The Osint Cyber War 2023-05-22
The Osint Cyber War 2023-05-22
Summary
Internet Storm Center Infocon Status
The intent of the 'Infocon' is to reflect changes in malicious traffic and the possibility of
disrupted connectivity. In particular important is the concept of "Change". Every host
connected to the Internet is subject to some amount of traffic caused by worms and viruses.
Interesting News
* Free Cyberforensics Training - CSI Linux Basics
Download the distro and take the course to learn what CSI Linux can add to your arsenal. This include a case
management solution, document templates (reports and legal docs), and more GUI options for gathering digital evidence
while storing it to the ongoing case.
https://training.csilinux.com/course/view.php?id=5
* * Our active Facebook group discusses the gambit of cyber security issues. Join the Cyber Secrets Facebook group here.
Index of Sections
Current News
* Packet Storm Security
* Krebs on Security
* Dark Reading
* The Hacker News
* Security Week
* Infosecurity Magazine
* KnowBe4 Security Awareness Training Blog
* ISC2.org Blog
* HackRead
* Koddos
* Naked Security
* Threat Post
* Null-Byte
* IBM Security Intelligence
* Threat Post
* C4ISRNET - Media for the Intelligence Age Military
The Hacker Corner:
* Security Conferences
* Google Zero Day Project
Cyber Range Content
* CTF Times Capture the Flag Event List
* Vulnhub
Tools & Techniques
* Packet Storm Security Latest Published Tools
* Kali Linux Tutorials
* GBHackers Analysis
InfoSec Media for the Week
* Black Hat Conference Videos
* Defcon Conference Videos
* Hak5 Videos
* Eli the Computer Guy Videos
* Security Now Videos
* Troy Hunt Weekly
* Intel Techniques: The Privacy, Security, & OSINT Show
Exploits and Proof of Concepts
* Packet Storm Security Latest Published Exploits
* CXSecurity Latest Published Exploits
* Exploit Database Releases
Cyber Crime & Malware Files/Links Latest Identified
* CyberCrime-Tracker
Advisories
* Hacked Websites
* Dark Web News
* US-Cert (Current Activity-Alerts-Bulletins)
* Zero Day Initiative Advisories
* Packet Storm Security's Latest List
Information Warfare Center Products
* CSI Linux
* Cyber Secrets Videos & Resoures
* Information Warfare Center Print & eBook Publications
Packet Storm Security
Krebs on Security
* CommonMagic APT Campaign Broadens Target Scope to Central and Western Ukraine
* Apple Patches 3 Zero-Days Possibly Already Exploited
* Data Siloes: Overcoming the Greatest Challenge in SecOps
* 3 Common Initial Attack Vectors Account for Most Ransomware Campaigns
* Keep Your Friends Close and Your Identity Closer
* Google Debuts Quality Ratings for Security Bug Disclosures
* AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap
* Enterprises Rely on Multicloud Security to Protect Cloud Workloads
* KeePass Vulnerability Imperils Master Passwords
* Trojan-Rigged Phishing Attacks Pepper China-Taiwan Conflict
* 10 Types of AI Attacks CISOs Should Track
* Microsoft Azure VMs Hijacked in Cloud Cyberattack
* Embedding Security by Design: A Shared Responsibility
* OX Security Launches OX-GPT, AppSec's First ChatGPT Integration
* Satori Augments Its Data Security Platform With Posture Management and Data Store Discovery Capabilit
* Once Again, Malware Discovered Hidden in npm
* LexisNexis Risk Solutions Cybercrime Report Reveals 20% Annual Increase in Global Digital Attack Rate
* WithSecure Launches New Range of Incident Response and Readiness Services
* 3 Ways Hackers Use ChatGPT to Cause Security Headaches
* ActZero Teams Up With UScellular to Secure Mobile Devices From Ransomware Attacks
* U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
* KeePass Exploit Allows Attackers to Recover Master Passwords from Memory
* PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted
* Meet 'Jack' from Romania! Mastermind Behind Golden Chickens Malware
* Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks
* Warning: Samsung Devices Under Attack! New Security Flaw Exposed
* Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024
* Dr. Active Directory vs. Mr. Exposed Attack Surface: Who'll Win This Fight?
* Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware
* Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware
* WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities
* This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide
* Zero Trust + Deception: Join This Webinar to Learn How to Outsmart Attackers!
* How to Reduce Exposure on the Manufacturing Attack Surface
* Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks
Security Week
Infosecurity Magazine
KnowBe4 Security Awareness Training Blog RSS Feed
* Phishing Tops the List Globally as Both Initial Attack Vector and as part of Cyberattacks
* New "Greatness" Phishing-as-a-Service Tool Aids in Attacks Against Microsoft 365 Customers
* Large-Scale "Catphishing" that Targets Victims Looking for Love
* KnowBe4 Celebrates Success of 60,000-Customer Milestone
* The Number of Phishing Attacks Continues to Grow at a Rate of 150% Per Year
* CyberheistNews Vol 13 #20 [Foot in the Door] The Q1 2023's Top-Clicked Phishing Scams | INFOGRAPHIC
* The Face Off: AI Deepfakes and the Threat to the 2024 Election
* The State of Organizational Cyber Defenses Impacts Cyber Insurance Availability, Cost, and Terms
* FTC Warns of MetaMask and PayPal Phishing Campaigns
* 78% of Ransomware Victim Organizations Encounter Additional Threats-Turned-Extortions
ISC2.org Blog
Unfortunately, at the time of this report, the ISC2 Blog resource was not availible.
HackRead
* OpenAI Launches ChatGPT App for iOS, Bolstering Accessibility and Safety
* Teen Charged in DraftKings Data Breach
* FBI, GCHQ Unite To Foil Russian Malware Hacking Tool
* Guide to Choosing the Best Family Cell Phone Plan
* Is it Getting Harder to Pigeonhole Games into Specific Genres?
* Debt Collection Firm Credit Control Corporation Hit by Major Data Breach
* Facebook glitch sent unintended friend requests to users
Koddos
* OpenAI Launches ChatGPT App for iOS, Bolstering Accessibility and Safety
* Teen Charged in DraftKings Data Breach
* FBI, GCHQ Unite To Foil Russian Malware Hacking Tool
* Guide to Choosing the Best Family Cell Phone Plan
* Is it Getting Harder to Pigeonhole Games into Specific Genres?
* Debt Collection Firm Credit Control Corporation Hit by Major Data Breach
* Facebook glitch sent unintended friend requests to users
Naked Security
Threat Post
Null-Byte
InfoWorld
* Unmanned program could suffer if Congress blocks F-22 retirements, Hunter says
* UK to test Sierra Nevada's high-flying spy balloons
* Babcock inks deals to pitch Israeli tech for British radar, air defense programs
* This infantry squad vehicle is getting a laser to destroy drones
* As Ukraine highlights value of killer drones, Marine Corps wants more
* Army Space, Cyber and Special Operations commands form 'triad' to strike anywhere, anytime
* Shell companies purchase radioactive materials, prompting push for nuclear licensing reform
* Marine regiment shows off capabilities at RIMPAC ahead of fall experimentation blitz
* Maxar to aid L3Harris in tracking missiles from space
* US Army's 'Lethality Task Force' looks to save lives with AI
The Hacker Corner
Conferences
CTF Time has links to a lot of current Capture the Flag competitions and information on past events. Below is
a list if CTFs they have on thier calendar.
VulnHub Downloadable CTFs for your Cyber Range (Most use VirtualBox)
* Matrix-Breakout: 2 Morpheus
* Web Machine: (N7)
* The Planets: Earth
* Jangow: 1.0.1
* Red: 1
Tools & Techniques
Packet Storm Security Tools Links
* AIDE 0.18.3
* Simple Universal Fortigate Fuzzer
* Samhain File Integrity Checker 4.4.10
* Suricata IDPE 6.0.12
* Clam AntiVirus Toolkit 1.1.0
* MIMEDefang Email Scanner 3.4.1
* MIMEDefang Email Scanner 3.4
* FortiGate Brute Forcer
* American Fuzzy Lop plus plus 4.06c
* I2P 2.2.1
* WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance
* SilentMoonwalk - PoC Implementation Of A Fully Dynamic Call Stack Spoofer
* Unlock Your Employees' Potential: How UEM Can Help Achieve Employee Experience
* Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation
* How to Use the Snort IDS/IPS Complete Practical Guide
* Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database
* Seekr : A Multi-Purpose OSINT Toolkit With A Neat Web-Interface
* Grepmarx : A Source Code Static Analysis Platform For AppSec Enthusiasts
* Power of Ecommerce Fraud Prevention Tools
* Shoggoth - Asmjit Based Polymorphic Encryptor
GBHackers Analysis
Defcon Conference
* DEF CON 30 - Cesare Pizzi - Old Malware, New tools: Ghidra and Commodore 64
* DEF CON 30 BiC Village - Segun Olaniyan- Growth Systems for Cybersecurity Enthusiasts
* DEF CON 30 - Silk - DEF CON Memorial Interview
* DEF CON 30 Car Hacking Village - Evadsnibor - Getting Naughty on CAN bus with CHV Badge
Hak5
Security Now
* Location Tracker Behavior - Diving deep into Google and Apple's tracker spec, SpinRite update
* Detecting Unwanted Location Trackers - Google Passkeys, Chrome lock icon, AI news sites, Vint Cerf
Troy Hunt
CXSecurity
Kali has the Exploit-DB preinstalled and updates the database on a monthly basis. The tool that they have
added is called "SearchSploit". This can be installed on Linux, Mac, and Windows. Using the tool is also quite
simple. In the command line, type:
There is a second tool that uses searchsploit and a few other resources writen by 1N3 called "FindSploit". It is
also a command line (CLI) tool used to search for exploits, but it also requires online access.
Latest Hacked Websites
Published on Zone-h.org
http://www.juchitlan.gob.mx/o.htm
http://www.juchitlan.gob.mx/o.htm notified by chinafans
http://camoluk.bel.tr/z.html
http://camoluk.bel.tr/z.html notified by Zer0FauLT
http://fevivienda.gov.co/Loser.html
http://fevivienda.gov.co/Loser.html notified by Boss Ranzen
https://dif.poncitlan.gob.mx/join.txt
https://dif.poncitlan.gob.mx/join.txt notified by mr.anderson
https://directorio.poncitlan.gob.mx/join.txt
https://directorio.poncitlan.gob.mx/join.txt notified by mr.anderson
http://srikandi.sukabumikota.go.id/z.php
http://srikandi.sukabumikota.go.id/z.php notified by GayAnon
https://radionigeriaabuja.gov.ng/vz.txt
https://radionigeriaabuja.gov.ng/vz.txt notified by aDriv4
http://mytv.crirs.cr.gov.ng
http://mytv.crirs.cr.gov.ng notified by Sh434t
http://reverse.crirs.cr.gov.ng
http://reverse.crirs.cr.gov.ng notified by Sh434t
http://tv.crirs.cr.gov.ng
http://tv.crirs.cr.gov.ng notified by Sh434t
https://api.crirs.cr.gov.ng
https://api.crirs.cr.gov.ng notified by Sh434t
https://basic.crirs.cr.gov.ng
https://basic.crirs.cr.gov.ng notified by Sh434t
https://goverment.crirs.cr.gov.ng
https://goverment.crirs.cr.gov.ng notified by Sh434t
https://eagrimet.cilss.int/1915.php
https://eagrimet.cilss.int/1915.php notified by D4LGH4CK_TM
https://forum2is.cilss.int/1915.php
https://forum2is.cilss.int/1915.php notified by D4LGH4CK_TM
https://pariis-bibliotheque.cilss.int/turk.php
https://pariis-bibliotheque.cilss.int/turk.php notified by D4LGH4CK_TM
https://caraga.bfar.da.gov.ph/xx.html
https://caraga.bfar.da.gov.ph/xx.html notified by xstro0
Dark Web News
Darknet Live
RiskIQ
* Skimming for Sale: Commodity Skimming and Magecart Trends in Q1 2022
* RiskIQ Threat Intelligence Roundup: Phishing, Botnets, and Hijacked Infrastructure
* RiskIQ Threat Intelligence Roundup: Trickbot, Magecart, and More Fake Sites Targeting Ukraine
* RiskIQ Threat Intelligence Roundup: Campaigns Targeting Ukraine and Global Malware Infrastructure
* RiskIQ Threat Intelligence Supercharges Microsoft Threat Detection and Response
* RiskIQ Intelligence Roundup: Spoofed Sites and Surprising Infrastructure Connections
* RiskIQ Threat Intelligence Roundup: QBot, Magecart, Agent Tesla Headline Hijacked Infrastructure 
* RiskIQ Threat Intelligence Roundup: C2 and Nation-State Threat Infrastructure
* Jupyter Notebooks Make RiskIQ Data a Digital 'Mech Suit' for Threat Intelligence Analysts
* "Offshore" Shinjiru Provides Bulletproof Services to Cyberattackers
FireEye
* Metasploit Weekly Wrap-Up
* Introducing: 'Saved Filters' in InsightCloudSec
* Rapid7 Recognized as a Strong Performer in The Forrester Waveâ„¢ for MDR, Q2 2023
* CVE-2023-27350: Ongoing Exploitation of PaperCut Remote Code Execution Vulnerability
* Metasploit Wrap-up
* [The Lost Bots] S03E03. The Rise of The Machines
* The Velociraptor 2023 Annual Community Survey
* Patch Tuesday - May 2023
* Metasploit Weekly Wrap-Up
* AppDomain Manager Injection: New Techniques For Red Teams
Advisories
US-Cert Alerts & bulletins
ZDI-CAN-20604: Kofax
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'rgod' was
reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to publish a
fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public
advisory.
ZDI-CAN-20605: Kofax
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'rgod' was
reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to publish a
fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public
advisory.
ZDI-CAN-21202: Linux
A CVSS score 4.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N) severity vulnerability discovered by 'Lucas Leong
(@_wmliang_) of Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2023-05-19, 3 days
ago. The vendor is given until 2023-09-16 to publish a fix or workaround. Once the vendor has created and
tested a patch we will coordinate the release of a public advisory.
ZDI-CAN-20601: Kofax
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'rgod' was
reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to publish a
fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public
advisory.
ZDI-CAN-20940: Linux
A CVSS score 7.5 (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21201: Microsoft
A CVSS score 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Li Jiantao
(@CurseRed), Ngo Wei Lin (@Creastery), Pan Zhenpeng (@Peterpan980927), Poh Jia Hao (@Chocologicall)
of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is
given until 2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will
coordinate the release of a public advisory.
ZDI-CAN-21200: Microsoft
A CVSS score 5.6 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) severity vulnerability discovered by 'Li Jiantao
(@CurseRed), Ngo Wei Lin (@Creastery), Pan Zhenpeng (@Peterpan980927), Poh Jia Hao (@Chocologicall)
of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is
given until 2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will
coordinate the release of a public advisory.
ZDI-CAN-21106: Siemens
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Simon Janz
(@esj4y)' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until
2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate
the release of a public advisory.
ZDI-CAN-21132: Siemens
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Simon Janz
(@esj4y)' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until
2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate
the release of a public advisory.
ZDI-CAN-20812: Microsoft
A CVSS score 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N) severity vulnerability discovered by 'Li Jiantao
(@CurseRed), Ngo Wei Lin (@Creastery), Pan Zhenpeng (@Peterpan980927), Poh Jia Hao (@Chocologicall)
of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is
given until 2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will
coordinate the release of a public advisory.
ZDI-CAN-20851: Schneider Electric
A CVSS score 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Sina Kheirkhah
(@SinSinology) of Summoning Team (@SummoningTeam)' was reported to the affected vendor on:
2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to publish a fix or workaround. Once the vendor
has created and tested a patch we will coordinate the release of a public advisory.
ZDI-CAN-20982: Microsoft
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is given until 2023-09-16 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21183: Google
A CVSS score 4.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) severity vulnerability discovered by 'Hossein Lotfi of
Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2023-05-19, 3 days ago. The vendor is
given until 2023-09-16 to publish a fix or workaround. Once the vendor has created and tested a patch we will
coordinate the release of a public advisory.
ZDI-CAN-21025: Foxit
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21019: Foxit
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21020: Foxit
A CVSS score 3.3 (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21062: Foxit
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21085: Foxit
A CVSS score 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21083: Foxit
A CVSS score 3.3 (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21022: Foxit
A CVSS score 3.3 (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) severity vulnerability discovered by 'Anonymous'
was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14 to
publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a
public advisory.
ZDI-CAN-21100: D-Link
A CVSS score 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Nicholas
Zubrisky' was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given until 2023-09-14
to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release
of a public advisory.
ZDI-CAN-20971: oFono
A CVSS score 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Mitch Zakocs
@ ASU SEFCOM Lab' was reported to the affected vendor on: 2023-05-17, 5 days ago. The vendor is given
until 2023-09-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will
coordinate the release of a public advisory.
ZDI-CAN-20768: Famatech
A CVSS score 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) severity vulnerability discovered by 'Xavier
DANEST' was reported to the affected vendor on: 2023-05-12, 10 days ago. The vendor is given until
2023-09-09 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate
the release of a public advisory.
ZDI-CAN-21086: Sante
A CVSS score 3.3 (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) severity vulnerability discovered by 'Mat Powell of
Trend Micro Zero Day Initiative' was reported to the affected vendor on: 2023-05-11, 11 days ago. The vendor
is given until 2023-09-08 to publish a fix or workaround. Once the vendor has created and tested a patch we
will coordinate the release of a public advisory.
Packet Storm Security - Latest Advisories
The Cyber Weekl Awareness Report (WAR) is an Open Source Intelligence (AKA OSINT) resource centering
around an array of subjects ranging from Exploits, Advanced Persistent Threat, National Infrastructure, Dark
Web, Digital Forensics & Incident Response (DIFR), and the gambit of digital dangers.
Items that focus on cyber defense and DFIR usually spotlight capabilities in the CSI Linux environment. If
interested in helping evolve, please let us know. The Cyber Secrets publications rotates between odd quarters
issues focusing on Blue Team and the even issues on Red Team.