A cup of vulnerabiliTEA is a podcast dedicated to honouring and sharing vulnerable moments. My goal is to share relatable life experiences, spread love, inspire empathy and vulnerability, and create space to grow and learn from this wholesome journey. So grab your TEA (or coffee, wine, water) and join me with new episodes bi-weekly.
We live on WeaponWorld. Why not PeaceWorld? How would that work? What should we expect? Has that transition been discussed to your satisfaction, or was it suppressed? I'm slopping a ladle full of forbidden PeaceWorld Mulligan Stew on your WeaponWorld prison zinc tray. Next! Nous habitons la terre en armes. Pourquoi pas au monde paisible ? Comment cela marcherait-il ? Cette transition t'a-t-elle été discutée de façon satisfaisante ou supprimée ? Je te verse une louchée interdite de Ragout Mul ...
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
This show is about remembering, finding, rediscovering, reigniting that feeling of vibrancy. Happiness is your birthright, are you ready to make waves? 🔥💖
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications. https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw http…
Le traitement des données dans une technologie paisible. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Information handling in a peace technology. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spamer attempted to make us change a link from an old podcast episode. https://isc.sans.edu/diary/Some%20new%20Data%20Feeds%2C%20and%20a%20little%20%22incident%22./31786 Veeam Deserialization Vulnerability Veeam released details regarding the latest vulner…
The peace technology applications of science and superstition. True scientific creativity has flatlined since the 1950s. It’s been reduced to marginal improvements of gadgets and banging smaller and smaller objects with bigger and bigger hammers. Corporate weapon science has buried untold scientific discoveries, pending their release during the nex…
L'application de la science et des superstitions aux technologies paisibles. La véritable créativité scientifique a souffert de ligne plate depuis les années 1950. Elle s’est restreinte à l’amélioration de gadgets aux marges et la à frappe de marteaux plus massifs sur des objets plus microscopiques. La science d’armes corporative a enterré de nombr…
Le manque d'observer des avertissements jusqu’à ce qu'il ne soit trop tard, en accord avec la mentalité d'armes. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Failure to heed warnings until it’s too late, in accordance with weapon mentality. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 CVE-2024-20440 Attackers added last September's Cisco Smart Licensing Utility vulnerability to their toolset. These attacks orginate most likely from botnets and the same attackers are scanning for a wide range of additional vulnerabilities. The vulnerability is a static credential i…
Python Bot Delivered Through DLL Side-Loading A "normal", but vulnerable to DLL side-loading PDF reader may be used to launch additional exploit code https://isc.sans.edu/diary/Python%20Bot%20Delivered%20Through%20DLL%20Side-Loading/31778 Tomcat RCE Correction To exploit the Tomcat RCE I mentioned yesterday, two non-default configuration options mu…
Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authenticatio…
Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20R…
How did we get shanghaied aboard this prison galley? Please consult the Table of Contents Page https://www.buzzsprout.com/1106222/4058345 for INTRO and SECTION chapters https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)…
Mais qu’allait-on faire dans cette galère ? Prier consulter la page Table des matières https://www.buzzsprout.com/1106222/4058453 Pous les chapitres d’ INTRO et de SECTION https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)…
How to tumble unstable WeaponWorld into stable PeaceWorld? Please consult the Table of Contents page https://www.buzzsprout.com/1106222/4058345 for INTRO and SECTION chapters https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)…
Comment culbuter la terre en armes en pointe sur son vertex du monde paisible ? Prier consulter la page Table des matières https://www.buzzsprout.com/1106222/4058453 Pous les chapitres d’ INTRO et de SECTION https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024…
What to expect from PeaceWorld? Please consult the Table of Contents page https://www.buzzsprout.com/1106222/4058345 for INTRO and SECTION chapters https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By learnermarkv
À quoi s’attendre du monde paisible ? Prier consulter la page Table des matières https://www.buzzsprout.com/1106222/4058453 Pous les chapitres d’ INTRO et de SECTION https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)…
File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released…
Log4J Scans for VMWare Hyhbrid Cloud Extensions An attacker is scanning various login pages, including the authentication feature in the VMWare HCX REST API for Log4j vulnerabilities. The attack submits the exploit string as username, hoping to trigger the vulnerability as Log4j logs the username https://isc.sans.edu/diary/Scans%20for%20VMWare%20Hy…
Microsoft Patch Tuesday Microsoft Patched six already exploited vulnerabilities today. In addition, the patches included a critical patch for Microsoft's DNS server and about 50 additional patches. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20March%202025/31756 Apple Updates iOS/macOS Apple released an update to address a single, alr…
Shellcode Encoded in UUIDs Attackers are using UUIDs to encode Shellcode. The 128 Bit (or 16 Bytes) encoded in each UUID are converted to shell code to implement a cobalt strike beacon https://isc.sans.edu/diary/Shellcode%20Encoded%20in%20UUIDs/31752 Moxa CVE-2024-12297 Expanded to PT Switches Moxa in January first releast an update to address a fr…
Commonly Probed Webshell URLs Many attackers deploy web shells to gain a foothold on vulnerable web servers. These webshells can also be taken over by parasitic exploits. https://isc.sans.edu/diary/Commonly%20Probed%20Webshell%20URLs/31748 Undocumented ESP32 Commands A recent conference presentation by Tarlogic revealed several "backdoors" or undoc…
Latest Google Chrome Update Encourages UBlock Origin Removal The latest update to Google Chrome not only disabled the UBlock Origin ad blocker, but also guides users to uninstall the extension instead of re-enabling it. https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html https://www.reddit.com/r/youtube/comments/1j2…
DShield Traffic Analysis using ELK The "DShield SIEM" includes an ELK dashboard as part of the Honeypot. Learn how to find traffic of interest with this tool. https://isc.sans.edu/diary/DShield%20Traffic%20Analysis%20using%20ELK/31742 Zen and the Art of Microcode Hacking Google released details, including a proof of concept exploit, showing how to …
Se chausser dans les bottes du combattant moyen. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Pull on the boots of an average grunt. https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By mark
Romanian Distillery Scanning for SMTP Credentials A particular attacker expanded the scope of their leaked credential file scans. In addition to the usual ".env" style files, it is not looking for specific SMTP related credential files. https://isc.sans.edu/diary/Romanian%20Distillery%20Scanning%20for%20SMTP%20Credentials/31736 Tool Updates: mac-ro…
Mark of the Web: Some Technical Details Windows implements the "Mark of the Web" (MotW) as an alternate data stream that contains not just the "zoneid" of where the file came from, but may include other data like the exact URL and referrer. https://isc.sans.edu/diary/Mark%20of%20the%20Web%3A%20Some%20Technical%20Details/31732 Havoc Sharepoint with …
Common Crawl includes Common Leaks The "Common Crawl" dataset, a large dataset created by spidering website, contains as expected many API keys and other secrets. This data is often used to train large language models https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data Github Repositories E…
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
https://www.buzzsprout.com/1106222/13366779 LEARNER full text (2024) https://www.buzzsprout.com/1106222/13381922 APPRENTI texte integral (2024)By Portrait by my brilliant wife, Linda Hulce
Njrat Compaign Using Microsoft dev Tunnels: A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724 NrootTag Apple FindMy Abuse Malware could use a weakness in the keys …
Attacker of of Ephemeral Ports Attackers often use ephermeral ports to reach out to download additional resources or exfiltrate data. This can be used, with care, to detect possible compromises. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Malware%20Source%20Servers%3A%20The%20Threat%20of%20Attackers%20Using%20Ephemeral%20Ports%20as%20Service%2…
Massive Botnet Targets M365 with Password Spraying A large botnet is targeting service accounts in M365 with credentials stolen by infostealer malware. https://securityscorecard.com/wp-content/uploads/2025/02/MassiveBotnet-Report_022125_03.pdf Mixing up Public and Private Keys in OpenID The complex OpenID specificiation and the flexibility it suppo…
Unfurl Update Released Unfurl released an Update fixing a few bugs and adding support to decode BlueSky URLs. https://isc.sans.edu/diary/Unfurl%20v2025.02%20released/31716 Google Confirms GMail To Ditch SMS Code Authentication Google no longer considers SMS authentication save enough for GMail. Instead, it pushes users to use Passkeys, or QR code b…
Tool Update: Sigs.py Jim updates sigs.py. The tool verifies hashes for files and automatically recognizes what hash is used. https://isc.sans.edu/diary/Tool%20update%3A%20sigs.py%20-%20added%20check%20mode/31706 Google Announcing Quantum Safe Digital Signatures in Cloud KMS Google announced the option to use quantum safe digital signatures for its …
In this conversation, I talk about the energetic shifts expected in 2025. It is important that we choose peace amidst chaos, the role of intuition in embracing change, and the significance of prayer and support during transformative times. The discussion encourages listeners to connect with their inner selves and find solace in community and spirit…
Using ES|QL In Kibana to Query DShield Honeypot Logs Using the "Elastic Search Piped Query Language" to query DShield honeypot logs https://isc.sans.edu/diary/Using%20ES%7CQL%20in%20Kibana%20to%20Queries%20DShield%20Honeypot%20Logs/31704 Mongoose Flaws Put MongoDB at risk The Object Direct Mapping library Mongoose suffers from an injection vulnerab…
XWorm Cocktail: A Mix of PE data with PowerShell Code Quick analysis of an interesting XWrom sample with powershell code embedded inside an executable https://isc.sans.edu/diary/XWorm+Cocktail+A+Mix+of+PE+data+with+PowerShell+Code/31700 Microsoft's Majorana 1 Chip Carves New Path for Quantum Computing Microsoft announced a breack through in Quantum…
ModelScan: Protection Against Model Serialization Attacks ModelScan is a tool to inspect AI models for deserialization attacks. The tool will detect suspect commands and warn the user. https://isc.sans.edu/diary/ModelScan%20-%20Protection%20Against%20Model%20Serialization%20Attacks/31692 OpenSSH MitM and DoS Vulnerabilities OpenSSH Patched two vuln…
My Very Personal Guidance and Strategies to Protect Network Edge Devices A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable. https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660 Postg…