101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

490
active users

#papercut

0 posts0 participants0 posts today

Le théâtre des sortilèges, nouveau diorama imprimé en sérigraphie 4 couleurs et édité par "Les éditions I'Horreur Du Vide". Edité à 50 exemplaires. / 21 x 17 cm.

Si vous êtes intéressé, vous pouvez commander un exemplaire dans ma boutique.
www.brulex.fr/shop

Upturned Boats has now been photographed properly and is available in my shop!

It is a six colour screenprint made entirely from hand made stencils using paper cuts, brush strokes, pencil and ink pen marks.

By its nature, nothing lines up perfectly! Because I cut everything out by hand there are small gaps and overlaps but this adds to the enjoyment of the print I think.

It is a limited edition of 50 and is numbered and signed by me.

The size of the paper is 35cm x 47cm approximately. The artwork size is 21cm x 30cm approximately.

It's printed in six colours on Fabriano 5 210gsm printing paper.

I hope you enjoy it!

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #31/2023 is out! It includes the following and much more:

🐛 ✂️ Researchers Uncover New High-Severity #Vulnerability in #PaperCut Software
🇮🇱 🦠 #Israel cybersecurity agency says no breach after senior official self-infects home PC with #malware
🇺🇸 CISA’s strategic plan adheres to overall Biden administration direction on cybersecurity
🩹 ❌ Top 12 vulnerabilities list highlights troubling reality: many organizations still aren’t #patching
🐬 🔓 Hacking tool #FlipperZero tracked by intelligence agencies, which fear white nationalists may deploy it against power grid
🔥 🔓 Hundreds of #Citrix NetScaler ADC and Gateway Servers Hacked in Major Cyber Attack
⚡🔓 Researchers jailbreak a #Tesla to get free in-car feature upgrades
🏭 📊 Industrial Control Systems Vulnerabilities Soar: Over One-Third Unpatched in 2023
🇷🇺 👥 Russian hackers target govt orgs in #Microsoft Teams #phishing attacks
🩹 🔓 #Rapid7 found a bypass for the recently patched actively exploited #Ivanti EPMM bug
🙈🔓 #Tenable CEO accuses Microsoft of negligence in addressing security flaw
🎣 📨 Hackers exploited #Salesforce zero-day in #Facebook phishing attack
🇺🇸 ☁️ US internet hosting company appears to facilitate global #cybercrime, researchers say
🇨🇳 🇪🇺 #China's #APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe
🦠 💸 Schools Are Now the Leading Target for Cyber Gangs as Ransom Payments Encourage Attacks
🇺🇸 🇨🇳 Possible Chinese Malware in US Systems - a ‘Ticking Time Bomb’
🇮🇹 🏦 Cybercriminals Renting #WikiLoader to Target Italian Organizations with Banking Trojan
🇺🇸 🇨🇳 Microsoft downplays damaging report on Chinese hacking its own engineers vetted
🇯🇴 💬 #Jordan adopts cybercrime law seen as threat to #freespeech
🇪🇬 🏥 Hacker Claims to Have Stolen Sensitive Medical Records from #Egypt's Ministry of Health
🔓 💰 #BankCard USA surrenders and pays #ransom

📚 This week's recommended reading is: "Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities" by Mark Dowd, John McDonald, and Justin Schuh

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s Infosec Newsletter · InfoSec MASHUP - Week 31/2023By Xavier «X» Santolaria

📢 #PaperCut Vulnerabilities! 🚨
- Medium Risk: Servers - Other Servers
- Impact: DoS, Privilege Elevation, Data Manipulation
- Versions Affected: Prior to PaperCut NG/MF 22.1.3
- Solutions: Visit vendor site for details & apply fixes (PaperCut NG/MF 22.1.3)
- #CVE: CVE-2022-21724, CVE-2023-3486
🔗 Source: @PaperCut
🔗 Learn more: papercut.com/kb/Main/SecurityB #cybersecurity #vulnerabilities

www.papercut.comPaperCut NG/MF Security Bulletin (July 2023) | PaperCut

In mid-April, attackers began exploiting a vulnerability in #PaperCut NG and MF that was later assigned CVE-2023-27350. Today, we published a new proof-of-concept exploit that bypasses all published detections from Huntress, Horizon3.ai, Proofpoint, and Microsoft.

Check out the latest report from @vulncheck’s @albinolobster to see how this vulnerability could allow attackers to avoid existing detections based on defender's incorrect assumptions: vulncheck.com/blog/papercut-rc

PaperCut Exploitation - A Different Path to Code Execution- Blog - VulnCheckPaperCut Exploitation - A Different Path to Code Execution- Blog - VulnCheckPublic exploits and detections for CVE-2023-27350 focus on code execution using the PaperCut print scripting interface. In this blog, VulnCheck shares a new code execution vector and demonstrates how existing detections aren't robust enough to flag the new activity.