Plus récents

Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory

github.com/optiv/Ivy

How to bypass EDR with Microsoft Teams ?

  • Copy payload into: %userprofile%\AppData\Local\Microsoft\Teams\current\

  • Then: %userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "args"

Credit: Elli (IR)

ParseFortinetSerialNumber - A to parse products serial numbers, and detect the associated model and version.

github.com/p0dalirius/ParseFor

MirrorDump - Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory.

github.com/snovvcrash/MirrorDu

[PDF] A comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures.

0xinfection.github.io/reversin

🇺🇸 The health information management services provider CIOX Health (cioxhealth.com) has suffered a data breach that has affected at least 32 healthcare providers. CIOX health started notifying affected healthcare provider clients about the breach on December 30, 2021. The security breach has been reported to the HHS' Office for Civil Rights by CIOX Health as affecting 12,493 individuals.

hipaajournal.com/over-30-healt

New Windows Server updates cause DC boot loops, break Hyper-V. The most serious issue introduced by these is that Windows Domain Controllers enter a boot loop, with servers getting into an endless cycle of starting and then rebooting after a few minutes. After installing Microsoft Updates, Resilient File System (ReFS) volumes are no longer accessible or are seen as RAW (unformatted) after installing the updates. In addition to the boot loops, Hyper-V no longer starts on the server. Microsoft released security updates to fix four different Hyper-V vulnerabilities yesterday (CVE-2022-21901, CVE-2022-21900, CVE-2022-21905, and CVE-2022-21847), which are likely causing this issue.

bleepingcomputer.com/news/micr

🇬🇧 Plus de 50 000 courriers envoyés par des banques et des collectivités locales indexées par Google suite à une erreur de la société de sous-traitance Virtual Mail Room (vmailroom.co.uk)

wired.co.uk/article/virtual-ma

La start-up française 🇫🇷 Pasqal (pasqal.io) qui cherche à développer un ordinateur quantique de 1 000 qubits fusionne avec l'entreprise Néerlandaise 🇳🇱 Qu&Co (quandco.com) pour donner naissance à un leader européen.

pasqal.io/2022/01/11/quantum-s

🇫🇷 1/4 des employés français de -45 ans sont prêt à démissionner à cause d'expériences négatives avec l'outil informatique. Ras-le-bol. La coupe est pleine.
solutions-numeriques.com/un-em

A code similarity of 85% between the and samples of TellYouThePass, showcasing the minimal adjustments needed to make the run on different operating systems. 's popularity among developers has steadily increased over the past years.
crowdstrike.com/blog/tellyouth

🇨🇭 Gestion de fortune: la plateforme Aquila (aquila.ch) victime d'un piratage ? Des pirates affirment avoir volé des données à la société zurichoise, un important acteur de la finance, qui offre des services à des gestionnaires de fortune indépendants, notamment à Genève.
letemps.ch/economie/gestion-fo

🇺🇸 Une prison du Nouveau-Mexique aux États-Unis paralysée par une attaque informatique de type . Des caméras et des portes automatiques hors service, le fonctionnement du centre de détention est en mode dégradé, et les détenus ont été confinés.

numerama.com/cyberguerre/81637

🇺🇸 A attack took a New Mexico jail offline, leaving inmates in - The attack knocked out cameras and automatic in the center in Bernalillo County, triggering a crisis response

theverge.com/2022/1/11/2287847

Microsoft Security Update Guide (SUG) - Customers can sign up with any email address ( no longer a requirement that the email be a Microsoft Live ID ) and receive notifications at that address. The new system will be launched in 3 phases:

  • Phase #1 : Create a « Profile » and « Sign-up » for the new notifications
  • Phase #2 : Notifications sent from new system and old system
  • Phase #3 : Notifications cease from old system

When we reach a critical mass of people receiving the new notifications, we will discontinue sending from the old system.
\msrc-blog.microsoft.com/2022/0

🌟 A great article ! ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation. Vulnerable drivers have been a known problem for a long time and have been abused, and while some effort has been made to mitigate the effects, it is still an ongoing battle.

welivesecurity.com/2022/01/11/

Analyzing malicious Office files - Microsoft files are used by attackers to deliver to endpoints. Attackers are leveraging both the different file formats and vulnerabilities in Microsoft Office products to launch malicious commands that will eventually lead to malware.

intezer.com/blog/malware-analy

Plus anciens