTDNA #malware #Xchan #XCom #Xitter👉A🤖I💩🔍🤏🕶️
Citation:
https://twitter.com/infosec_jcp/status/1800611643019411486 -
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
-
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
-
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
-
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
-
Huh. _TWO_ badbunny hosts with the #SystemApp #GammaGroup #FinFisher #FinSpy #Finsky callback to client but ... This time the scanned host comes up with interesting results after being caught. Both back to back attack attempts.
One host was scanned about a year ago and the other, another attack node quite frequently used, was scanned less than a month ago.
#Datapacket.Com #BunnyNet #InfosecExchange #infosec #fediverse #fediadmin
Typical attack pattern. After detection an attempt of using the #QuicksandModule was sent to client, tried crashing client. SystemUI crash attempt, etc.
-
"🚨 Critical #VMware Vulnerabilities Alert! 🚨 - Patch Now to Shield Your Virtual Environments 🛡️💻"
VMware has patched multiple critical vulnerabilities across its #VMware_ESXi, #VMware_Workstation, and #VMWare_Fusion products, including #CVE-2024-22252, #CVE-2024-22253, #CVE-2024-22254, and #CVE-2024-22255. These flaws span from use-after-free issues in both XHCI and UHCI USB controllers to an out-of-bounds write in ESXi, potentially allowing malicious actors with local administrative privileges to execute code or leak sensitive memory information from the host system. The severity of these vulnerabilities cannot be overstated, as they could lead to sandbox escape and unauthorized code execution on the host machine. This is especially worrisome when CVE-2024-22254 would be chained with CVE-2024-22252. VMware users are strongly urged to apply these updates to mitigate the risks associated with these vulnerabilities.
Ensure your systems are patched to avoid becoming a foothold for attackers.
Sources: VMware Security Advisory, The Hacker News
Tags: #Cybersecurity #InfoSec #Patching #VirtualizationSecurity #VulnerabilityManagement #InfosecExchange 🌍🔑🛡️
-
"🔐 #KeyTrap DoS: The DNSSEC Dilemma - A 25-Year-Old Design Flaw Exposed 🚨"
In a groundbreaking discovery, researchers from the National Research Center for Applied Cybersecurity ATHENE have unveiled #KeyTrap (CVE-2023-50387), a critical flaw in DNSSEC's design that could bring the internet to its knees. With a severity rating of 7.5/10, this flaw in DNSSEC has been lurking since 1999, and affects 31% of global DNSSEC-validating DNS resolvers, risking widespread internet service disruptions. KeyTrap, an Algorithmic Complexity Attack, can overload a DNS server with a single packet, stalling major DNS providers like Google and Cloudflare for up to 16 hours. This vulnerability not only jeopardizes internet access but could also cripple essential security mechanisms like anti-spam defenses and PKI. Despite patches being rolled out, a permanent fix may necessitate a DNSSEC standard overhaul. 🌍💻🛡️
Tags: #CyberSecurity #DNSSEC #Vulnerability #InternetSafety #PatchNow #TechNews #InfoSecExchange #SecurityFlaw #DigitalInfrastructure 🚀🔒💡
Source: ATHENE Press Portal
-
"🚨 #QNAPAlert: Multiple Vulnerabilities Unveiled Across QNAP Devices 🚨"
Recent security advisories highlight critical vulnerabilities in QNAP NAS systems, potentially affecting thousands of users globally. These flaws range from command injection to SQL injection. 🛡️💻
Highlights:
- QSA-23-47 addresses a command injection vulnerability, enabling attackers to execute arbitrary commands.
- QSA-23-30 and QSA-24-03 reveal OS injection and improper access control issues.
- QSA-24-05 warns of an OS command and SQL injection vulnerability flaw, granting authenticated users to inject malicious code via a network vector.
Mitigation: Users are urged to update their devices immediately to the latest firmware to protect against these vulnerabilities.
Tags: #CyberSecurity #Vulnerability #QNAP #NAS #CommandInjection #SQLInjection #DataProtection #FirmwareUpdate 🛠️🔐
Source: QNAP Security Advisories & HKCERT Bulletin
-
"⚠️ Alert: Google Chrome Zero-Day CVE-2023-7024 Exploited in the Wild! 🌐💥"
Google's latest patch addresses a critical zero-day vulnerability in Chrome, CVE-2023-7024. Identified as a heap-based buffer overflow in WebRTC, it's exploited in the wild. Chrome versions before 120.0.6099.129 are vulnerable. 🚨
Details: CVE-2023-7024, discovered by Google TAG, affects several browsers using WebRTC. It's the eighth zero-day patched by Google this year, underscoring the evolving cybersecurity landscape.
Mitigation: Users should urgently update to Chrome 120.0.6099.129/130 (for Windows) or 120.0.6099.129 (for Mac/Linux) to protect against this and other security fixes included in recent Chrome updates. 🛡️
Source: Qualys ThreatPROTECT by Diksha Ojha; Chrome Releases Blog
Tags: #Cybersecurity #GoogleChrome #ZeroDay #CVE2023 #WebRTC #UpdateNow #CyberAttack #InfoSecExchange
-
📬 Conor Fitzpatrick alias Pompompurin nach Selbstmordversuch im Krankenhaus
#Kurznotiert #Szene #BrianKrebs #ConorFitzpatrick #infosecexchange #PeekskillHeraldcom #pompompurin #ReginaClarkin https://tarnkappe.info/artikel/szene/conor-fitzpatrick-alias-pompompurin-nach-selbstmordversuch-im-krankenhaus-273562.html -
🇵🇱 Nowy wpis na blogu! / 🇬🇧 New blog post!
Mastodon’s own instance for non-techies [ENG 🇬🇧]
#101010pl #digitalocean #dns #droplet #fediverse #infosecexchange #instance #managedhosting #mastohost #mastodon #mikrus #opensource #oracle #ossrox #proxmox #raspberrypi #relay #retention #revolut #vps #yunohost
Autor: @[email protected]
-
Nowy wpis na blogu!
Własna instancja Mastodona dla nietechnicznych
#101010pl #digitalocean #dns #droplet #fediverse #hostingzarzadzany #infosecexchange #instancja #managedhosting #mastohost #mastodon #mikrus #opensource #oracle #ossrox #proxmox #przekaznik #raspberrypi #relay #retencja #revolut #vps #yunohost
Autor: @[email protected]
-
📬 Mastodon: Sicherheitslücke erlaubte den Diebstahl von Anmeldedaten
#Datenschutz #Kurznotiert #GarethHeyes #glitchsoc #HTMLInjection #infosecmastodon #infosecexchange #portswigger #Sicherheitslücke https://tarnkappe.info/artikel/datenschutz/mastodon-sicherheitsluecke-erlaubte-den-diebstahl-von-anmeldedaten-259218.html -
📬 Mastodon: Sicherheitslücke erlaubte den Diebstahl von Anmeldedaten
#Datenschutz #Kurznotiert #GarethHeyes #glitchsoc #HTMLInjection #infosecmastodon #infosecexchange #portswigger #Sicherheitslücke https://tarnkappe.info/artikel/datenschutz/mastodon-sicherheitsluecke-erlaubte-den-diebstahl-von-anmeldedaten-259218.html -
📬 Mastodon: Sicherheitslücke erlaubte den Diebstahl von Anmeldedaten
#Datenschutz #Kurznotiert #GarethHeyes #glitchsoc #HTMLInjection #infosecmastodon #infosecexchange #portswigger #Sicherheitslücke https://tarnkappe.info/artikel/datenschutz/mastodon-sicherheitsluecke-erlaubte-den-diebstahl-von-anmeldedaten-259218.html -
Here is an #introduction post of sorts!
Maybe some of you have already been following me. In case you weren’t, don’t know who I am, or want to know more: Fear not!
I’m just a chonky purple raccoon that loves carbs and deadlifts! (My avatar has a name! It’s “Mittens”!)
That’s it! That’s the post. 👋
But, no… For real! My name is Stacy and I’m a Senior Solutions Engineer. I currently work in Cybersecurity Education and Training, but prior to that, I’d worked as an Information Security Analyst for a CISO of a sizable financial organization and was a Security Engineer and Solutions engineer at two other cybersecurity vendors, respectively.
I like to say I “specialize” in Security Strategy, Leadership, Security Awareness, Mitigating Human Risk, as well as high-level Cloud and DevSecOps Security and Compliance.
Aside from all that, I enjoy public speaking, learning new things, solving problems, creating art, making comics, writing blogs and stories, working out, powerlifting (aka picking up heavy things and putting them down again), playing video games, watching animation and anime, cosplaying, hanging out with my partner (who is a pentester), and doing the most good!
Now that you know what gets me that sweet, sweet dopamine, you may also be interested in knowing what I’m passionate about: Diversity, equity, inclusion, mental health, and advocating to minimize harassment, discrimination, bigotry, abuse, domestic violence, and sexual assault.
Anyway! It’s great to see an amazing #infosec #community being built here!
(Note: I don’t *always* post about work or infosec-related stuff, especially when I’m not at work (as to not burn myself out), so expect a slice of life and variety of things from me!)
#infosecexchange #informationsecurity #cybersecurity #artist #writer #powerlifter #engineer #womenwholift #wehackhealth #infosecsie