New covert SharePoint data exfiltration techniques revealed

Varonis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies’ SharePoint server. “These techniques can bypass the detection and enforcement policies of traditio… Continue reading New covert SharePoint data exfiltration techniques revealed

Microsoft begins broadening free cloud logging capabilities

After select US federal agencies tested Microsoft’s expanded cloud logging capabilities for six months, Microsoft is now making them available to all agencies using Microsoft Purview Audit – regardless of license tier. “This change wi… Continue reading Microsoft begins broadening free cloud logging capabilities

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders. Discovered by a security researcher named Florian and reported… Continue reading A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

Does chromium keep logs of the events leading up to opening a new tab? [migrated]

I had a tab randomly open up that was for adware. Luckily, it was caught by my ad blocker, but I would like to figure out what triggered it to open.
I tried checking its history state through console, but I found nothing interesting. I t… Continue reading Does chromium keep logs of the events leading up to opening a new tab? [migrated]

Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

I am wondering some issues about event log safety of powershell. I think is it possible to alter the powershell itself. But theorically the event log should show us every attempt made in powershell such as opening commands or codes that ma… Continue reading Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

I am wondering some issues about event log safety of powershell. I think is it possible to alter the powershell itself. But theorically the event log should show us every attempt made in powershell such as opening commands or codes that ma… Continue reading Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. CISA’s version reimagines technology developed by the United Kingdom’s Natio… Continue reading Logging Made Easy: Free log management solution from CISA

Is it a security issue to include postcode and/or last name in a GET request query string?

I’m currently designing an API endpoint to validate a customer, and they can either pass in their postcode or their last name, as well as their customer ID (plus some other irrelevant data).
I’ve heard that including PII or sensitive data … Continue reading Is it a security issue to include postcode and/or last name in a GET request query string?

Thanks Storm-0558! Microsoft to expand default access to cloud logs

Starting in September 2023, more federal government and commercial Microsoft customers will have access to expanded cloud logging capabilities at no additional charge, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) have annou… Continue reading Thanks Storm-0558! Microsoft to expand default access to cloud logs