Mr.Trunk · @mrtrunk
6 followers · 11627 posts · Server dromedary.seedoubleyou.me
Owen 🇦🇺 · @owen3d
7 followers · 274 posts · Server fosstodon.org

labs.hakaioffsec.com/nginx-ali

More an problem than a but the outcome is the same irrespective of semantics.

#nginx #misconfiguration #vulnerability

Last updated 1 year ago

Marko Jahnke · @markojahnke
105 followers · 330 posts · Server bonn.social

There was a on .social that allowed unauthorized actors do download some user's archive takeout (containing public information).

Eugen Rochko informed the affected users immediately:
"They DO NOT contain your e-mail address or any other Personal Identifiable Information from your account, excepting anything you’ve manually put in your public profile or shared in posts."

#misconfiguration #mastodon

Last updated 1 year ago

sudoheader :verified: · @sudoheader
15 followers · 51 posts · Server infosec.exchange

Bugged - I have just completed this room! Check it out: tryhackme.com/room/bugged protocols execution via @RealTryHackMe

#tryhackme #network #iot #misconfiguration #command #bugged

Last updated 1 year ago

M · @Mysteryx
1 followers · 4 posts · Server infosec.exchange

We just publish a new article:

Exploiting IAM security misconfigurations and how to detect them

sysdig.com/blog/iam-security-m

#iam #aws #misconfiguration

Last updated 2 years ago

M · @Mysteryx
1 followers · 8 posts · Server infosec.exchange

We just published a new article:

Exploiting IAM security misconfigurations and how to detect them

sysdig.com/blog/iam-security-m

#iam #aws #misconfiguration

Last updated 2 years ago

Sparsely populated instances may inadvertently leak their users' follower list; even if users have opted to hide their social graph.

This happens because users who have opted to hide their social graph aren't opted-out of their incoming posts being displayed in the social graph.

This can be mitigated. Admins can disable unauthenticated access to the instances federated timeline.

justinmcafee.com/2022/11/masto

#mastodon #privacy #safety #digitalleakage #threatmodel #riskprofile #misconfiguration

Last updated 2 years ago

Font Awesome service lead to possible of SSL

#misconfiguration #leak #privatekey

Last updated 2 years ago

Tru Huynh · @tru
28 followers · 20 posts · Server fosstodon.org
Tru Huynh · @tru
39 followers · 39 posts · Server fosstodon.org
DarkOperator 🚀 · @DarkOperator
512 followers · 224 posts · Server infosec.exchange
Julien M. · @julm
485 followers · 4935 posts · Server framapiaf.org


> Weaponizing Middleboxes for Reflected
> Censors pose a to the entire .

> We discover a new way that attackers could launch reflected denial of service () amplification attacks over by abusing middleboxes and infrastructure. […]

> We found multiple types of middlebox in the wild that can lead to technically infinite amplification for the attacker […]
geneva.cs.umd.edu/posts/usenix

#usenix #geneva #misconfiguration #internet #threat #amplification #tcp #censorship #dos #infosec

Last updated 3 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches - Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top t... more: threatpost.com/chris-vickery-a

#hack #video #hacks #videos #breach #databreach #threatpostvideo #exposeds3bucket #misconfiguration #newsmakerinterviews

Last updated 4 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online