HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, SiCat functions as a detailed exploit search tool that aggregates data from numerous sources like Exploit-DB, Packetstorm Security, Exploit Alert, NVD Database, and Metasploit Modules, aiding cybersecurity experts in pinpointing vulnerabilities. An article introduces a method to boost security for JSON Web Tokens by masking the "userid" payload through XOR encryption with a symmetric key to avert simple decoding of confidential data. Furthermore, CVE-2023-22527 is a vulnerability in Confluence that permits code execution through memory sans file system usage, overcoming OGNL expression limits, with indicators of compromise available for detection.

The Magnet Goblin group exploits vulnerabilities to install malware on systems, urging the adoption of patches and security measures like network segmentation. A notable exploit involves a vulnerability in the Popup Builder plugin for WordPress, risking over 3,300 websites. The cryptocurrency sector faces attacks exploiting smart contract flaws, resulting in significant losses mitigated by token burns and bounties. Acuity Inc. suffered a data breach, leaking sensitive federal information for $3,000 in Monero. Canva reported vulnerabilities affecting font security, recommending sandboxing and patching. In 2015, 000webhost experienced a data breach, exposing 15 million records.

# Tradecraft

[#] SiCat is a comprehensive exploit search tool that consolidates information from various sources including Exploit-DB, Packetstorm Security, Exploit Alert, NVD Database, and Metasploit Modules to assist cybersecurity professionals in identifying vulnerabilities.
Read More @ securityonline.info
[#] The article discusses a method to enhance security for JSON Web Tokens by obfuscating the "userid" payload using XOR encryption with a symmetric key to prevent easy decoding of sensitive information.
Read More @ kitploit.com
[#] Vulnerability CVE-2023-22527 in Confluence allows code execution via memory without file system access, with novel techniques overcoming OGNL expression limits and indicators of compromise provided for detection.
Read More @ vulncheck.com

# News

[#] The group called Magnet Goblin exploits current 1-day vulnerabilities in public servers to deploy custom Windows and Linux malware, with rapid patch application and additional security measures like network segmentation and multi-factor authentication being crucial defenses.
Read More @ bleepingcomputer.com
[#] Hackers are exploiting a cross-site scripting vulnerability, CVE-2023-6000, in outdated Popup Builder plugins for WordPress, impacting over 3,300 sites; users should update to the latest plugin version and remove malicious entries to prevent malfeasance.
Read More @ bleepingcomputer.com
[#] In a series of recent cryptocurrency hacks, attackers exploited smart contract vulnerabilities across various blockchains, leading to multi-million dollar thefts, while other incidents involved phishing and scam tactics targeting both companies and individuals; responses have included token burns to counteract theft and offers of bounties for the return of stolen assets.
Read More @ web3isgoinggreat.com
[#] Acuity Inc., a federal contractor, suffered a data breach compromising sensitive information from U.S. Immigration and Customs Enforcement (ICE) and U.S. Citizenship and Immigration Services (USCIS), sold for $3,000 in Monero on Breach Forums due to a claimed exploitation of a zero-day vulnerability in GitHub.
Read More @ hackread.com
[#] Canva discovered three new vulnerabilities in font handling, involving the SVG format in OpenType and TrueType fonts and XML and command injection issues in FontTools and FontForge, recommending sandboxing, patching, and collaboration for enhanced font security.
Read More @ securityonline.info
[#] The free web hosting provider 000webhost suffered a major data breach in March 2015, exposing almost 15 million customer records including names, email addresses, and plain text passwords.
Read More @ haveibeenpwned.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-11

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins