November 10, 2022 at 07:40PM

■■■□□ Cyber-War; Pakistan | China China to train 57 employees of ISI’s technical directorate in cyber security, after multiple Pakistan generals and politicians communications were eavesdropped by foreign adversaries. ● We could not verify the credibility of the information. Viewer discretion advised. https://t.me/cKure/11897

November 8, 2022 at 11:50PM

■■■■□ Zero-Day: Citrix urges admins to patch critical ADC, Gateway auth bypass. CVE-2022-27510, CVE-2022-27513 and CVE-2022-27516. https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516 https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-critical-adc-gateway-auth-bypass/ https://t.me/cKure/11895

November 8, 2022 at 11:00PM

■■■□□ Conti Affiliates Black Basta, BlackByte Continue to Attack Critical Infrastructure. Between February and July, 81 victim organizations were listed on the groups’ data leak sites. https://www.infosecurity-magazine.com/news/black-basta-blackbyte-attack-eu/ https://t.me/cKure/11894

November 3, 2022 at 09:52AM

■■■■□ Zero-day: The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation. https://securitylabs.datadoghq.com/articles/openssl-november-1-vulnerabilities/ https://t.me/cKure/11890

November 3, 2022 at 09:49AM

■■■■□ CVE-2022-3786; DoS: Buffer overflow occurs in the ossl_a2ulabel vulnerable function. When this function meets a Punycode part followed by a dot character (“.”) it also appends “.” to the output buffer even if it overflows its size. https://twitter.com/_CPResearch_/status/1587741086340075521 https://t.me/cKure/11888