InfoSec Write-ups - Medium-- Installing an unsigned iOS app (what is the prerequisite of jailbreaking) using Linux with (semi-)legitimate tools.Consider the following situation: we have a factory-installed iOS device (iPhone 5S here) with a recent iOS version (12.4.8) and we want to jailbreak it. We have a Linux desktop (Arch Linux in the following guide), … Continue reading Jailbreaking iOS without a Mac (1/4): The Plan
How Attackers Hacked the Feds with VPN Vulnerabilities – ThreatWire
LIVE Webinar on Zerologon Vulnerability: Technical Analysis and Detection
The Hacker News-- I am sure that many of you have by now heard of a recently disclosed critical Windows server vulnerability—called Zerologon—that could let hackers completely take over enterprise networks. For those unaware, in brief, all supported versions of the Windows Server operating systems are vulnerable to a critical privilege escalation bug that resides in … Continue reading LIVE Webinar on Zerologon Vulnerability: Technical Analysis and Detection
Caught in the payment fraud net: when, not if?
Malwarebytes Labs-- Sometimes, I think there are three certainties in life: death, taxes, and some form of payment fraud. Security reporter Danny Palmer experienced this a little while ago, and has spent a significant amount of time tracking the journey of his card details from the UK to Suriname. His deep-dive confirmed that it is … Continue reading Caught in the payment fraud net: when, not if?
Government Software Provider Tyler Technologies Suffered Ransomware Attack
Latest Hacking News-- Continuing the trail of ransomware attack victims, now joins Tyler Technologies – a government software provider. While the service has Government Software Provider Tyler Technologies Suffered Ransomware Attack on Latest Hacking News. View original article on Latest Hacking News
Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries
KitPloit - PenTest Tools!-- Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus works without disassembling these binaries, which is an advantage for binaries that are complex to disassemble and where common tools miss functions. In addition, the binary-only approach makes it … Continue reading Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries
Critical Instagram App RCE Flaw Could Threaten Android And iOS Devices
Latest Hacking News-- Instagram has again made it to the news due to a serious security flaw. Reportedly, a critical RCE flaw existed Critical Instagram App RCE Flaw Could Threaten Android And iOS Devices on Latest Hacking News. View original article on Latest Hacking News
Exploiting: SSRF For Admin Access
InfoSec Write-ups - Medium-- Introduction:Continue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Teenager Awarded $25K Bounty For Finding Stored XSS In Instagram Spark AR
Latest Hacking News-- A teenage researcher was awarded $25,000 as bounty for discovering a flaw affecting Instagram. Specifically, he found a stored XSS Teenager Awarded $25K Bounty For Finding Stored XSS In Instagram Spark AR on Latest Hacking News. View original article on Latest Hacking News
75: Compromised Comms
Darknet Diaries-- From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This had terrifying consequences.Guests this episodes are Jenna McLaughlin and Zach Dorfman.SponsorsThis episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.This episode was sponsored by Thinkst Canary. Their … Continue reading 75: Compromised Comms


