/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Binni Shah

@binitamshah
17 posts
2024-10-04
Zimbra - Remote Command Execution (CVE-2024-45519) : https://blog.projectdiscovery.io/ ... credits @Parth_Malhotra [image]
2024-10-04 View on X
BleepingComputer

Researchers: hackers are actively exploiting an RCE vulnerability in Zimbra email servers, disclosed on September 27, triggered by emailing the SMTP server

When the mail server handles an email address with shell escape characters, the postjournal binary just shells out and runs whatever is specified. … Will Dormann / @wdormann@infose...

2024-10-03
Zimbra - Remote Command Execution (CVE-2024-45519) : https://blog.projectdiscovery.io/ ... credits @Parth_Malhotra [image]
2024-10-03 View on X
BleepingComputer

Researchers: hackers are actively exploiting an RCE vulnerability in Zimbra email servers, disclosed on September 27, triggered by emailing the SMTP server

Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply …

2024-04-03
Xzbot : Notes, honeypot, and exploit demo for the xz backdoor : https://github.com/... Timeline of the xz open source attack : https://research.swtch.com/... The xz attack shell script : https://research.swtch.com/... [image]
2024-04-03 View on X
research!rsc

A timeline of the attack on open-source project XZ Utils, which began in late 2021 and led to a backdoor with RCE in Linux distros Debian, Red Hat, and others

Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library …

2024-03-22
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds : https://unsaflok.com/ More : https://www.wired.com/... [video]
2024-03-22 View on X
Wired

Researchers reveal a hotel keycard hacking technique that can let a hacker almost instantly open RFID-based Saflok locks used in 3M doors across 13K properties

The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.

2023-03-30
Google finds more Android, iOS zero-days used to install spyware : https://blog.google/... Ref : 1) https://googleprojectzero.blogspot.com/ ... 2 ) Pwning the all Google phone with a non-Google bug : https://github.blog/...
2023-03-30 View on X
The Record

Google's Threat Analysis Group details two limited but highly targeted spyware campaigns using several zero-day exploits against Android, iOS, and Chrome

Two targeted spyware campaigns involving several zero-day exploits for Android, iOS and mobile versions of the Chrome browser were unmasked …

2023-03-01
Lastpass Quietly indicates that Enterprise Users' K2s were accessed : https://support.lastpass.com/ ... Additional details of the attack on LastPass : https://support.lastpass.com/ ...
2023-03-01 View on X
BleepingComputer

LastPass says hackers stole password vault data in 2022 by exploiting an RCE flaw in third-party software to install a keylogger on a DevOps engineer's computer

Lawrence Abrams / BleepingComputer :

2023-02-28
Lastpass Quietly indicates that Enterprise Users' K2s were accessed : https://support.lastpass.com/ ... Additional details of the attack on LastPass : https://support.lastpass.com/ ...
2023-02-28 View on X
BleepingComputer

LastPass says hackers stole password vault data in 2022 by exploiting an RCE flaw in third-party software to install a keylogger on a DevOps engineer's computer

LastPass revealed more information on a “coordinated second attack,” where a threat actor accessed and stole data …

2022-10-10
Intel 12th Gen Alder Lake CPU Source Code Leaked Online : https://hardenedvault.net/... Deleted repo archive : https://web.archive.org/...
2022-10-10 View on X
Tom's Hardware

Intel confirms its proprietary UEFI code appears to have been leaked by a third party; the Alder Lake BIOS source code was leaked to 4chan and GitHub

Hack's perpetrator and origins remain unknown.  —  We recently broke the news that Intel's Alder Lake BIOS source code had been leaked …

2021-09-07
BRAKTOOTH: Causing Havoc on Bluetooth Link Manager : https://asset-group.github.io/ ... Arbitrary Code Execution on ESP32 via Bluetooth Classic (BR/EDR) : https://www.youtube.com/... https://twitter.com/...
2021-09-07 View on X
The Record

Researchers uncover BrakTooth, 16 flaws in Bluetooth firmware in SoC boards used in billions of devices from 11 top vendors that can allow remote code execution

A team of security researchers has published details this week about a suite of 16 vulnerabilities that impact the Bluetooth software stack …Source:Singapore University of Technolo...

2021-09-06
BRAKTOOTH: Causing Havoc on Bluetooth Link Manager : https://asset-group.github.io/ ... Arbitrary Code Execution on ESP32 via Bluetooth Classic (BR/EDR) : https://www.youtube.com/... https://twitter.com/...
2021-09-06 View on X
The Record

Researchers uncover BrakTooth, 16 flaws in Bluetooth firmware in SoC boards used in billions of devices from 11 top vendors that can allow remote code execution

A team of security researchers has published details this week about a suite of 16 vulnerabilities that impact the Bluetooth software stack … Source: Singapore University of Techno...

2021-03-30
Malicious commits made to PHP project on https://git.php.net/ to allow RCE, project moved to https://github.com/ : https://news-web.php.net/...
2021-03-30 View on X
BleepingComputer

The official PHP Git repository was hacked, adding a backdoor RCE to the PHP source code; PHP maintainer says the changes were reverted within a few hours

This commit does not belong to any branch on this repository … Mark Sullivan / Fast Company : Hackers put a back door in a code library that powers 79% of websites Tweets: Sam Kott...

2021-03-29
Malicious commits made to PHP project on https://git.php.net/ to allow RCE, project moved to https://github.com/ : https://news-web.php.net/...
2021-03-29 View on X
BleepingComputer

The official PHP Git repository was hacked to add backdoors to the PHP source code; the changes were “reverted right away”

In the latest software supply chain attack, the official PHP Git repository was hacked and the code base tampered with.

2021-02-22
New malware found on 30,000 Macs has security pros stumped : https://redcanary.com/... credits @ForensicITGuy Arm'd & Dangerous - Malicious code, now native on apple silicon : https://objective-see.com/... credits @patrickwardle https://twitter.com/...
2021-02-22 View on X
Ars Technica

Researchers discover macOS malware dubbed “Silver Sparrow” on at least 30K Macs, which includes a native M1 version and leverages the Installer JavaScript API

and this one is dangerous Matthew Humphries / PCMag : Silver Sparrow Malware Discovered on 30K Infected Macs Joe Rice-Jones / KnowTechie : Mysterious malware was found on nearly 30...

2021-01-16
How I hijacked the top-level domain (TLD) of a sovereign state : https://labs.detectify.com/... credits @Almroot
2021-01-16 View on X
TechCrunch

A security researcher was able to purchase one of the Democratic Republic of Congo's top-level domains, potentially preventing malicious use by attackers

Fredrik Almroth thought the authorities would try to save the critical domain name.  Nobody ever did.

2021-01-04
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways : https://www.eyecontrol.nl/... Patch release + Zyxel security advisory for hardcoded credential vulnerability : https://www.zyxel.com/...
2021-01-04 View on X
ZDNet

Researchers: more than 100K Zyxel firewalls and VPN gateways have a hardcoded admin-level backdoor that can grant attackers root access to devices

The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries.  —  More than 100,000 Zyxel firewalls …

2021-01-03
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways : https://www.eyecontrol.nl/... Patch release + Zyxel security advisory for hardcoded credential vulnerability : https://www.zyxel.com/...
2021-01-03 View on X
ZDNet

Researchers: more than 100K Zyxel firewalls and VPN gateways have a hardcoded admin-level backdoor that can grant attackers root access to devices

The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries.  —  More than 100,000 Zyxel firewalls …

2019-10-20
Malicious Payloads - Hiding beneath the WAV : https://threatvector.cylance.com/ ... cc @asoni How the OceanLotus Threat Group leveraged steganography to conceal malicious backdoor payloads within image files : https://s7d2.scene7.com/... (pdf) https://twitter.com/...
2019-10-20 View on X
ZDNet

Researchers find malware operators are now using steganography techniques to hide malicious code in WAV audio files

Steganography malware trend moving from PNG and JPG to WAV files.  —  Two reports published in the last few months show that malware operators are experimenting with using WAV audi...