dmv.community is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small regional Mastodon instance for those in the DC, Maryland, and Virginia areas. Local news, commentary, and conversation.

Administered by:

Server stats:

155
active users

#securityresearch

1 post1 participant0 posts today

The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…
 
OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.
 
By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.
 
In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: pentestpartners.com/security-b

This all might improve with CNAs, but I am slightly frustrated with the #CVE process through #Mitre atm. I applied for a CVE number 1 1/2 months ago and got a reply after three weeks stating that the vulnerability did not qualify for a CVE.

I'm quite sure this was due to a misunderstanding since the application asks us to be brief rather than laying out a lot of details, so I replied with how I do believe it does (basically, they thought the attacker don't have physical access in the normal use case, which they do) and apologized for not having expanded in detail - and did.

That was two weeks ago. I get having a queue where it can take three weeks for the initial response, but if it's going to be three weeks for every reply in a back'n'forth then there will be no CVE allocated once the 90 day disclosure period is up.

The vendor? Yeah they acted immediately on the report. But this is a case where I think the vulnerable customers would gain from CVE communication.

Imagine you have a friend who’s worked in security for nearly a decade and they’re feeling burned out. The spark is still there, they care about the work, but they are ✨tired✨. Nothing feels exciting or interesting anymore.

Apart from taking some time off, they’ve asked for podcast or book recs—stories that will help them feel that twinge of excitement, that will remind them of how rewarding and fascinating this field can be.

What do you suggest?

While I may publish a more complete blog post about this later
I also sent this on twitter to make #Github aware of it quicker
However I felt that I should also publish it here.

I recently came upon this post on reddit: reddit.com/r/cybersecurity_hel

Which awakened my curiosity about this user who has quite a few repo's with multiple stars: github[.]com/AppsForDesktop

looking at their profile I noticed various repo's claiming to be desktop app for various popular websites and apps.

When I investigated these repo's in my sandboxes I discovered they installed the file: cnertucbrcaj[.]exe and performed various persistence techniques,
Adding several exclusions to defender
and uninstalling various windows security components such as MRT.

After which it of course connected to various Monero mining pools.

🎉​ And we’re on Mastodon!

If you’re new to The Spamhaus Project, check out our bio above 🔝

Ultimately, we’re here to build a community. A community of like-minded individuals, who want to make the internet a safer place. On Mastodon, we’ll be sharing latest threat intelligence from our researchers and threat hunters, and we’d like to invite you to do the same….

Earlier this month, we launched our Threat Intel Community, giving anyone the ability to submit malicious domains, IPs, email source codes, or URLs to Spamhaus through our user-friendly portal.

If you’re curious to know more, read this blog:
spamhaus.org/news/article/821/

Or visit the Threat Intel Community here:
submit.spamhaus.org