Tag
#Linux
By Deeba Ahmed For your information, BusyBox is generally used by embedded devices like IoT products or ICS (industrial control systems). This is a post from HackRead.com Read the original post: 14 security vulnerabilities reported in BusyBox Linux utility
By Waqas Researchers dubbed it a "straightforward Linux kernel locking bug" that they exploited against Debian Buster's 4.19.0.13-amd64 kernel. This is a post from HackRead.com Read the original post: New Linux kernel memory corruption bug causes full system compromise
<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-M_M-0bf6M28/YUOdpCkjs4I/AAAAAAAAuwA/voMYX-s0vSkdD7d3_EoPvBC-EF93luWFQCNcBGAsYHQ/s2048/crowdsec_logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1383" data-original-width="2048" height="432" src="https://1.bp.blogspot.com/-M_M-0bf6M28/YUOdpCkjs4I/AAAAAAAAuwA/voMYX-s0vSkdD7d3_EoPvBC-EF93luWFQCNcBGAsYHQ/w640-h432/crowdsec_logo.png" width="640" /></a></div><p><br /></p> <p>CrowdSec is a free, modern & collaborative behavior detection engine, coupled with a global IP reputation network. It stacks on fail2ban's philosophy but is IPV6 compatible and 60x faster (Go vs Python), uses Grok patterns to parse logs and YAML scenario to identify behaviors. CrowdSec is engineered for modern Cloud / <a href="https://www.kitploit.com/search/label/Containers" target="_blank" title="Containers">Containers</a> / VM based infrastructures (by dec...
<p><a href="https://1.bp.blogspot.com/-7QbhLhL3vQQ/YUKywnBE4bI/AAAAAAAAumM/sqFuqQyC9D0EA6Kqq6-flQcHj3ZRQIJAgCNcBGAsYHQ/s1200/kali-linux-2021.3-release.jpg" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" data-original-height="628" data-original-width="1200" height="334" src="https://1.bp.blogspot.com/-7QbhLhL3vQQ/YUKywnBE4bI/AAAAAAAAumM/sqFuqQyC9D0EA6Kqq6-flQcHj3ZRQIJAgCNcBGAsYHQ/w640-h334/kali-linux-2021.3-release.jpg" width="640" /></a></p><br /><p></p> Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates.<span><a name='more'></a></span><div><br /></div><div><p>A summary of the <a href="https://bugs.kali.org/changelog_page.php">changes</a> since the <a href="https://www.kali.org/blog/kali-linux-2021-2-release/">2021.2 release from June</a> are:</p><ul><li><strong>OpenSSL</strong> - Wide compatibility by default - Keep reading for what that means</li><li><strong>New Kali-Tools site</strong> - Followin...
<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s663/rootend.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="575" data-original-width="663" src="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s16000/rootend.png" /></a></div><p><br /></p> <p>rootend is a python *nix Enumerator & Auto <a href="https://www.kitploit.com/search/label/Privilege%20Escalation" target="_blank" title="Privilege Escalation">Privilege Escalation</a> tool.</p> <p><em>For a full list of our tools, please visit our website <a href="https://www.twelvesec.com/" rel="nofollow" target="_blank" title="https://www.twelvesec.com/">https://www.twelvesec.com/</a></em></p> <p>Written by:</p> <ul> <li><a href="https://github.com/nickvourd" rel="nofollow" target="_blank" title...
Hello everyone! After 4 episodes of the Last Week’s Security news, I decided to change the format. I will no longer try to cover all the important news, because it takes a long time to prepare such reviews. So, from now on, I will focus only on a few news of the past week, which […]
The Gartner Vulnerability Management Reports are one of the few marketing reports that I try to read regularly. This started back in the days when I was working for a VM vendor doing competitive analysis. Gartner is one of the few organizations that think about Vulnerability Assessment and Vulnerability Management and clearly articulate where we […]