TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ ALPACA: New TLS Attack Allows User Data Extraction, Code Execution

IT Security Nachrichten feedproxy.google.com

Researchers from three universities in Germany have identified a new TLS attack method that can allow a man-in-the-middle (MitM) attacker to extract user data or execute arbitrary code.

The new attack, dubbed ALPACA, has been described as an “application layer protocol content confusion attack.”

read more

...


Kompletten Artikel lesen (externe Quelle: http://feedproxy.google.com/~r/securityweek/~3/kzKX5hrYwxQ/alpaca-new-tls-attack-allows-user-data-extraction-code-execution)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

vom 1259.69 Punkte
Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result o

Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

vom 1050.36 Punkte
This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t

Diving Deep Into a Pwn2Own Winning WebKit Bug

vom 1035.13 Punkte
Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of

Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

vom 907.06 Punkte
Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be

Regex Performance Improvements in .NET 5

vom 899.61 Punkte
The System.Text.RegularExpressions namespace has been in .NET for years, all the way back to .NET Framework 1.1. It’s used in hundreds of places within the .NET implementation itself, and directly by thousands upon thousands of applications. Across all of t

ConfigureAwait FAQ

vom 809.82 Punkte
.NET added async/await to the languages and libraries over seven years ago. In that time, it’s caught on like wildfire, not only across the .NET ecosystem, but also being replicated in a myriad of other languages and frameworks. It’s also seen a ton of im

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

vom 738.23 Punkte
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

Usb webcam not working

vom 736.93 Punkte
hi i have a usb webcam plugged in but computer does not see it and i cant find drivers for it, ​ System: Kernel: 5.11.1-zen1-1-zen x86_64 bits: 64 compiler: gcc v: 10.2.1 parameters: BOOT_IMAGE=/@/boot/vmlinuz-linux-zen root=UUID=1aaa9182-8f71-47d7-bd74-23

CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification

vom 714.54 Punkte
During the recent Pwn2Own 2020 competition, Manfred Paul (@_manfp) of RedRocket CTF used an improper input validation bug in the Linux kernel to go from a standard user to root. Manfred used this bug during the contest to win $30,000 in the Privilege Escalation categ

GPOZaurr - Group Policy Eater Is A PowerShell Module That Aims To Gather Information About Group Policies

vom 673.44 Punkte
Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.Installing GPOZaurr requires RSAT installed to provide results. If you don't have them you can install the

Frp - A Fast Reverse Proxy To Help You Expose A Local Server Behind A NAT Or Firewall To The Internet

vom 660.13 Punkte
A Fast Reverse Proxy To Help You Expose A Local Server Behind A NAT Or Firewall To The Internet.Development Status frp is under development. Try the latest release version in the master branch, or use the dev branch for the version in development. Th

Announcing TypeScript 3.7

vom 658.34 Punkte
We’re thrilled to announce the release of TypeScript 3.7, a release packed with awesome new language, compiler, and tooling features. If you haven’t yet heard of TypeScript, it’s a language based on JavaScript that adds static type-checking along wit

Team Security Diskussion über ALPACA: New TLS Attack Allows User Data Extraction, Code Execution