Normal view
-
ZDNet | security RSS
- Microsoft's latest Windows update now confirms if your PC is Secure Boot-protected - how it works
Automotive data biz Autovista blames ransomware for service disruption
Some customer orgs tell staff to block inbound email from the provider
Autovista confirms that it called in outside support to help clean up a ransomware infection currently affecting systems in Europe and Australia.…
-
ZDNet | security RSS
- Can this $70 Linux app make up for the lack of Photoshop? I tried it to find out
Can this $70 Linux app make up for the lack of Photoshop? I tried it to find out
-
ZDNet | security RSS
- 'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source
'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source
iPhone charging slowly? 6 quick fixes to try before blaming your battery
-
ZDNet | security RSS
- Roku TV vs. Fire Stick: Why I'm looking beyond streaming resolution when comparing the two
Roku TV vs. Fire Stick: Why I'm looking beyond streaming resolution when comparing the two
French cops free mother and son after 20-hour crypto kidnap ordeal
Latest in a string of cases that have earned France an unfortunate title
A mother and her ten-year-old son are now free after being kidnapped for around 20 hours while the father was being extorted for hundreds of thousands of euros.…
-
/r/netsec - Information Security News & Discussion
- Replacing Falco with an embedded eBPF sensor for Kubernetes runtime enforcement
Replacing Falco with an embedded eBPF sensor for Kubernetes runtime enforcement
Writeup on how we built runtime enforcement into our k8s agent with eBPF instead of shipping Falco alongside it. Covers the syscall tracepoint design, in-kernel filtering with BPF maps, why we picked SIGKILL over BPF LSM, and a staging postmortem where enforcement wasn't namespace-scoped and we took out our own Harbor, Cilium, and RabbitMQ.
[link] [comments]
-
The Hacker News
- Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
-
The Hacker News
- April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
-
ZDNet | security RSS
- Why your TV wowed you in the store but looks unnatural at home - and how to fix it ASAP
Why your TV wowed you in the store but looks unnatural at home - and how to fix it ASAP
-
Security – Cisco Blog
- Designing for What’s Next: Securing AI-Scale Infrastructure Without Compromise
Designing for What’s Next: Securing AI-Scale Infrastructure Without Compromise
Ancient Excel bug comes out of retirement for active attacks
Vuln old enough to drive lands on CISA's exploited list
While Microsoft was rolling out its bumper Patch Tuesday updates this week, US cybersecurity agency CISA was readying an alert about a 17-year-old critical Excel flaw now under exploit.…
Raspberry Pi OS ends open-door policy for sudo
Command prefix will require password by default
The latest version of Raspberry Pi OS now requires a password for sudo by default.…
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
The best internal communication tools of 2026: Expert tested and reviewed
UK told its Big Tech habit is now a national security risk
Open Rights Group says years of reliance on US giants have left Britain exposed
Britain has spent years wiring its public sector into US Big Tech, and a new report says that dependence could quickly become a national security headache.…
The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought
-
/r/netsec - Information Security News & Discussion
- Kerberoasting detection gaps in mixed-encryption environments and why 0x17 filtering alone isn't enough
Kerberoasting detection gaps in mixed-encryption environments and why 0x17 filtering alone isn't enough
Been doing some detection work around Kerberoast traffic this week and wanted to share a gap that's easy to miss in environments that haven't fully deprecated RC4.
The standard detection is Event ID 4769 filtered on encryption type 0x17. Most SIEMs have this as a canned rule. The problem is in environments with mixed OS versions or legacy applications that dynamically negotiate encryption, 0x17 requests are normal background noise. If you're not filtering beyond encryption type you're either drowning in false positives or you've tuned it so aggressively you're missing real attacks.
What you should look for:
4769 where:
- Encryption type is
0x17 - Requesting account is a user principal, not a machine account
- Service name is not
krbtgtand not a known computer principal - The requesting account has had no prior 4769 events against that specific SPN
That last condition is the one most people skip. Legitimate service ticket requests follow patterns. A user account requesting a ticket for a service it's never touched before at 2am is a different signal than the same request during business hours from a known admin workstation.
But the actual gaps noone is talking about -> gMSA accounts are immune to offline cracking because the password is 120 characters of random data rotated every 30 days. But the migration is never complete. Every environment has at least a handful of service accounts that can't be migrated.. anything that needs a plaintext password in a config file, some Exchange components, legacy apps with no gMSA support.
Those accounts are permanent Kerberoast targets. (!) The question isn't whether they're there. It's whether you know exactly which ones they are and whether you're watching them specifically.
On the offensive side of this:
RC4 downgrade via AS-REQ pre-auth is well documented. Less discussed is that in environments where AES is enforced at the GPO level but legacy applications are still negotiating through Netlogon, you can still coerce RC4 service ticket issuance by manipulating the etype list in the TGS-REQ. LmCompatibilityLevel = 5 controls client behavior. It has no authority over what a misconfigured application server requests through MS-NRPC. Silverfort published a POC on this last year (i wrote about this a couple weeks ago) they forced NTLMv1 through a DC configured to block it using the ParameterControl flag in NETLOGON_LOGON_IDENTITY_INFO. Microsoft acknowledged it, didn't patch it, announced OS-level removal in Server 2025 and Win11 24H2 instead. (typcial)
If your environment isn't on those versions, that vector is still open and there's no compensating control beyond full NTLM audit logging and application-level remediation.
btw:
auditpol /set /subcategory:"Kerberos Service Ticket Operations" /success:enable gets you the 4769 visibility.
[link] [comments]
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities