Justin Elze(@HackingLZ) 's Twitter Profileg
Justin Elze

@HackingLZ

Hacker/CTO @TrustedSec | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars

ID:14539104

calendar_today26-04-2008 03:27:52

45,0K Tweets

51,8K Followers

4,9K Following

Germán Fernández(@1ZRR4H) 's Twitter Profile Photo

backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages 🔥
[+] bazaar.abuse.ch/sample/3de2a43…

All technical details in the blogs of:
+ Volexity ( ): volexity.com/blog/2024/04/1…
+ Unit 42 (Operation ):…

#UPSTYLE backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages 🔥 #0day [+] bazaar.abuse.ch/sample/3de2a43… All technical details in the blogs of: + Volexity (#UTA0218): volexity.com/blog/2024/04/1… + Unit 42 (Operation #MidnightEclipse):…
account_circle
Joshua J. Drake(@jduck) 's Twitter Profile Photo

If you've never seen 'The Net' starring Sandra Bullock, you're over due. Starting to wonder if these security product companies watched it and got crazy ideas.

account_circle
Justin Elze(@HackingLZ) 's Twitter Profile Photo

This oddly doesn’t bother me. It just reinforces marketing teams need to be connected with technical people.

account_circle
Jonny Johnson(@jsecurity101) 's Twitter Profile Photo

Decided to create a repo on tracking the default driver block list based on OS build.

github.com/jsecurity101/M…

account_circle
jheysel(@jheyselll) 's Twitter Profile Photo

Unauth RCE as NT AUTHORITY\SYSTEM in FortiClient EMS (CVE-2023-48788). Metasploit module & AKB article are up. Shout out to James Horseman Zach Hanley for the great research. github.com/rapid7/metaspl… attackerkb.com/topics/Qqg45PU…

account_circle
Volexity(@Volexity) 's Twitter Profile Photo

Our latest blog post details Volexity's identification & incident response associated with the Palo Alto Networks GlobalProtect vuln, assigned CVE-2024-3400, that the team found being exploited in the wild.

Read more here: volexity.com/blog/2024/04/1…

account_circle
Akamai Security Intelligence Group(@akamai_research) 's Twitter Profile Photo

It's nice to have a positive Outlook.

Akamai researchers have discovered another critical vulnerability that bypasses the patch for the custom sound vuln from March 2023.

Psst: this one can also be triggered in Explorer 👀

Full write-up:
akamai.com/blog/security-…

account_circle
LP(@jotunvillur) 's Twitter Profile Photo

All three conditions that must exist for this CVE:

1. Running PanOS 10.2 or greater
2. Have GlobalProtect gateway enabled
3. Have device telemetry enabled

Places to check for these:
1. Device > Software
2. Network > GlobalProtect > Gateways
3. Device > Setup > Telemetry

account_circle
Steven Adair(@stevenadair) 's Twitter Profile Photo

Our team at Volexity has identified a new 0day exploited in the wild. This time we caught a threat actor using an unauthenticated RCE in Palo Alto Networks GlobalProtect. It has been assigned CVE-2024-3400 and is covered in this Palo Alto Networks advisory security.paloaltonetworks.com/CVE-2024-3400

account_circle
Marc Rogers(@marcwrogers) 's Twitter Profile Photo

Sisense has released specific instructions to its customers.

On the one hand it’s easy to be mad at this situation, the plaintext storage of credentials and the insecure storage of data at rest.

On the other had I want to give them props for reaching this point in under 24…

Sisense has released specific instructions to its customers. On the one hand it’s easy to be mad at this situation, the plaintext storage of credentials and the insecure storage of data at rest. On the other had I want to give them props for reaching this point in under 24…
account_circle
Marc Rogers(@marcwrogers) 's Twitter Profile Photo

The nature of sisense is they require access to their customers confidential data sources. They have direct access to JDBC connections, to SSH, and to SaaS platforms like Salesforce and many more. It also means they have tokens, credentials, certificates often upscoped. 1/2

account_circle
Mike Felch (Stay Ready)(@ustayready) 's Twitter Profile Photo

Ever wondered what hacking was like in the wild days of the 80s/90s/00s? Come take a journey back in time into the underground world of hackers/crackers. I'll unravel the stories/techniques/culture that defined this crazy era at HackSpaceCon tomorrow 4pm in End0r (9030)

account_circle
Barberousse @barberousse_bin@todon.eu(@barberousse_bin) 's Twitter Profile Photo

continues to be full of mysteries!
I found function names that don't use the _u suffix so I updated filt name parsing to support those. + I added some unit tests because I kept causing regressions while trying to do it😅
Also fixed some issues with strings handling

account_circle