Researchers delve into the vulnerabilities inherent in Intel’s branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch Predictor to manipulate and observe path history in modern CPUs. This pivotal research, conducted by experts from the University of California San Diego, opens new avenues for understanding and securing microarchitectural …
Category Archives: Cyber security
vArmor : Enhancing Container Security In Cloud-Native Environments
vArmor is a cloud-native container sandbox system. It leverages Linux’s AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. It can be used to strengthen container isolation, reduce the kernel attack surface, and increase the difficulty and cost of container escape or lateral movement attacks. You can leverage vArmor in the following scenarios to provide sandbox protection for containers …
Continue reading “vArmor : Enhancing Container Security In Cloud-Native Environments”
DOLOST – Harnessing Cyber Deception For Strategic Security Deployments
Explore the cutting-edge framework ‘DOLOST,’ designed to innovate the field of cyber deception. This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats. Table Of Contents About DOLOST is a framework designed to automate …
Continue reading “DOLOST – Harnessing Cyber Deception For Strategic Security Deployments”
LDAP Firewall – Enhancing Security With Advanced Active Directory Protection
LDAP Firewall is an open-source tool for Windows servers that lets you audit and restrict incoming LDAP requests. Its primary use-cases are to protect Domain Controllers, block LDAP-based attacks and tightly control access to the Active Directory schema (e.g enforcing read-only access for users). The tool is written in C++ and makes use of the Microsoft Detours and JsonCpp packages. …
Continue reading “LDAP Firewall – Enhancing Security With Advanced Active Directory Protection”
CVE-2024-36401 : GeoServer Unauthenticated Remote Code Execution In Evaluating Property Name Expressions
GeoServer is an open-source software server written in Java that provides the ability to view, edit, and share geospatial data. It is designed to be a flexible, efficient solution for distributing geospatial data from a variety of sources such as Geographic Information System (GIS) databases, web-based data, and personal datasets. In the GeoServer version prior …
BetterScan-CE Wiki : Integrating Comprehensive Security Scans Into DevOps
It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech stacks. If you like it, please give it a GitHub star/fork/watch/contribute. This will ensure continuous development. Run this command in your code …
Continue reading “BetterScan-CE Wiki : Integrating Comprehensive Security Scans Into DevOps”
Betterscan – Comprehensive Security Orchestration For Code And Infrastructure
Scan your source code and infra IaC against top security risks Betterscan is a orchestration toolchain that uses state of the art tools to scan your source code and infrastructure IaC and analyzes your security and compliance risks. Currently supports: PHP, Java, Scala, Python, PERL, Ruby, .NET Full Framework, C#, C, C++, Swift, Kotlin, Apex (Salesforce), Javascript, Typescript, GO, Infrastructure as a Code (IaC) Security and Best Practices (Docker, Kubernetes (k8s), Terraform AWS, GCP, Azure), …
Continue reading “Betterscan – Comprehensive Security Orchestration For Code And Infrastructure”
SQLRecon – Comprehensive Guide To SQL Server Exploitation And Defense
SQLRecon is a Microsoft SQL Server toolkit that is designed for offensive reconnaissance and post-exploitation. For detailed information on how to use each technique, refer to the wiki. You can download a copy of SQLRecon from the releases page. Alternatively, feel free to compile the solution yourself. This should be as straight forward as cloning the repo, double …
Continue reading “SQLRecon – Comprehensive Guide To SQL Server Exploitation And Defense”
OnMouseMove-HtmlFile-PoC : Unpacking The HTML File Exploit In Russian APT Cyberattacks
PoC for onMouseMove HTML file used in the Russian APT Group campaign targeting Ukraine The HTML File is included as an attachment in the phishing email, when the victim opens the html file and moves the mouse, this triggers the event handler attribute “onmousemove” which runs the Javascript, which further decodes the base64 encoded blob …
Microsoft Azure – Cloud Computing Services
Azure Kubernetes Services (AKS) is Microsoft’s managed kubernetes offering running on Azure. Explore the robust capabilities of Microsoft Azure in our comprehensive guide to cloud computing services. This article delves into Azure Kubernetes Services (AKS), Microsoft’s managed Kubernetes offering that enhances the scalability and efficiency of your applications. Get started with a step-by-step setup guide and …
Continue reading “Microsoft Azure – Cloud Computing Services”