certitude_lab Profile Banner
Certitude Lab Profile
Certitude Lab

@certitude_lab

Followers
75
Following
12
Media
5
Statuses
35

Responsible Disclosure Vulnerability Research by Certitude (@cert_it_ude).

Joined September 2020
Don't wanna be here? Send us removal request.
@certitude_lab
Certitude Lab
11 months
RT @Cert_it_ude: Unser Security-Experte @FSchweitzer zu Gast beim Podcast Ars Boni der Uni Wien zu IT-Security Threats, Onlinetrojaner und….
0
3
0
@certitude_lab
Certitude Lab
1 year
The US IT-security and technology news website @BleepinComputer summarized our research on Microsoft M365/Outlook Phishing Protections and how they can be bypassed. Article by @billtoulas.
@BleepinComputer
BleepingComputer
1 year
Microsoft 365 anti-phishing feature can be bypassed with CSS - @billtoulas.
1
1
1
@certitude_lab
Certitude Lab
1 year
In our blog post, we analyze Microsoft 365 phishing measures. It turns out that spammers and phishers can use various tricks to make emails appear legitimate - users cannot necessarily rely on some of the security mechanisms.
0
1
1
@certitude_lab
Certitude Lab
1 year
Credential Disclosure in LastPass
0
3
3
@certitude_lab
Certitude Lab
2 years
RT @Cert_it_ude: The threat of disinformation will continue to cause us headaches: it damages constructive discourse, poses great risks for….
0
2
0
@certitude_lab
Certitude Lab
2 years
Fresh off the press: The second installment of our series “Skynet wants your Passwords!” is out. Find out how you can defend against AI social engineering:
Tweet media one
0
2
2
@certitude_lab
Certitude Lab
2 years
Cloudflare itself can be used to bypass Cloudflare WAFs. Read more about this vulnerability in our blogpost. Research by @fschweitzer and Stefan Porksch.
Tweet media one
0
7
9
@certitude_lab
Certitude Lab
2 years
Particularly susceptible organizations have been notified. Due to the large number of domains affected, we hope to reach many more by raising awareness about this type of vulnerability.
0
0
1
@certitude_lab
Certitude Lab
2 years
We also urge cloud service providers to implement domain ownership verification and not immediately release previously used identifiers for registration.
1
0
1
@certitude_lab
Certitude Lab
2 years
We recommend all organizations to deactivate cloud resources only after associated DNS records have been removed and regularly audit DNS records.
1
0
0
@certitude_lab
Certitude Lab
2 years
Hijacked subdomains could be used for malware distribution, disinformation, phishing or social engineering.
1
0
0
@certitude_lab
Certitude Lab
2 years
We only analyzed a limited sample of cloud services and DNS records. We assume that the total of affected domains could be several hundred thousand or more.
1
0
0
@certitude_lab
Certitude Lab
2 years
Among them are the Australian Department of Foreign Affairs and Trade, CNN, Stanford University, FPÖ, US states of Rhode Island and Nebraska, German companies Nexible and Dannemann, US banks, universities, governments,. .
1
0
0
@certitude_lab
Certitude Lab
2 years
We identified >1000 organizations susceptible to subdomain hijacking
Tweet media one
1
4
4
@certitude_lab
Certitude Lab
2 years
A privilege escalation vulnerability could have allowed unprivileged users of the IBM Spectrum Virtualize admin interface to execute code (by @ettisan).
0
4
3
@certitude_lab
Certitude Lab
2 years
Die SPÖ hat am 11.05.2023 mit einer Presseaussendung Stellung zu diesem Thema bezogen. Certitude kann die Angaben nicht überprüfen, da ihr keine Informationen zu den von der SPÖ genannten Sicherheitsmechanismen vorliegen.
ots.at
Gutachten von IT-Experten Dipl.-Ing. Reiter hält fest: „Ein maschineller Eindringversuch (…) würde schon durch gewöhnliche Securitymaßnahmen der SPÖ-IT abgeblockt werden“
0
0
2
@certitude_lab
Certitude Lab
2 years
Certitude hat diese Schwachstellen am 3.5.2023 an den Bundesgeschäftsführer der SPÖ gemeldet. Als kurzfristige Maßnahme wurde empfohlen, den X-Forwarded-For Header zu filtern oder zu ignorieren. Dieser Empfehlung wurde gefolgt. Certitude hat dies am 10.5.2023 verifiziert. (7/7).
2
1
21
@certitude_lab
Certitude Lab
2 years
Certitude weist darauf hin, dass auf Basis der vorliegenden Informationen weder bestätigt noch ausgeschlossen werden kann, ob eine Manipulation von Stimmen tatsächlich stattgefunden hat. (6/7).
1
1
15
@certitude_lab
Certitude Lab
2 years
Abgesehen von den Schwachstellen hält Certitude die eingesetzte Software für nicht geeignet. Insbesondere Anforderungen wie Nichtzuordenbarkeit der Stimmen bei gleichzeitiger Wahrung der Nachvollziehung der Gültigkeit der Wahl werden nicht abgebildet. (5/7).
1
1
16