-
22 votes
-
US sues SolarWinds for fraud over alleged cyber security neglect ahead of 2020 Russian hack of Justice and Homeland Security departments
25 votes -
For those who have tried YubiKey for personal use, is it worth it?
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it. I’m personally getting tired of having to take my phone...
I saw people talking about YubiKey here a few weeks ago so I got curious. Unfortunately, I’m not seeing a lot of helpful reviews for it.
I’m personally getting tired of having to take my phone anytime I need 2FA for Okta but I don’t have a lot of super important accounts to secure so I’m going back and forth in deciding whether the 100+ euro investment (to get two so that there’s a duplicate) would be worth it.
How do you use your YubiKey in your personal life and do you think it’s worth your use case ?
35 votes -
Immersive Labs "Haunted Halloween" Challenges 2023
Hey everyone! Just wanted to share that Immersive Labs has rolled out their "Haunted Halloween" challenges for 2023. For those unfamiliar, Immersive Labs offers a platform for interactive,...
Hey everyone! Just wanted to share that Immersive Labs has rolled out their "Haunted Halloween" challenges for 2023. For those unfamiliar, Immersive Labs offers a platform for interactive, gamified learning in the realm of cybersecurity. They've been known to host challenges that test and enhance cyber skills.
You can sign up for free using code HAUNTEDHOLLOW to try it out hubs.ly/Q026LTZV0.
Now, I'm not posting this solely out of altruism. I could use some help on the 'Mirrored Mayhem' task.
Spoiler Alert: Details about the challenge below
I've managed to get the RCE. I've crafted a PNG and successfully executed remote code. However, I'm only able to find the 'webapp-token'. I'm at a loss when it comes to the 'user-token' or 'root-token'. The 'whats in the mirror?' file isn't giving me any leads either. I've also got a username/password from it but can't figure out where to use them.Would appreciate any pointers or hints from anyone who's tackled this challenge. Thanks in advance!
4 votes -
Denmark leads the Women Peace and Security Index 2023/24, scoring more than three times higher than Afghanistan at the bottom of the scale
14 votes -
Systems Alchemy: The Transmutation of Hacking (2023)
5 votes -
It’s official: The era of China’s global dominance is over
22 votes -
Prosecutors in Finland have charged a hacker accused of the theft of tens of thousands of records from psychotherapy patients
9 votes -
Finland faces growing Russian online threat, Finnish security services say – espionage attempts have increased since Ukraine invasion
22 votes -
A redistribution of nitrogen fertiliser across global croplands can help achieve food security within environmental boundaries
6 votes -
How do you test your home network security?
As I'm exploring the idea of hosting my data at home (with offsite backups), I would like to better understand how to test my home network for security vulnerabilities. I have run basic Nmap scans...
As I'm exploring the idea of hosting my data at home (with offsite backups), I would like to better understand how to test my home network for security vulnerabilities.
I have run basic Nmap scans and confirmed that there are no open ports. I've confirmed that users have access to what they need but nothing else, and that guests using the network for web access don't have any sort of access to data. All data is encrypted so someone stealing the physical hardware shouldn't have access to the contents, either. But that's about as far as I know what to do.
What else could and should I try? How do you pentest your home network?
I feel I'm ok with my understanding of how to set things up so that everything is relatively secure. But I have very little idea how to actually test the setup.
Edit: Added a sentence about encryption.
25 votes -
The language used to describe AI risks
6 votes -
Former US President Donald Trump allegedly discussed US nuclear subs with Australian billionaire businessman Anthony Pratt after leaving White House: Sources
43 votes -
How Lars Findsen and Claus Hjort Frederiksen came to be facing trial for allegedly disclosing Danish state secrets that had been in the public domain for years
10 votes -
The dangers of LLM self-exfiltration: AI alignment and cybersecurity challenges
5 votes -
Building automation giant Johnson Controls hit by ransomware attack
8 votes -
How do you use your YubiKeys?
I'm a little late on this, admittedly. $dayjob is requiring us all to set up a pair of YubiKeys, and I'm using them for the first time and my mind is a little blown. I was seeing articles about...
I'm a little late on this, admittedly. $dayjob is requiring us all to set up a pair of YubiKeys, and I'm using them for the first time and my mind is a little blown.
I was seeing articles about "passkeys" all summer, not really grokking what they were talking about, clinging to my usernames and passwords and 2FA codes coming out of 1Password, etc.
I just set it up on a few accounts today, initially as an additional 2FA source, but when I set them on GitHub, I saw for the first time how exactly they are used instead of the username and password and 2FA combo to log in, and it seems incredible to me!
For long-time YubiKey users: what are some cool things in the ecosystem that you would recommend looking at?
21 votes -
China climate envoy says phasing out fossil fuels 'unrealistic'
22 votes -
CVE-2020-19909 is everything that is wrong with CVEs (false bug report for curl)
25 votes -
Popular thesaurus website used in sneaky cryptojacking scheme
11 votes -
China exports of gallium and germanium, used in manufacture of semiconductors, fell to zero in August
25 votes -
Nearly 400 primate skulls headed for US collectors seized in "staggering" discovery at French airport
10 votes -
Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters
13 votes -
Wyze security breach: Why we’re pulling our recommendation of Wyze security cameras
27 votes -
New SprySOCKS Linux malware used in cyber espionage attacks
12 votes -
Experts link LastPass security breach to a string of crypto heists
48 votes -
Should I use third party firewall or antivirus on Windows (or elsewhere)? Which one?
It's seems to have been common sense for a while now that Windows has good-enough security software that you don't need 3rd party tools but is it actually the case now? Is there anything to lose...
It's seems to have been common sense for a while now that Windows has good-enough security software that you don't need 3rd party tools but is it actually the case now? Is there anything to lose or gain from trusting 3rd party with this stuff?
20 votes -
What password management solution do you use and why?
For a long time now, I have been using KeePassXC for desktops and KeePassDX for Android. I keep everything synchronized neatly with Syncthing, which can be configured to operate over your WiFi or...
For a long time now, I have been using KeePassXC for desktops and KeePassDX for Android. I keep everything synchronized neatly with Syncthing, which can be configured to operate over your WiFi or the internet through their gateways. This allows me to share a single KeePass file with another individual, provided I tell them the password.
I have a co-worker who is loving 1Password and while it looks great, something irks me about paying monthly for a password manager. I looked into Bitwarden for a "local cloud" and have seen very mixed results as well as not being sure if I could trust my own security configurations to do so.
I am primarily wondering what everyone else is using in search of something a bit more convenient (I'm not opposed to using the cloud) that has an app like KeePass that I can use for desktop apps, and not just in the browser (though I don't use that function often, truthfully).
Edit: Passkey support was mentioned in this comment and made me realize how important such support will be in the coming years. For those of you with password management solutions supporting it, how has it been?
107 votes -
US extremists keep trying to trigger mass blackouts — and that’s not even the scariest part
29 votes -
It’s official: Cars are the worst product category we have ever reviewed for privacy
130 votes -
Apple threatens to pull FaceTime and iMessage in the UK over proposed surveillance law changes
71 votes -
Active North Korean campaign targeting security researchers
9 votes -
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware
21 votes -
The true cost of a hack: The Rackspace Special
8 votes -
Apple’s decision to kill its CSAM photo-scanning tool sparks fresh controversy
24 votes -
Mom’s Meals discloses data breach impacting 1.2 million people
17 votes -
Former US President Donald Trump pleads not guilty to classified documents charges
75 votes -
Planned Danish law will make improper treatment of the Quran or Bible a criminal offence punishable by a fine and jail sentence of up to two years
39 votes -
WinRAR zero-day exploited since April to hack trading accounts
31 votes -
Cyberattack shutters major NSF-funded telescopes for more than two weeks
18 votes -
A new weapon in the war against robocalls
42 votes -
ProtonMail complied with 5,957 data requests in 2022 – still secure and private?
24 votes -
Unknown tracker alert on Android
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car. I heard this was coming but...
I just received an Unknown Tracker alert on my Pixel 7 running Android 14 beta 5 for an Apple air tag that was on my son in laws key chain as I had borrowed his car.
I heard this was coming but didn't expect it so soon!
Quite impressed with both the information given and the general advice and steps to take offered.
The first notification was "Tracker Travelling With You: Unknown Apple air tag detected. The owner can see your location."
Touching "more info" then shows a map of where the tracker has been with me and the option to make the tracker play a sound to help locate it, with a note that the owner won't know you've done that.
Then more advice and options:
- If you feel unsafe, get help.
- Get and save tracker info
- Disable the tracker (with a how-to guide on battery removal)
And a ”need more help" link.
As I said, I had heard about this coming but was pleasantly surprised at how good it was and the general advice and help offered up.
Nice seeing things like this done right.
34 votes -
A totaled Tesla was sold for parts in the US but came back online in Ukraine — here’s what happened
15 votes -
Downfall security vulnerability in Intel processors
40 votes -
US FBI accuses indicted Air National Guardsman of sharing classified information with someone living in a foreign country
15 votes -
The trouble with decommissioning a used FIDO security key
16 votes -
Zenbleed - Zen 2 hardware vulnerability
19 votes -
New acoustic attack steals data from keystrokes with 95% accuracy
48 votes -
FedFingerprinting: A federated learning approach to website fingerprinting attacks in Tor networks
6 votes