Kinsing threat actors probed the Looney Tunables flaws in recent attacks

Kinsing threat actors are exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables to target cloud environments. Researchers are cloud security firm Aqua have observed threat actors exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables in attacks against cloud environments. The vulnerability Looney Tunables (CVE-2023-4911 (CVSS score 7.8)) is a buffer overflow issue that […]

The post Kinsing threat actors probed the Looney Tunables flaws in recent attacks appeared first on Security Affairs.

November 4, 2023
Read More >>

Hack The Box: Topology Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Topology Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Topology machine? For the user flag, you will need to abuse a website that runs based on LaTeX inline math […]

The post Hack The Box: Topology Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

November 4, 2023
Read More >>

BiBi-Linux wiper targets Israeli companies

Attackers have started using new wiper malware called BiBi-Linux to attack Israeli companies and destroy their data. The BiBi-Linux wiper The Security Joes Incident Response team found the malware during a forensics investigation of a breach within an …

October 31, 2023
Read More >>

Hack The Box: Gofer Machine Walkthrough – Hard Difficulty

In this post, I would like to share a walkthrough of the Gofer Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Gofer machine? For the user flag, you will need to bypass it with a different method that requires web application authentication which allows for […]

The post Hack The Box: Gofer Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

October 28, 2023
Read More >>

StripedFly: Perennially flying under the radar

Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was quite astonishing.

October 26, 2023
Read More >>

Hack The Box: Jupiter Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Jupiter Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Jupiter machine? For the user flag, you will need to enumerate the subdomain which we found a subdomain directed to […]

The post Hack The Box: Jupiter Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

October 21, 2023
Read More >>