1p

From The source

CISA’s May 21, 2024 ICS Advisory: Guard Your Gadgets or Risk a Cyber Meltdown!

CISA released an ICS advisory on May 21, 2024, warning about security vulnerabilities in industrial control systems. Users and administrators should review the details and apply mitigations faster than a cat chasing a laser pointer.

2 years ago

Nmap Magic: Scan Without Scanning Using Shodan API!

Unlock the secrets of NMAP with Shodan’s API! Learn how to “scan” networks without actually scanning them. This nifty trick will have you gathering port and service data faster than you can say TCP!

2 years ago

Cisco’s ArcaneDoor Exploits: Patch Now or Get Hacked Later!

Cisco has released security updates addressing ArcaneDoor exploitation in Cisco ASA and FTD devices. Active exploitation of CVE-2024-20353 and CVE-2024-20359 has been reported.

2 years ago

Don’t Get Hacked! Cisco’s ArcaneDoor Update Secures Your System (CVE-2024-20353, CVE-2024-20359)

Cisco releases security updates to address ArcaneDoor vulnerabilities in ASA devices and Firepower Threat Defense software. Active exploitation of CVE-2024-20353 and CVE-2024-20359 reported. Apply updates, hunt for malicious activity, and report findings.

2 years ago

Coin Miner Chaos: Unmasking the “Redtail” Malware Menace

Coin miners like “redtail” are the sneaky cyber burglars of the digital world, covertly hijacking your computer’s resources to mine cryptocurrency. This malware, capable of running on multiple CPU architectures, exemplifies the cunning and adaptability of modern coin miners. Discover how they operate and how to spot them before they strike!

2 years ago

CISA’s Latest ICS Advisory: Are Your Industrial Systems Ready for the Mayhem?

CISA released a new ICS advisory on May 23, 2024. Stay ahead of the curve with timely updates on security issues, vulnerabilities, and exploits in Industrial Control Systems.

2 years ago

Chinese Cyber Spies: Operation Diplomatic Specter Targets Middle East, Africa, Asia

Operation Diplomatic Specter has been targeting political entities in the Middle East, Africa, and Asia since late 2022. Leveraging rare email exfiltration techniques and custom malware, the Chinese APT group focuses on espionage. Organizations should prioritize patching vulnerabilities to mitigate risks from advanced persistent threats.

2 years ago

YARA 4.5.0: Minor Tweaks, Major Laughs – Why YARA-X is Stealing the Show

YARA 4.5.0 brings minor regex tweaks and bugfixes. But hold on, Victor says it’s time to embrace YARA-X! Despite being in beta, it’s stable enough for command-line use and Python scripts. Long live YARA-X!

2 years ago

Cisco’s ArcaneDoor Exploits: Time to Slam the Door on Hackers!

Cisco patches ArcaneDoor vulnerabilities in ASA and FTD devices. Exploited flaws CVE-2024-20353 and CVE-2024-20359 can give cyber actors system control. CISA urges prompt updates and reporting.

2 years ago

CISA Adds Three New Cyber Nightmares to Exploited Vulnerabilities Catalog

CISA has updated its Known Exploited Vulnerabilities Catalog with three new entries, including CVE-2024-20353. These vulnerabilities are prime targets for cyberattacks, and timely remediation is crucial for all organizations.

2 years ago

Cisco’s ArcaneDoor Vulnerabilities: Patch Now or Hackers Will Party!

Cisco released security updates to tackle ArcaneDoor exploitation in Cisco ASA devices and Firepower Threat Defense software. Active exploits of CVE-2024-20353 and CVE-2024-20359 have been reported.

2 years ago

SIEM-ple Laughs: Surviving Log Analysis as a Cybersecurity Intern

Intern Joshua Jobe’s deep dive into the DShield SIEM reveals the thrilling world of log analysis and attack observations. Discover how honing JSON parsing skills and leveraging network traffic insights can turn a mundane internship into a cybersecurity adventure. The DShield SIEM is the hero we need, but parsing logs is the sidekick we deserve!

2 years ago

CISA’s Latest ICS Advisory: Your Industrial Control System’s Wake-Up Call!

CISA released a new ICS advisory on May 28, 2024. Keep your systems secure by reviewing the latest insights on vulnerabilities and exploits.

2 years ago

Cisco’s ArcaneDoor: Patch Now or Regret Later!

Cisco released security updates for ArcaneDoor exploitation of ASA devices and Firepower software. Active exploits of CVE-2024-20353 and CVE-2024-20359 have been reported. CISA urges updates and vigilance!

2 years ago

Medical Device Alert: Baxter’s Welch Allyn Connex Spot Monitor Vulnerability – Act Now!

The Welch Allyn Connex Spot Monitor vulnerability uses a default cryptographic key, posing a remote exploitation risk. Attackers can modify device configurations and firmware, leading to potential compromises and delays in patient care. Update to Version 1.5.2.01 to mitigate this risk.

2 years ago

Westermo EDW-100 Security Alert: Hardcoded Passwords and Cleartext Credentials Risk!

Westermo EDW-100 is vulnerable due to hard-coded passwords and cleartext credential exposure. Attackers can exploit these flaws remotely with low complexity, threatening critical infrastructure sectors. Mitigations include network segregation, perimeter protection, and physical security measures. Consider replacing EDW-100 with Lynx DSS L105-S1 for enhanced security.

2 years ago

CISA Warns of New Oracle WebLogic Vulnerability: Your Network Could Be Next!

CISA adds CVE-2017-3506 Oracle WebLogic Server OS Command Injection to its Known Exploited Vulnerabilities Catalog, highlighting its risk to federal enterprises.

2 years ago

Microsoft’s Service Tag Slip-Up: How Tenable Taught Us to Read the Fine Print

Microsoft Security Response Center (MSRC) investigated Tenable Inc.’s report on cross-tenant access via service tags. Initially flagged as a vulnerability, it was found that service tags worked as intended but required better documentation. Microsoft updated the service tags documentation to clarify their use and emphasized multi-layered security.

2 years ago

Wireshark Wizardry: Mastering Custom Lua Dissectors for Binary Protocols

Ever tried parsing binary protocols over TCP and ended up looking like a confused emoji? Fear not! I developed a Wireshark dissector in Lua, inspired by SANS ICS training, to decode firmware upload protocols. Configure fields, filter traffic, and extract data with ease. Check out my blog and video for a deep dive into network…

2 years ago

Why Your Antivirus Might Be Taking a Coffee Break: Unmasking the No-Defender Hack

John Moutos reveals a tool that hijacks Avast’s proxy to disable Windows Defender. While this trick could soon be a favorite among threat groups, detecting it is as easy as monitoring event logs and blocking Avast’s certificate. Dive into the diary for more on defense evasion and the rise of no-defender.

2 years ago
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?