Intellawatch

Amid 23andMe's Turbulence, Can You Delete Your Genetic Data? What We Know breach

from

CNET

As we grow increasingly aware of how much of our personal information is being gathered across the internet, our genetic information is perhaps the most personal data we could possibly share with anyone, let alone with companies. Last month, 23andMe announced that it would be laying off around 40 percent of its workforce, in the wake of a major data leak and ongoing financial and management struggles at the company, which has seen its stock price plummet by 70 percent. And your information will....

Cobalt Strike Postex Kit cyber

from

Rasta Mouse

BOFs execute on that single thread, and therefore block Beacon from doing anything else (checking in, going to sleep, etc) until they complete. We also have access to the same format and output APIs, such as BeaconFormatAlloc, BeaconFormatAppend, BeaconFormatPrintf, BeaconPrintf, etc. As with the C++ BOF and UDRL Visual Studio templates, we can provide mock arguments when running in debug mode.....

Zizmor would have caught the Ultralytics workflow vulnerability cyber

from

Hacker News

Of these releases, two were made via GitHub Actions and used Trusted Publishing + attestations, and two were made via an API token that the attacker likely either exfiltrated from a developer’s machine or from the GitHub Actions secret context (where it may have been forgotten about after Trusted Publishing was enabled). As such, the Ultralytics maintains must consider these credentials compromised and revoke them immediately to avoid further compromise. The basic vulnerability that enabled thi....

Security Affairs newsletter Round 501 by Pierluigi Paganini – INTERNATIONAL EDITION cyber

from

Security Affairs

....

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 23 cyber

from

Security Affairs

....

RedLine info-stealer campaign targets Russian businesses through pirated corporate software cyber

from

Security Affairs

....

Cookie Jar Overflow: A New Threat to HttpOnly Cookies in XSS Vulnerable Applications cyber

from

InfoSec Write-ups

Cross-Site Scripting (XSS) is often considered a beautiful attack due to its elegance and effectiveness in exploiting vulnerabilities within web applications. However, what if I told you that we can still hijack HttpOnly cookies using a basic XSS attack? By carefully crafting the cookies and controlling their contents, an attacker could gain access to or interfere with critical session data, making this a powerful avenue for malicious actions.....

How Black Hat Use Cookies to Steal Your Identity cyber

from

InfoSec Write-ups

Suppose that: you logged into Facebook, and one way or another, The attacker gains access to your device. They could send a command to the SQLite database where your cookies are stored and steal them. SQLite database: it’s the most common database used in the world and runs SQL language, not just like Postgresql or MariaDB was limited in use, SQlite is not limited, it’s used on both phone devices and computer devices.....

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast cyber

from

Help Net Security

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services (SaaS, MSP services). 5 reasons to double down on network security Cybersecurity programs have evolved significantly over the past few decades. Building trust in tok....

Manjaro 24.2 “Yonada” Released: A Refined and Feature-Rich Update cyber

from

Penetration Testing Online

Building upon its commitment to providing a smooth and accessible Linux experience, Manjaro 24.2 introduces significant enhancements across the board. Personalized Aesthetics: Users can now customize their desktop environment with a wider array of accent colors, moving beyond the traditional blue hue. Users are encouraged to explore the comprehensive release notes for a detailed overview of all changes and improvements.....

Anna Jaques Hospital ransomware breach exposed data of 300K patients breach

from

BleepingComputer

Anna Jaques is a not-for-profit community hospital in Massachusetts, recognized for delivering high-quality care and performing over 4,700 surgeries yearly. As a mid-size acute hospital providing 83 beds, 200 physicians, and 1,200 staff members, AJH plays a crucial role in Merrimack Valley, North Shore, and southern New Hampshire, providing essential healthcare services to the local population. "Additionally, Anna Jaques reminds its employees and patients to remain vigilant in reviewing financi....

On the Applicability of the Timeroasting Attack cyber

from

Snovvcrash Blog

The Linux box had only Python 2 installed as well as operating from a DNS back connect didn’t help too much with bringing a self contained Python 3 timeroast.py executable. Thus, I modified (to support Python 2) and minified (used awesome python-minifier) the original script a bit: Hashcat’s mode 10 md5($pass.$salt) can be re-used in pure kernel setting (however, ) providing--hex-wordlist and--hex-salt switches to achive our goal:....

CVE-2024-12209 (CVSS 9.8): WP Umbrella Plugin Vulnerability Exposes 30,000 Websites to Compromise cyber

from

Penetration Testing Online

A critical security vulnerability has been discovered in the popular WordPress plugin, WP Umbrella, which is used by over 30,000 websites. WP Umbrella provides a suite of tools for managing multiple WordPress sites, including backup, monitoring, updates, and restoration. Regularly back up your website to ensure that you can restore it in case of an attack.....

SystemRescue 11.03 Boots Up with a Powerful New Kernel and Updated Tools! cyber

from

Penetration Testing Online

Filesystem Support: SystemRescue supports a wide range of filesystems (ext4, xfs, btrfs, vfat, ntfs), ensuring compatibility with both Linux and Windows environments. System administrators are encouraged to download and familiarize themselves with SystemRescue 11.03 as a preventative measure. Having a readily available recovery solution can significantly reduce downtime and data loss in the event of unexpected system failures.....

Google’s Vanir: A Powerful New Open-Source Tool for Supercharging Security Patch Validation cyber

from

Penetration Testing Online

Versatility: While designed for Android, Vanir can be readily adapted to other ecosystems, making it a valuable asset across the software development landscape. Google reports that a single engineer, using Vanir, was able to “ generate signatures for over 150 vulnerabilities and verify missing security patches across its downstream branches – all within just five days.” With its open-source nature, Vanir promises to foster collaboration and drive innovation in the security community.....

FSB-Tampered Device Returned with Monokle-Type Spyware, Experts Reveal cyber

from

Penetration Testing Online

The incident involves Kirill Parubets, a Russian programmer accused of transferring funds to Ukraine. While sharing significant overlaps with Monokle spyware reported by Lookout in 2019, this version showed advancements, suggesting it is either a sophisticated update or a new tool built on Monokle’s code. The report advises, “ Any person whose device was confiscated and later returned by such services should assume that the device can no longer be trusted without detailed, expert analysis.”....

BlueAlpha Exploits Cloudflare Tunnels for GammaDrop Malware Infrastructure cyber

from

Penetration Testing Online

A key finding in the report is BlueAlpha’s use of Cloudflare Tunnels to conceal GammaDrop staging infrastructure. Their method includes HTML smuggling, where attachments deliver Visual Basic Script (VBScript)-based malware through encoded JavaScript. Insikt Group observed that “ GammaLoad makes use of DoH providers such as Google and Cloudflare to resolve C2 infrastructure when traditional DNS fails.”....

Understanding and Testing for API3:2023 — Broken Object Property Level Authorization cyber

from

thexssrat @ Medium

APIs are essential components in modern applications, enabling data exchange and communication between different services. One such critical vulnerability identified in the OWASP API Security Top 10 for 2023 is API3:2023 — Broken Object Property Level Authorization. API6:2019 Mass Assignment: APIs blindly accepting user input and mapping it to internal object properties without proper validation.....

8Base ransomware group hacked Croatia’s Port of Rijeka breach

from

Security Affairs

....

Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations cyber

from

Intigriti

This approach is considerably much more secure as an additional layer of security prevents bad actors from gaining unauthorized access to someone's user account. Below, we will be exploring several methods on how to exploit 2FA vulnerabilities and take advantage of any present logic flaws in their insecure implementations. The impact of a 2FA bypass should never be neglected, and we always recommend testing for them, especially on targets with critical assets or applications that store sensitiv....

TA: 66729 TP: 3337 CP: 0