26
8
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

JSON Smuggling: A far-fetched intrusion detection evasion technique::undefined

27
2
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

Shellcode evasion using Wasm/Wat and Rust::undefined

28
5
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

ShmooCon 2024 Videos are up!::ShmooCon 2024by Shmoo Group, various presentersThe videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington...

29
6
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.::apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK. - GitHub - ax/apk.sh: apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.

30
1
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

Trends in Phishing, Fraud, 'Dark AI Models', and how to better protect yourself.::We guard your domain, so you have peace of mind. Threat Visibility Platform.

31
73
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

How I Hacked My Air Purifier to Remove Cloud Dependency [Detailed Write-Up]::undefined

32
2
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

Deluder: Python utility for intercepting traffic of applications. Deluder can be used as an alternative for EchoMirage. It supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the b...::Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡ - GitHub - Warxim/deluder: Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡

33
10
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

AnyDesk Incident Response 2-2-2024::undefined

34
3
submitted 4 months ago by L4s@lemmy.world to c/secops@lemmy.world

Your Security Program Is Shit::Very shit

35
1
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal::undefined

36
6
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Leaky Vessels: Docker and runc Container Breakout Vulnerabilities - January 2024::Snyk Security Labs Team has identified four container breakout vulnerabilities in core container infrastructure components including Docker and runc, which also impacts Kubernetes.

37
5
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()::undefined

38
4
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

New Visual Studio Code plugin for IaC security (plus collaboration, semgrep integration)::Introducing PoIEx - Points Of Intersection Explorer

39
3
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Hunting for (Un)authenticated n-days in Asus Routers - Shielder::Notes on patch diffing, reverse engineering and exploiting CVE-2023-39238, CVE-2023-39239, and CVE-2023-39240.

40
5
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Your Firewalls and Proxies are about to be blind to real TLS destinations: Learn about Encrypted Client Hello::undefined

41
4
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations::undefined

42
11
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

NMAP-formatter: convert NMAP results to HTML, CSV, JSON, graphviz (dot), SQLite::A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot) or sqlite. Simply put it's nmap converter. - GitHub - vdjagilev/nmap-formatter: A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot) or sqlite. Simply put it's nmap converter.

43
12
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Microsoft, HPE hacks by Russia are just the tip of the iceberg - Microsoft said late Thursday that it had found more victims and was in the process of notifying them.::undefined

44
16
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

How I hacked chess.com::Playing Chess is one of the many hobbies I like to do in my spare time, apart from tinkering around with technology. However, I'm not very good at it, and after losing many games, I decided to see if I could do something I'm much better at; hacking the system!

45
1
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

CVE-2024-23897 Jenkins CLI PoC::undefined

46
3
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

New Zyxel RCE Vulnerability allows remote attackes execute commands as root!::undefined

47
4
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Methodology - Security Research: How we discovered over 18,000 API secret tokens & $20M in Stripe tokens::Our security team scanned 189.5M URLs and found more than 18,000 exposed API secrets. Discover the methodology that led us to these findings.

48
3
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Windows - Data Protection API - A journey into various DPAPI potential abuses from an offensive security perspective::Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team

49
16
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing (CVE-2023-45866)::A recently discovered critical vulnerabilities (CVE-2023-45866, CVE-2024-21306) in Bluetooth can be exploited to inject keystrokes without user confirmation – by accepting any Bluetooth pairing request. These vulnerabilities affect Android, Linux, macOS, iOS, and Windows operating systems, making it a serious threat to users across different platforms. The vulnerabilities were discovered by Marc Newlin, that also

50
9
submitted 5 months ago by L4s@lemmy.world to c/secops@lemmy.world

Many CVE Records Are Listing the Wrong Versions of Software as Being Affected::undefined

view more: ‹ prev next ›

Security Operations

546 readers
1 users here now

A place for all things Cyber Security, from questions, rants, and stories, to the latest attacks, vulnerabilities, and zero days.

founded 1 year ago
MODERATORS