thezdi, to vmware

CVE-2023-20864: The Trend Micro Research team details a recently patched remote code execution bug in Operations for Logs. Similar bugs are reportedly under active attack. They provide root cause analysis & detection guidance. Read it at https://www.zerodayinitiative.com/blog/2023/6/29/cve-2023-20864-remote-code-execution-in-vmware-aria-operations-for-logs

EyeAmShaf, to random

What’s good MastoPeeps???

EyeAmShaf,

@kylewritescode doing some CBT at work

enusbaum, to proxmox

Playing around in the evenings trying to get GPU Passthrough/IOMMU working using to very limited success. Might have to try if I want this to work in a stable manner. I mean -- I guess I could just run Ubuntu on the Workstation, but it'd be such a waste. I'd rather slice it up into VMs and just pass the GPU into the VMs that need to do inference.

thezdi, to random

CVE-2022-31696: @renorobertr takes an in-depth look at this type confusion privilege escalation he discovered. He shows his research methodology and looks at the patch released to fix it.

https://www.zerodayinitiative.com/blog/2023/6/21/cve-2022-31696-an-analysis-of-a-vmware-esxi-tcp-socket-keepalive-type-confusion-lpe

jungsy1113, to Horizon Korean


안녕하세요. 이번엔 VMware의 VDI솔루션인 Horizon에 대해 간단하게 정리했습니다. 많이 부족하지만 일말의 도움이라도 되신다면 좋을거같습니다 😀
https://cloudnotepad.tistory.com/entry/VMware-Horizon%EC%9D%B4%EB%9E%80

AAKL, to Cybersecurity
0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

→ 🇺🇸 🇨🇳 The US Navy, NATO, and are using a shady Chinese company’s chips
→ 🦠 🏢 Group Starts Naming Victims of Zero-Day Attacks
→ ☁️ 🪣 New Supply Chain Attack Exploits Abandoned to Distribute Malicious Binaries
→ ☁️ Vulnerabilities in Led to Unauthorized Access to User Sessions
→ 🇨🇳 🦠 ESG zero-day attacks linked to suspected Chinese hackers
→ 🇷🇺 🇺🇸 Russian national arrested in Arizona, charged for alleged role in ransomware attacks
→ 🇷🇺 🇺🇦 Russia-backed hackers unleash new USB-based malware on ’s military
→ 🇺🇸 💰 LockBit Ransomware Extorts $91 Million from U.S. Companies
→ 🇷🇺 🇺🇦 identifies new hacking unit within Russian military intelligence
→ 🦠 Fake Researcher Profiles Spread through Repositories as PoC Exploits
→ 🎣 👟 Massive campaign uses 6,000 sites to impersonate 100 brands
→ 🇨🇳 Chinese Cyberspies Caught Exploiting ESXi
→ 🩹 Microsoft , June 2023 Edition
→ ☁️ Microsoft: Azure Portal was caused by traffic “spike”
→ 🇨🇳 🇺🇸 's cyber now aimed at infrastructure, warns CISA boss
→ 🇰🇷 🇨🇳 Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China
→ 🇨🇭 🗄️ Swiss Fear Government Data Stolen in Cyberattack
→ 🩹 🔐 fixes critical RCE flaw in SSL-VPN devices, patch now

📚 This week's recommended reading is: "The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values — and What We Can Do About It" by Prof Mary Aiken

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-242023

ottoto2017, to random Japanese
@ottoto2017@prattohome.com avatar

「中国のハッカーが VMware のゼロデイを悪用して Windows および Linux システムのバックドアを攻撃」: The Hacker News

「UNC3886として知られる中国政府支援のグループが、 VMware ESXi ホストのゼロデイ脆弱性を悪用して Windows および Linux システムをバックドアしていることが判明しました。
CVE-2023-20867 (CVSS スコア: 3.9) として追跡されている VMware Tools の認証バイパスの脆弱性により、侵害された ESXi ホストからのゲスト資格情報の認証なしで、Windows、Linux、および PhotonOS (vCenter) ゲスト VM 全体で特権コマンドの実行が可能になりました そしてゲスト VM にはデフォルトのログ記録がありません」

これってプロバイダーが VPS システムに使っている奴ですよね?
やばいのでは。

https://thehackernews.com/2023/06/chinese-hackers-exploit-vmware-zero-day.html

#中国 #サイバー攻撃

david_senate, (edited ) to random

One of our went crazy and populated its in a temporary datastore. As a result, Veeam unmounted the datastore and the VCLs are now gone. Time to play with Retreat mode...

hmhackmaster, to random
@hmhackmaster@boldcity.social avatar

A story:
Yesterday evening I (re)started a project to clean up the DNS records in all my domains.

For a few reasons, my DNS setup is a bit complex, with 'leaf' DNS entries being CNAMEs referencing service pivot points.
I'll detail that more later.

But in doing so I realized my "big spreadsheet of domains" is a bit out of date. So not only do I need to update that, but I really do want to at least put landing pages on some of them. [1/5]

hmhackmaster,
@hmhackmaster@boldcity.social avatar

One thing leads to another and now I have a much nicer VM template & deploy setup but still no new web server and now I am remembering I never actually cleaned up the domain spreadsheet.

Gotta love ! [5/5]

rysiek, to random
@rysiek@mstdn.social avatar

KVMs remain shit.

Hetzner support remains amazing.

kkarhan,

@rysiek well, guess why people pay for , and to this very day...

0x58, to infosec

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

‣ Hackers target vulnerable servers exposed online
queries for Americans’ digital data drops, yet advocates for surveillance reform remain undeterred
: Back in After Meeting Watchdog Demands
‣ Many Public Sites are Leaking Private Data
CSF 2.0 Core discussion draft released, stakeholder feedback invited
Attack: New Politically-Motivated Surveillance Campaign in
version of RTM Locker targets ESXi servers
‣ New Atomic info-stealing targets 50 crypto wallets
Gets Court Order to Take Down That Infected Over 670,000 Computers
restricted in after refusal to supply user data to authorities
discloses XSS zero-day flaw in server management tool
‣ Ukrainian arrested for selling data of 300M people to Russians
‣ Hackers are breaking into AT&T email accounts to steal
, , join Elite Cyber Defenders Program to secure critical infrastructure
‣ ATT&CK v13 April Updates
‣ New Data Sharing Platform Serves as Early Warning System for Threats
‣ North Korean Hackers Target Mac Users With New ‘’ Malware
‣ New All-in-One "" Stealer for Systems Surfaces on the Dark Web

📚 This week's recommended book is: "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" by Nicole Perlroth

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-172023

bazcurtis, to random
@bazcurtis@mastodon.social avatar

I have an Intel NUC6I7KYK/i7 running ESXi. It has been a solid performer for many years. Now the guests are shutting down randomly, I am assuming a ESXi crash.

Now it has decided to shut itself down altogether. It was doing this with ESXi v7 so I rebuilt it with v8. No better, no worse.

Does anyone have any ideas what to look for, or can recommend a good replacement? It has 2x 512GB SSDs for storage and 32GB of ram.

Kaylee, to gaming

VMware is like Sims, but for servers 🤔

Tmarsland, to random

I want to build labs that a learner can spin up from a front facing website. I believe I need to learn Terraform to spin these up and collapse when done. Where do I start?

scottslowe, to vmware
@scottslowe@fosstodon.org avatar

Time for an post!

Hi, I'm Scott. I've been a blogger since 2005, an author since 2009, & a podcast host since 2016. I've worked for companies like (acquired by Dell), (acquired by ), (acquired by VMware), & ; currently I'm working on the team at . I post about , , , , & other technical topics.

On the personal side, I'm a devoted husband, a loving father, & a Christian who strives to love instead of condemn.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • InstantRegret
  • mdbf
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • osvaldo12
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • tacticalgear
  • ethstaker
  • provamag3
  • cisconetworking
  • tester
  • GTA5RPClips
  • cubers
  • everett
  • modclub
  • megavids
  • normalnudes
  • Leos
  • lostlight
  • All magazines