{"uuid": "44fc5385-e342-4e10-84c6-7ddc83092499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4262", "type": "exploited", "source": "https://t.me/anonhamz/2456", "content": "Cybersecurity news #Pentesting - \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n\n\u200aBlackProxies proxy service increasingly popular among hackers\n\nhttps://www.bleepingcomputer.com/news/security/blackproxies-proxy-service-increasingly-popular-among-hackers/\n\n\u200aDHS Cyber Safety Board to review Lapsus$ gang\u2019s hacking tactics\n\nhttps://www.bleepingcomputer.com/news/security/dhs-cyber-safety-board-to-review-lapsus-gang-s-hacking-tactics/\n\n\u200aCloud provider Rackspace hit by ongoing 12-hour Exchange outage\n\nhttps://www.bleepingcomputer.com/news/technology/cloud-provider-rackspace-hit-by-ongoing-12-hour-exchange-outage/\n\n\u200aGoogle Chrome emergency update fixes 9th zero-day of the year\n\nhttps://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-9th-zero-day-of-the-year/\n\n\u200aThe Week in Ransomware - December 2nd 2022 - Disrupting Health Care\n\nhttps://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-2nd-2022-disrupting-health-care/\n\n\u200aCVE-2022-4262: New Chrome 0-Day Bug Under Active Attack\n\nhttps://securityonline.info/cve-2022-4262-chrome-0-day-vulnerability/\n\n\u200aMalware on Google Play Infected over 300,000 Users to Steal Facebook Login Credentials\n\nhttps://cybersecuritynews.com/malware-on-google-play-2/\n\n\u200aProtecting major events: an incident response blueprint\n\nhttps://blog.talosintelligence.com/protecting-major-events-an-incident-response-blueprint/\n\n\u200aAccidental Syntax Error Leads to Kill The Cryptomining botnet Malware \u201cKmsdBot\u201d\n\nhttps://gbhackers.com/botnet-malware-kmsdbot-killed/\n\n\u200aHackers Sign Android Malware using Hacked Platform Signing Certificates\n\nhttps://cybersecuritynews.com/hackers-sign-android-malware/\n\n\u200aNew Google Chrome Zero-Day Bug Actively Exploited in Wild \u2013 Emergency Update!\n\nhttps://cybersecuritynews.com/google-chromhe-9th-zero-day-bug/\n\n\u200aBeware that Hackers Using Malicious USB Devices to Deliver Multiple Malware\n\nhttps://gbhackers.com/hackers-using-malicious-usb-devices/\n\n\u200aHackers Exploit Bug in Redis Servers To Drop New Backdoor Malware \u201cRedigo\u201d\n\nhttps://cybersecuritynews.com/hackers-drops-bakcdoor-malware-redigo-redis-server/\n\n\u200a\u2018Black Panthers\u2019 \u2013 A SIM Swap Gang Connected With Dark Web Got Arrested\n\nhttps://gbhackers.com/black-panthers-a-sim-swap-gang-arrested/\n\nBypassing Mimecast URL and File Inspection\n\nhttps://www.netspi.com/blog/technical/social-engineering/bypassing-mimecast-email-defenses/\n\nThe Race to Native Code Execution in PLCs: Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys\n\nhttps://claroty.com/team82/research/the-race-to-native-code-execution-in-plcs-using-rce-to-uncover-siemens-simatic-s7-1200-1500-hardcoded-cryptographic-keys\n\nContrast discovers zero-day flaw in popular Quarkus Java framework\n\nhttps://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security\n\nUsing Discord as Command and Control (C2) with Python and Nuitka\n\nhttps://medium.com/@lsecqt/using-discord-as-command-and-control-c2-with-python-and-nuitka-8fdced161fdd\n\n\u200aHow to Protect Your Data When Booking Flights or Hotels Online?\n\nhttps://latesthackingnews.com/2022/12/03/how-to-protect-your-data-when-booking-flights-or-hotels-online/\n\n\u200aShells - Little Script For Generating Revshells\n\nhttp://www.kitploit.com/2022/12/shells-little-script-for-generating.html\n\n\u200aAwesome Azure Policy\n\nhttps://reconshell.com/awesome-azure-policy/\n\n\u200aHackers use new, fake crypto app to breach networks, steal cryptocurrency\n\nhttps://www.bleepingcomputer.com/news/security/hackers-use-new-fake-crypto-app-to-breach-networks-steal-cryptocurrency/\n\n\u200aSIM swapper gets 18-months for involvement in $22 million crypto heist\n\nhttps://www.bleepingcomputer.com/news/security/sim-swapper-gets-18-months-for-involvement-in-22-million-crypto-heist/\n\n\u200aHow Visibility on Software Supply Chain Can Reduce Cyberattacks\n\nhttps://gbhackers.com/how-visibility-on-software-supply-chain-can-reduce-cyberattacks/\n\nGL.iNET GL-MT300N-V2 Router Vulnerabilities and Hardware Teardown\n\nhttps://boschko.ca/glinet-router\n\n#infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06", "creation_timestamp": "2022-12-16T08:56:37.000000Z"}