Archive
Zero-Day Exploitation of Atlassian Confluence | Volexity
There is another 0-day for Atlassian, they are having a tough time with RCEs
https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
Bank had no firewall license, intrusion or phishing protection – guess the rest • The Register
Wow, ‘Security is hard’, but keeping licenses updated? It’s not THAT hard folks…
https://www.theregister.com/2022/04/05/mahesh_bank_no_firewall_attack/
How Modern Log Management Strengthens Enterprises’ Security Posture
If you have decided that you will just ‘log everything’, I suspect you may have already failed in that objective. If you are intrigued, then please read on…
How to Implement Security HTTP Headers to Prevent Vulnerabilities?
Looking for a great guide to understanding the the ‘must have’ collection of headers? Implementation of any/all of these can make the difference between 🙂 & 🙄https://geekflare.com/http-header-implementation/
Howard Hesseman, the hard rocking DJ on ‘WKRP in Cincinnati,’ dies at 81 – CNN
RIP Johnny Fever 🤘
https://www.cnn.com/2022/01/30/entertainment/howard-hesseman-wkrp-cincinnati-dies/index.html
Google Cloud Anthos MultiCloud API and GKE on Azure GA | Google Cloud Blog
It’s here and ready to join your fleet of clusters – check out the newest member of the Anthos capable deployments now on Azure too!
Why exfil your payload via ASCII? A picture is worth…
Malwarebytes has discovered a new type of skimming attack where the booty is sent via an image!
The attackers hides the credit card skimmers in the metadata of icon files and then sends the sensitive info after the attack is successful, to the C2 via an image.
Talk about the need for ‘copy protection’?
As if hiding JavaScript in the copyright tag of the ico file isn’t ingenuous enough, they capture input field data, obfuscate it and place it in a image file to be uploaded so your Siem doesn’t even see it?
They have shared the details in a blog post if you want to learn more.
https://latesthackingnews.com/2020/07/06/attackers-hide-credit-card-skimmers-in-image-files-to-steal-data/
Thinking of rooting your Android…think again
While many of us have been home, wondering if this virus will go away as quickly as it came upon us, Google has been silently preparing for ‘Round 2’ in the phone wars.
SafetyNet is Android’s third party attestation API and if you want to install legit software from the Google Play Store, you already have it.
Getting ready to route out the last of the modified bootloaders, they have now rolled out a hardware backed detection method to ensure application developers can tell if your device is rooted. This allows high risk vendors like your banking app to prevent the application from running to help curb fraud. Read more about it here.
https://www.xda-developers.com/safetynet-hardware-attestation-hide-root-magisk/amp/
How to create a solid and secure Content Security Policy
As a security professional who provides security guidance to small business (as well as big!), If you use web based services in your organization (and the chances are that you do and you may/may not know it), there is one thing that your web services need to implement…
https://www.uriports.com/blog/creating-a-content-security-policy-csp/
‘Star Trek: Strange New Worlds’ is about the only captain that predates Kirk
In what looks even better that the Picard series, who doesn’t love Captain Pike?
https://mashable.com/article/star-trek-strange-new-worlds-who-is-christopher-pike/