Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that’s appeared in the threat landscape. https://securityaffairs.com/151869/malware/bunnyloader-maas.html?amp=1
Kinsing Malware Exploits Novel Openfire Vulnerability https://blog.aquasec.com/kinsing-malware-exploits-novel-openfire-vulnerability
Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation) https://github.com/malcomvetter/Periscope
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool https://github.com/FalconForceTeam/FalconHound
POSTDump: Another tool to perform minidump of LSASS process using few technics to avoid detection. https://github.com/YOLOP0wn/POSTDump
Hashed and rehashed a tale of Goodware hashes https://dansec.medium.com/hashed-and-rehashed-a-tale-of-goodware-hashes-61da19c65528
ShellTorch: Multiple Critical Vulnerabilities in PyTorch Model Server (TorchServe) (CVSS 9.9, CVSS 9.8) Threatens Countless AI Users - Immediate Action Required https://www.oligo.security/blog/shelltorch-torchserve-ssrf-vulnerability-cve-2023-43654
I Hacked MacOS! https://asahilina.net/agx-exploit/
China’s Baidu Introduces ChatGPT Rival Ernie Bot https://www.hackread.com/chinas-baidu-chatgpt-rival-ernie-bot/
FISC Rules That [REDACTED] Is Not Subject to FISA 702 for One of Its Services https://www.emptywheel.net/2023/08/27/fisc-rules-that-redacted-is-not-subject-to-fisa-702-for-one-of-its-services/
Persistent Threat: New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/
Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that’s appeared in the threat landscape. https://securityaffairs.com/151869/malware/bunnyloader-maas.html?amp=1
Hackers Stole Access Tokens from Okta’s Support Unit https://krebsonsecurity.com/2023/10/hackers-stole-access-tokens-from-oktas-support-unit/
Meta Cripples China's Signature 'Spamouflage' Influence Op https://www.darkreading.com/application-security/meta-vs-china-social-giant-cripples-chinese-disinformation-apt
0-days exploited by commercial surveillance vendor in Egypt https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/
Config Extraction from in-memory CobaltStrike Beacons https://cyber.wtf/2023/10/13/config-extraction-from-in-memory-cobaltstrike-beacons/
Chinese hackers have unleashed a never-before-seen Linux backdoor https://arstechnica.com/security/2023/09/never-before-seen-linux-backdoor-is-a-windows-malware-knockoff/
CVE-2023-36874: proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) https://github.com/d0rb/CVE-2023-36874
Kinsing Malware Exploits Novel Openfire Vulnerability https://blog.aquasec.com/kinsing-malware-exploits-novel-openfire-vulnerability
CVE-2023-36874: proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) https://github.com/d0rb/CVE-2023-36874