Sat.Oct 22, 2022

article thumbnail

Weekly Update 318

Troy Hunt

Aussie breachapalooza! That what it feels like this week between Optus (ok, it was weeks ago but it's still in the news), Vinomofo, My Deal and the mother of all of them (at least as far as media interest goes), Medibank. That last one totally smashed my week out with unprecedented press enquiries, so is it any wonder I totally missed the Microsoft one?

article thumbnail

esearchy – my new favorite OSINT script

Security Boulevard

So you’re on a social engineering test… and you need to target some users for spear phishing. Previously we’ve used theHarvester and metasploit for this, but I’ve now fully switched over to esearchy by Matias P. Brutti. Install on BT5: Let’s Pick on Valve (for no particular reason): Output for Social Profiling” There a lot […]. The post esearchy – my new favorite OSINT script appeared first on Security Aegis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exploited Windows zero-day lets JavaScript files bypass security warnings

Bleeping Computer

A new Windows zero-day allows threat actors to use malicious JavaScript files to bypass Mark-of-the-Web security warnings. Threat actors are already seen using the zero-day bug in ransomware attacks. [.].

article thumbnail

How Augmented Reality Will Help You Manage Your Data Center

Security Boulevard

Augmented Reality (AR) is about to change the way we interact with the world around us. AR has already begun to revolutionize the way we play video games and view information. In the future, AR will be used in a wide variety of applications, including data center management. Data center operators will be. The post How Augmented Reality Will Help You Manage Your Data Center appeared first on Hyperview.

75
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Threat actors exploit critical flaw in VMware Workspace ONE Access to drop ransomware, miners

Security Affairs

Threat actors are exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access in attacks in the wild. Threat actors are actively exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access to deliver cryptocurrency miners and ransomware. The issue causes server-side template injection due to because of the lack of sanitization on parameters “deviceUdid” and “devicetype”.

article thumbnail

Android adware apps in Google Play downloaded over 20 million times

Bleeping Computer

Security researchers at McAfee have discovered a set of 16 malicious clicker apps that managed to sneak into Google Play, the official app store for Android. [.].

Adware 66

More Trending

article thumbnail

TommyLeaks and SchoolBoys: Two sides of the same ransomware gang

Bleeping Computer

Two new extortion gangs named 'TommyLeaks' and 'SchoolBoys' are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang. [.].

article thumbnail

TikTok’s Security Threat Comes Into Focus

WIRED Threat Level

Plus: A Microsoft cloud leak exposed potential customers, new IoT security labels come to the US, and details emerge about Trump’s document stash.

IoT 60
article thumbnail

Advanced Penetration Testing (APT) – Pentesting High Security Environments by LSO

Security Boulevard

You think you’ve come, you’ve seen, and you’ve conquered all the training in the pentest field? Think again. J0e McCray, Learn Security Online creator, has brewed up a new course to address the needs of the upper echelon of pentest monkeys out there. If you don’t know j0e from from his various speaking engagements at […]. The post Advanced Penetration Testing (APT) – Pentesting High Security Environments by LSO appeared first on Security Aegis.

article thumbnail

Bypassing web application firewalls using HTTP headers

Security Boulevard

Web application firewalls (WAF’s) are part of the defense in depth model for web applications. While not a substitute for secure code, they offer great options for filtering malicious input. Below is a story from a real assessment where an enterprise deployment of such a device was vulnerable to being bypassed. The vulnerability is one […]. The post Bypassing web application firewalls using HTTP headers appeared first on Security Aegis.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Defeating iOS Jailbreak Detection

Security Boulevard

This blog is a cursory breakdown of defeating less advanced jailbreak detection code. There are several ways to employ jailbreak detection in a security conscious mobile application. Many of easier-to-defeat methods involve checking the iOS file system to see if any jailbreak relevant files exist. If we need test an application that employs this type of protection, we need to figure […].

Mobile 40
article thumbnail

Easy, breezy, beautiful, password attacking…

Security Boulevard

Bruting web forms usually is part of a web app assessment. We love to use Hydra, Medusa, or Wfuzz for this but we recently stumbled across a tool that makes it much easier. It’s called Fireforce. It’s a Firefox extension that gives you point and click bruting. We ran it in our labs with about a […]. The post Easy, breezy, beautiful, password attacking… appeared first on Security Aegis.

article thumbnail

BSidesLV 2022 Lucky13 PasswordsCon – Jim Fenton’s ‘Comparing Centrally And Locally Verified Memorized Secrets’

Security Boulevard

Our sincere thanks to BSidesLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesLV 2022 Lucky13 PasswordsCon – Jim Fenton’s ‘Comparing Centrally And Locally Verified Memorized Secrets’ appeared first on Security Boulevard.