CyberSecNews Weekly - 0x20-W1222
News
-
The Dirty Pipe Vulnerability
A new Linux kernel vulnerability that can drive to root priviledge escalation -
Put an io_uring on it: Exploiting the Linux Kernel
Another vulnerability discovered in the Linux kernel, using the new system call io_uring -
SATCOM terminals under attack in Europe: a plausible analysis.
At the same time Russia initiated a full-scale attack on Ukraine, tens of thousands of KA-SAT SATCOM terminals suddenly stopped working in several European countries
Tools
-
Scoreboard
A CTF focused on AWS S3. -
prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. -
apk-mitm
A CLI application that automatically prepares Android APK files for HTTPS inspection
Articles
-
Attackers can force Amazon Echos to hack themselves with self-issued commands
Popular “smart” device follows commands issued by its own speaker. What could go wrong? -
Not All MFA is Equal, and the Differences Matter a Lot
An analysis of the several MFA techniques -
Branch History Injection
BHI (or Spectre-BHB) is a revival of cross-privilege Spectre-v2 attacks on modern systems deploying in-hardware defenses. -
2021 Year In Review
A detailed look at some of the top tactics, techniques and procedures (TTP's) that was observed in 2021. -
Tcp middlebox reflection
A new DDoS vector discovered by Akamai, exploiting network middleboxes.
Tutorial
-
OWASP/Go-SCP: Go programming language secure coding practices guide
Go programming language secure coding practices guide. This is quite useful to understand security best pratice programming in other languages.
IR & Reversing
- An update on the threat landscape
A report from Google about the threat landscape linked to Russia-Ukraine war.