June 30, 2022 at 07:26PM

■■■■■ How to exploit CSPP (on our early adopter channel) using BurpSuite. 1) Go to the proxy tab 2) Click Open Browser 3) Pin the extension 4) Enable prototype pollution 5) Visit ginandjuice.shop 6) Open devtools > DOM Invader 7) Scan for gadgets 8) Open devtools > DOM Invader 9) Click exploit https://twitter.com/Burp_Suite/status/1542515802225528835 https://t.me/cKure/11570

June 30, 2022 at 10:37AM

■■■□□ Google Warns of New Spyware Targeting iOS and Android Users The malware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found. https://www.wired.com/story/hermit-spyware-rcs-labs/ https://t.me/cKure/11569

June 30, 2022 at 12:06AM

■■■□□ Zero-Day: Amazon has confirmed and fixed a vulnerability in its Photos app for Android, which has been downloaded over 50 million times on the Google Play Store. https://www.bleepingcomputer.com/news/security/amazon-fixes-high-severity-vulnerability-in-android-photos-app/amp/ https://t.me/cKure/11567

June 29, 2022 at 09:00AM

■■■■□ Zero-Day: Zimbra Mail pre-auth RCE via Path Traversal bug in unrar (CVE-2022-30333). Zimbra has been the target of a 0day campaign likely conducted by a state actor. More details in this blog post. https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/ https://t.me/cKure/11564

June 28, 2022 at 11:45PM

■■■□□ Attacks on industrial control systems (SCADA) using ShadowPad. https://ics-cert.kaspersky.com/publications/reports/2022/06/27/attacks-on-industrial-control-systems-using-shadowpad/ https://t.me/cKure/11563