Read My and Shared Links — Week 50/2022. Including (but not only):

  • introduces end-to-end encryption for Gmail on the web
  • to work with nonprofit on cloud security framework for financial services
  • Servers Under Attack: Microsoft Warns About Cross-Platform Botnet
  • Critical Remote Code Execution Vulnerability in Extended Negotiation Security Mechanism
  • fixes ‘actively exploited’ zero-day security vulnerability affecting most iPhones
  • suffers new after attack on vendor, info leaked online

0x58.medium.com/my-shared-link

#cybersecurity #infosec #google #ibm #minecraft #ddos #spnego #apple #uber #databreach

Last updated 3 years ago

Joe Slowik · @jfslowik
2027 followers · 580 posts · Server infosec.exchange
gunstick · @gunstick
95 followers · 263 posts · Server mastodon.opencloud.lu

windows all authenticating (kerberos ?) protocols (SMB, RDP, SMTP ... ) vulnerable to unauth RCE
CVSS 8.1
CVE-2022-37958

#spnego #infosec

Last updated 3 years ago

ϺΛDИVTTΛH :fosstodon: · @madnuttah
185 followers · 1469 posts · Server fosstodon.org
Joe Slowik · @jfslowik
1879 followers · 532 posts · Server infosec.exchange

CVE-2022-37958 will get released:

#spnego #poc

Last updated 3 years ago

Francisco Donoso · @Francisck
130 followers · 33 posts · Server infosec.exchange

Does anyone have details on observables around this / -2022-37958 vulnerability? Would be nice to understand what we can use for potential detection of exploitation.

What logs do we see from attempted exploitation? I assume it depends on the service being exploited? Do we see any particular subsystem crash? etc?

More details would be very valuable from a defenders perspective.

#spnego #cve

Last updated 3 years ago

Burak Gürsoy · @burak
25 followers · 90 posts · Server mastodon.world

alias kurl='curl -i --negotiate -u : '

#kerberos #curl #spnego #alias #dotfiles

Last updated 3 years ago