-
13 votes
-
"SHA-1 is a Shambles" - A demonstration of a chosen-prefix collision for SHA-1 (2020)
5 votes -
Samsung meeting notes and new source code are now in the wild after being leaked in ChatGPT
5 votes -
Talkback: An aggregator of security news, articles and posts
5 votes -
Monitor and respond to security alerts from within Minecraft
7 votes -
Upgraded to Windows 10, what do I need to do to optimize?
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some...
I finally got around to upgrading my mom’s computer (an Asus laptop from 2015) from Windows 8.1 to Windows 10. I’ve already deleted a few apps she won’t use (e.g., Xbox) and disabled/stopped some unneeded services. What else can I do to keep her computer fast? Particularly interesting in more services I can disable and the best browser/ad blocker combo. Thanks y’all!
10 votes -
Getting started with nmap
3 votes -
SSH server hardening
5 votes -
One-Time Programs
10 votes -
The secret life of SIM cards (DEFCON 21)
7 votes -
Ransomware actor abuses Genshin Impact anti-cheat driver to kill antivirus
9 votes -
Hardening SSH
4 votes -
Harden your Linux server using SSH keys (and turn off password auth)
8 votes -
Hertzbleed - a new family of frequency side channel attacks on x86 processors
13 votes -
Improved Process Isolation in Firefox 100
11 votes -
GitHub will require two-factor authentication (2FA) for all users who contribute code by the end of 2023
14 votes -
The right thing for the wrong reasons: FLOSS doesn't imply security
7 votes -
A bug lurking for 12 years gives attackers root on every major Linux distro
13 votes -
We desperately need a way to rapidly notify people of high-impact vulnerabilities, so I built one: BugAlert.org
9 votes -
Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046)
20 votes -
To secure the supply chain, you must properly fund it
8 votes -
Microsoft unveils 'Super Duper Secure Mode' in latest version of Edge
6 votes -
"We do not maintain databases"
11 votes -
Linux (In)security
10 votes -
Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program
9 votes -
McDonald's leaks password for Monopoly VIP database to winners
16 votes -
Zoom zero-click RCE from Pwn2Own 2021 - Technical write-up describing the process of discovering and exploiting the vulnerability
6 votes -
Introduction to Cross-Site Scripting (XSS)
4 votes -
Linux Privilege Escalation - Three Easy Ways to Get a Root Shell
9 votes -
From stolen laptop to inside the company network
12 votes -
Remote code execution vulnerability in the cdnjs Javascript CDN run by Cloudflare, which could have enabled tampering with over 10% of all websites
18 votes -
Kaspersky Password Manager had multiple problems in its password-generator, resulting in its passwords being predictable and easily brute-forced
21 votes -
Using John the Ripper To Crack Password Hashes
3 votes -
On password managers
11 votes -
Pwned Passwords is now open-sourced via the .NET Foundation, and will be provided compromised passwords by the FBI
13 votes -
Cloudflare introduces Cryptographic Attestation of Personhood, an experiment intended to replace CAPTCHAs
19 votes -
Battlestar Galactica Lessons from Ransomware to the Pandemic
4 votes -
Linux bans the University of Minnesota for sending intentionally buggy patches in the name of research
58 votes -
Disclosure of a vulnerability in AI Dungeon that enabled accessing all users' private adventures, scenarios, and posts via its GraphQL API
16 votes -
An update on the UMN affair
10 votes -
Introduction to SQL Injection - SQLi for Beginners
10 votes -
Finding and fixing a rare race-condition in GitHub's session handling
6 votes -
Exploiting machine learning models distributed as Python pickle files, and introducing Fickling: a new tool for analyzing and modifying pickle bytecode
3 votes -
Introduction to Malware Analysis — Malware Explained
4 votes -
The lead developer of curl analyzed its known security vulnerabilities and determined that half of them are related to it being written in C
12 votes -
Friday Security Briefing
Friday Security Briefing Hello there! I hope you're all looking forward to something this weekend. Today's briefing will cover a captivating tale of scheming against financial centers, woes of...
Friday Security Briefing
Hello there! I hope you're all looking forward to something this weekend. Today's briefing will cover a captivating tale of scheming against financial centers, woes of virtual networking, and the possibility of Russia behaving quite unnecessarily.
"Listen, or your tongue will make you deaf." ~ Unattributed proverb
Wall Street targeted by new Capital Call investment email scammers
The tactic of exploiting enterprise email systems remains a successful and active attack vector for bad actors. The emerging development is the use of "capital call" style scam, wherein scammers pretend to have investor or insurance business with the business.
"In an example shared by the researchers, the scam email attached a Capital Call Notice for US $970,357.00 to be deposited into a bank account under the fraudsters’ control."
"If the targeted investor was duped into wiring the funds, then it is likely that money would be quickly moved into other accounts and withdrawn by mules to prevent the payment from being returned to the victim."
The flexibility that cryptocurrencies provide to discreetly rearrange money may actually be disadvantageous for banks in certain situations.
Source: Tripwire, Wall Street targeted by new Capital Call investment email scammers
High severity Linux network security holes found, fixed
(CVE-2021-26708) Alexander Popov of London has discovered five security holes in the Linux kernel's virtual socket implementation. This is concerning, my personal use of virtual networking systems could be a lot more thought out. I do tend to keep my use of libvirt to a minimum but ideally I would be running my virtualization workstation on a separate box optimized for safe practices.
"These holes entered Linux when virtual socket multi-transport support was added. This networking transport facilitates communication between virtual machines (VM) and their host. It's commonly used by guest agents and hypervisor services that need a communications channel that is independent of the VM network configuration. As such, people who are running VMs on the cloud, which is pretty much everyone these days, are especially vulnerable."
Source: ZDNet, High severity Linux network security holes found, fixed
Ukraine: DDoS attacks on govt sites originated from Russia
Ukraine is proposing that information on the threat actors responsible for a DDoS on Ukrainian government websites originated from Russian domains.
However, they did not claim that the threat actors were affiliated with the Russian state.
I am curious about the motivations if this was sanctioned by Russia. Are they testing their capabilities against a softer target in order to learn from the European and American Cyber-Defense response? Perhaps this was a way for Russia to demonstrate it's competency at cyber warfare.
"The National Coordination Center for Cybersecurity (NCCC) at the NSDC states that these DDoS attacks have been massive and have targeted government websites in the defense and security sector."
Possible retaliation?
"Last week, news leaked that Ukrainian law enforcement, in cooperation with the US and French police, arrested alleged Egregor ransomware operation members.
Three days later, the Security Service of Ukraine (SBU) issued a press release about the Egregor arrests and seizing the ransomware group's equipment."
Source: Bleeping Computer, Ukraine: DDoS attacks on govt sites originated from Russia
8 votes -
Bitsquatting windows.com with fourteen domains that are one bitflip away
18 votes -
Researcher hacks over 35 tech firms via package/dependency managers
13 votes -
A detailed look into the Stack Exchange network's May 2019 security incident
9 votes -
Finding vulnerabilities in the calling state machines of video/audio messaging platforms
3 votes