Remove listing tags tools
article thumbnail

My Blog Now Has a Content Security Policy - Here's How I've Done It

Troy Hunt

I've used them to fix mixed content warnings on this blog after Disqus made a little mistake , you'll see one adorning Have I Been Pwned (HIBP) and I even wrote a dedicated Pluralsight course on browser security headers. For example, this blog runs on Ghost Pro which is a managed SaaS platform.

118
118
article thumbnail

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

NetSpi Technical

This blog will cover how we discovered CVE-2024-21378 and weaponized it by modifying Ruler , an Outlook penetration testing tool published by SensePost. In late 2015, Nick Landers, Co-Founder of Dreadnode, published a blog on the abuse of Outlook Rules for RCE. Of particular interest were the file and registry entries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technical Analysis of Xloader’s Code Obfuscation in Version 4.3

Security Boulevard

which introduced significant improvements to obfuscate the malware code and data including the list of command-and-control (C2) servers. This blog post analyzes the encryption algorithms used by Xloader to decrypt the most critical parts of the code and the most important parameters of the malware’s configuration. Important Xloader 4.3

article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

The actor shared a list of NATO resources and a comprehensive Excel file. Besides proprietary tools, they’re leveraging MHDDoS, Blood, Karma DDoS, Hasoki, DDoS Ripper and GoldenEye scripts to generate malicious traffic on Layer 7 which may impact the availability of WEB resources. Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

Traditional approaches to data classification use manual tagging which is labor-intensive, error-prone, and not easily scalable. This blog will explain how Thales is enhancing CipherTrust Data Discovery and Classification (DDC) with ML models that help analyze data, learn from insights, and improve results.

article thumbnail

Super FabriXss: an RCE vulnerability in Azure Service Fabric Explorer

Malwarebytes

The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. This newly-discovered vulnerability is listed as CVE-2023-23383 with a CVSS score of 8.2 Azure Service Fabric Explorer (SFX) is an open-source tool for inspecting and managing Azure Service Fabric clusters.

article thumbnail

The Silk Wasm: Obfuscating HTML Smuggling with Web Assembly

NetSpi Technical

The technique was first demonstrated by Outflank in the following blog post. Below is an example of what Golang-based, Wasm looks like in the VSCode Hex Editor: Modifying Droppers for Wasm At the time, I’d been working on a tool which quickly compiled example shellcode dropper examples written in Golang.