GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by cR0w :cascadia: (cr0w@infosec.exchange)

  1. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 20-Jun-2025 23:35:18 JST cR0w :cascadia: cR0w :cascadia:

    Law enforcement: AI is not a valid tool for planning backcountry excursions and those people who are reckless and require help should have to pay for it.

    Also law enforcement: We are excited to introduce our new AI-powered predictive policing tool.

    In conversation about 6 days ago from infosec.exchange permalink
  2. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 20-Jun-2025 21:22:55 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • Kevin Beaumont

    @GossiTheDog It's just sparkling extortion.

    In conversation about 6 days ago from infosec.exchange permalink
  3. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 20-Jun-2025 21:20:31 JST cR0w :cascadia: cR0w :cascadia:

    Aflac with a Friday 8-K.

    On June 12, 2025, Aflac Incorporated, a Georgia corporation (the “Company”), identified unauthorized access to its network. The Company promptly initiated its cybersecurity incident response protocols and believes that it contained the intrusion within hours. The Company’s business remains operational, and its systems were not affected by ransomware. The Company continues to serve its policyholders as it responds to this incident and can underwrite policies, review claims, and otherwise service customers as usual. The Company has engaged leading third-party cybersecurity experts to support the Company’s response to the incident.

    https://www.sec.gov/ix?doc=/Archives/edgar/data/4977/000000497725000128/afl-20250620.htm

    In conversation about 6 days ago from infosec.exchange permalink
  4. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 17-Jun-2025 06:09:37 JST cR0w :cascadia: cR0w :cascadia:

    Bouncer: Hold up. What's your name?

    Me: cR0w

    Bouncer: Sorry. Not on the list.

    Me: Exactly. Which means I am now root.

    Bouncer: Go on in, root cR0w.

    In conversation about 9 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: kajabi-storefronts-production.kajabi-cdn.com
      Growth Strategy for $5M–$50M Businesses | Ask.Me
      You’ve outgrown your marketing. Fix how your business is seen. Ask.Me helps $5M+ business owners attract better clients with clarity and strategy.
  5. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Monday, 16-Jun-2025 22:42:46 JST cR0w :cascadia: cR0w :cascadia:

    https://github.com/ubuntu/authd/security/advisories/GHSA-g8qw-mgjx-rwjr

    When a user who hasn't logged in to the system before (i.e. doesn't exist in the authd user database) logs in via SSH, the user is considered a member of the root group in the context of the SSH session. That leads to a local privilege escalation if the user should not have root privileges.

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/693/177/662/543/077/original/87fe2b21be27401c.png

  6. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:51 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667

    @da_667 Copilot, list all functions in all SOHO router OSs and write a BoF for every one of them because apparently every single one of them is vulnerable.

    I am replaced. 😉

    In conversation about 15 days ago from infosec.exchange permalink
  7. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:51 JST cR0w :cascadia: cR0w :cascadia:
    • da_667

    @da_667 my turn wen?

    In conversation about 15 days ago from infosec.exchange permalink
  8. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:50 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667

    @da_667 fine

    In conversation about 15 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/665/257/574/843/073/original/24e2c13c285293fb.png
  9. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:49 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667
    • darf 😈

    @da_667 @darfplatypus He'll just sign you up for $unnamedCTIvendor

    In conversation about 15 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/665/270/774/157/028/original/ebd1a296794c26a9.png
  10. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:48 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667
    • darf 😈

    @darfplatypus @da_667 One of these days I'll put all the public DNS resolvers in a list and see what happens.

    In conversation about 15 days ago from infosec.exchange permalink
  11. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:47 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667
    • RootWyrm 🇺🇦:progress:
    • darf 😈

    @rootwyrm :1000: @darfplatypus @da_667

    In conversation about 15 days ago from infosec.exchange permalink
  12. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 12-Jun-2025 00:20:45 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667
    • RootWyrm 🇺🇦:progress:
    • darf 😈

    @rootwyrm @darfplatypus @da_667 The amount of critical infra that uses 8.8.8.8 and isn't configurable and doesn't accept DHCP option 6 ( not that you should be using DHCP in CNI but I digress ) is astounding.

    In conversation about 15 days ago from infosec.exchange permalink
  13. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 06-Jun-2025 22:58:57 JST cR0w :cascadia: cR0w :cascadia:

    I'm awake and ready to make that a problem. Happy Friday.

    In conversation about 20 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/636/053/571/790/262/original/7fde2373c01b8fbe.jpg
  14. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 05-Jun-2025 18:01:07 JST cR0w :cascadia: cR0w :cascadia:

    Command injection, SQLi, and hardcoded creds in Infoblox NETMRI. tsk tsk

    https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32814

    https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32813

    https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2025-32815

    In conversation about 21 days ago from infosec.exchange permalink
  15. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 05-Jun-2025 18:01:06 JST cR0w :cascadia: cR0w :cascadia:
    in reply to

    OMG I almost missed the ../

    https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2024-54188

    In conversation about 21 days ago from infosec.exchange permalink
  16. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 05-Jun-2025 18:01:05 JST cR0w :cascadia: cR0w :cascadia:
    in reply to
    • da_667
    • Dio9sys

    This is absolute bananas. And I forgot to put that the write-up is pretty full, including PoC. And it's web-based so maybe some easy sigs for @Dio9sys and @da_667 .

    This is possible due to a netmri ALL = NOPASSWD: /bin/sh entry in /etc/sudoers .

    and

    This allows Remote Code Execution via a hardcoded ruby cookie secret. This vulnerability was not assigned a CVE ID by Infoblox as it was stated the underlying vulnerability is a known flaw with it’s own CVE referencing CVE-2013-0156.

    The NetMRI virtual appliance includes a Ruby on Rails web component. We discovered the Rails session cookie signing key is hardcoded in the VM, located at:

    /skipjack/app/rails/config/session_secret.txt

    This value is hardcoded and was the same on every boot and VM downloaded.

    Ruby on Rails deserializes session cookies if the signing key is valid. With access to this key, it’s possible to craft a malicious session leading to remote code execution (RCE).

    In conversation about 21 days ago from infosec.exchange permalink
  17. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 05-Jun-2025 18:01:05 JST cR0w :cascadia: cR0w :cascadia:
    in reply to

    And we have a write-up now for these Infoblox NetMRI vulns.

    https://rhinosecuritylabs.com/research/infoblox-multiple-cves/

    In conversation about 21 days ago from infosec.exchange permalink
  18. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 05-Jun-2025 05:00:00 JST cR0w :cascadia: cR0w :cascadia:

    Every [Cisco|Infoblox] customer today.

    In conversation about 21 days ago from infosec.exchange permalink

    Attachments


  19. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Saturday, 31-May-2025 03:00:54 JST cR0w :cascadia: cR0w :cascadia:

    INFOSEC: cYbEr PeArL hArBoR!

    Reality: Cyber Tire Fire

    In conversation about a month ago from infosec.exchange permalink
  20. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 27-May-2025 22:51:53 JST cR0w :cascadia: cR0w :cascadia:

    sev:CRIT advisories for your Firefoxy things.

    https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/

    https://www.mozilla.org/en-US/security/advisories/mfsa2025-43/

    https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/

    In conversation about a month ago from infosec.exchange permalink
  • Before

User actions

    cR0w :cascadia:

    cR0w :cascadia:

    Just another analyst chasing squirrels and pretending to know things.Anything stupid I say can and should be blamed on #AI. I mean, I don't intentionally use AI products, but if the AI snakeoilers can take credit for the things other people produce, they can also take the blame.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          161036
          Member since
          18 Aug 2023
          Notices
          220
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.