cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

Sys-Admin Up

InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)

إظهار المزيد
مشاركات الإعلانات
909
المشتركون
لا توجد بيانات24 ساعات
لا توجد بيانات7 أيام
-930 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

AutoIt Credential Flusher Forcing users to enter credentials so they can be stolen https://research.openanalysis.net/credflusher/kiosk/stealer/stealc/amadey/autoit/2024/09/11/cred-flusher.html
إظهار الكل...
AutoIt Credential Flusher

Forcing users to enter credentials so they can be stolen

Hackers Exploit HTTP Response Header to Launch Sophisticated Phishing Attacks https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/
إظهار الكل...
Phishing Pages Delivered Through Refresh HTTP Response Header

We detail a rare phishing mechanism using a refresh entry in the HTTP response header for stealth redirects to malicious pages, affecting finance and government sectors. We detail a rare phishing mechanism using a refresh entry in the HTTP response header for stealth redirects to malicious pages, affecting finance and government sectors.

إظهار الكل...
Notice of Recent Security Incident | Fortinet Blog

Fortinet shares information on a recent security incident involving Fortinet and our response to-date.…

إظهار الكل...
GitHub - UndeadSec/DockerSpy: DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.

DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. - UndeadSec/DockerSpy

A public secret : Research on the CVE-2024-30051 privilege escalation vulnerability in the wild https://ti.qianxin.com/blog/articles/public-secret-research-on-the-cve-2024-30051-privilege-escalation-vulnerability-in-the-wild-en/
إظهار الكل...
奇安信威胁情报中心

Nuxt.js project

إظهار الكل...
security-research/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation/docs/exploit.md at master · google/security-research

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research

CompTIA Security+ SY0-601 - Attacks, Threats, and Vulnerabilities - Architecture and Design - Implementation - Operations and Incident Response - Governance, Risk, and Compliance
إظهار الكل...
CompTIA Security+ Notes.pdf1.47 MB
How Mallox ransomware has changed: a detailed analysis - [ru] https://securelist.ru/mallox-ransomware/110314/
إظهار الكل...
Эволюция Mallox: от частного шифровальщика до RaaS

В этом отчете приведен подробный анализ шифровальщика Mallox, описывающий его развитие, стратегию выкупа, схему шифрования и прочее.

EUCLEAK (Side-Channel Attack on the YubiKey 5 Series) https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf
إظهار الكل...

Novel RAMBO Side-Channel Attack Leaks Data Through RAM Radio Waves https://cyberinsider.com/new-rambo-side-channel-attack-leaks-data-through-ram-radio-waves/
إظهار الكل...
Novel RAMBO Side-Channel Attack Leaks Data Through RAM Radio Waves

Researchers have uncovered a method to leak sensitive data from air-gapped systems, introducing a novel attack technique known as RAMBO

اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.