Author: RoguePacket

  • Wazuh for Your Homelab?

    Wazuh for Your Homelab?

    Do You Need a SIEM at Home? Are you the kind of person with more endpoints than a small business? Do you love stats, enjoy making life more complicated than it needs to be, want to enhance your cybersecurity, and you are comfortable with Linux and PowerShell? If so, you might be wondering if you…

    Read More

    //

  • Windows TCP/IP RCE Vulnerability

    Windows TCP/IP RCE Vulnerability

    CVE-2024-38063 This has to do with the Windows TCP/IP stack, affecting nearly all supported Windows . it has a CVSS score of 9.8, and poses a  threat due to its remote code execution capability. Some Details: Nature of the Vulnerability: CVE-2024-38063 is a “zero-click” exploit, “Attackers” can remotely send specially crafted IPv6 packets to target…

    Read More

    //

  • OPNsense Version 24.7 – Thriving Tiger

    OPNsense Version 24.7 – Thriving Tiger

    OPNsense has just released 24.7 Thriving Tiger This is one of the biggest overall updates in a long time. This version runs on FreeBSD 14.1 and Python 3.11. It also includes a new dashboard, a WireGuard QR code generator, and a bunch of other neat features. A few things to watch out for: with the…

    Read More

    //

  • UniFi Network Application 8.2.93

    8.2.93 adds support for ACL Rules, DNS Records, Multi-Link Operation (MLO), BGP Some good changes we can now create multiple DNS records something that the community has been crying out for! Create different types of DNS records that can be resolved by devices. Create A, AAAA, MX, TXT, and SRV records. Forward queries for a…

    Read More

    //

  • NZ Response to the CrowdStrike Outage

    NZ Response to the CrowdStrike Outage

    This all started when I was trying to pay for my groceries at New World. Both my credit cards were declined, as was my Eftpos PayWave, but swiping my Eftpos card worked. Yesterday, a major IT glitch impacted CrowdStrike, a prominent cybersecurity firm, affecting numerous global services, including airlines, healthcare, and financial sectors. This incident,…

    Read More

    //

  • Book Review : The Ransomware Hunting Team : ★★★★☆ (4/5)

    Book Review : The Ransomware Hunting Team : ★★★★☆ (4/5)

    The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime The Ransomware Hunting Team” is a worthwhile read for anybody who enjoys books about cybercrime, and ransomware in particular. It is a relatively easy read, telling the true story of a band of misfits who have used their extraordinary…

    Read More

    //

  • New Blast-RADIUS Attack: A Wake-Up Call for Network Security

    There’s a new cyber threat that’s got the tech world buzzing. Dubbed the “Blast-RADIUS” attack, this security flaw takes advantage of the widely-used RADIUS authentication protocol. Essentially, it allows cybercriminals to slip past network defences and gain admin access without needing to crack passwords or credentials. What’s particularly worrying is that this exploit can be…

    Read More

    //

  • CVE-2024-6387 openssh-server in Proxmox 8 (Debian Bookworm) time to Update

    If you are running Proxmox 8, make sure you update the openssh-server package. This doesn’t affect version 7 as it’s based on Bullseye, not Bookworm. From https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt regreSSHion background The Qualys Threat Research Unit (TRU) discovered this unauthenticated Remote Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. This bug marks the first OpenSSH…

    Read More

    //

  • Turns out LockBit did not have stolen data from the US Federal Reserve

    The X universe was on fire last week as Lockbit claimed that they had 33TBs of data from the fed reserve Most people were skeptical and it turns out they were right from  HackManac on X “To summarize briefly, here’s what’s in the LockBit leak in the claimed attack on the US Federal Reserve: They…

    Read More

    //

  • Netsafe Launches Rescam to disrupt scammers Using AI

    New Zealands Netsafe ( https://netsafe.org.nz/ ) has relaunched www.ReScam.org to cause havoc with scammers using AI. All you need to do is forward a scam email to ME@RESCAM.ORG; they will then use AI to create a personality and engage in an endless conversation with the scammer. They even provide you with a link to watch…

    Read More

    //