Cinny — Yet another matrix client
Imagine a matrix client...
Where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
https://cinny.in/
👉🏽Found @: https://t.iss.one/v1_links
#cinny #matrix
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Imagine a matrix client...
Where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
https://cinny.in/
👉🏽Found @: https://t.iss.one/v1_links
#cinny #matrix
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
cinny.in
A Matrix client where you can enjoy the conversation using simple, elegant and secure interface protected by e2ee with the power of open source.
Windows encryption Bitlocker bypassed despite TPM protection
From Stolen Laptop to Inside the Company Network
What can you do with a stolen laptop? Can you get access to our internal network? That was the question a client wanted answered recently. Spoiler alert: Yes, yes you can. This post will walk you through how we took a “stolen” corporate laptop and chained several exploits together to get inside the client’s corporate network.
We received a Lenovo laptop preconfigured with the standard security stack for this organization. We didn’t get any information about this laptop, no test credentials, no configuration details, no nothing, it was a 100% blackbox test. Once the laptop came in, we opened the shipping box and got to work. After we did our reconnaissance of the laptop (BIOS settings, normal boot operation, hardware details, etc) we noted a lot of best practices were being followed, negating many common attacks.
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
#encryption #bitlocker #tpm #lenovo
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
From Stolen Laptop to Inside the Company Network
What can you do with a stolen laptop? Can you get access to our internal network? That was the question a client wanted answered recently. Spoiler alert: Yes, yes you can. This post will walk you through how we took a “stolen” corporate laptop and chained several exploits together to get inside the client’s corporate network.
We received a Lenovo laptop preconfigured with the standard security stack for this organization. We didn’t get any information about this laptop, no test credentials, no configuration details, no nothing, it was a 100% blackbox test. Once the laptop came in, we opened the shipping box and got to work. After we did our reconnaissance of the laptop (BIOS settings, normal boot operation, hardware details, etc) we noted a lot of best practices were being followed, negating many common attacks.
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
#encryption #bitlocker #tpm #lenovo
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Orbiter Space Flight Simulator
Orbiter is a spaceflight simulator based on Newtonian mechanics. Its playground is our solar system with many of its major bodies – the sun, planets and moons. You take control of a spacecraft – either historic, hypothetical, or purely science fiction. Orbiter is unlike most commercial computer games with a space theme – there are no predefined missions to complete (except the ones you set yourself), no aliens to destroy and no goods to trade.
Instead, you will get a pretty good idea about what is involved in real space flight – how to plan an ascent into orbit, how to rendezvous with a space station, or how to fly to another planet. It is more difficult, but also more of a challenge. Some people get hooked, others get bored. Finding out for yourself is easy – simply give it a try. Orbiter is free, so you don’t need to invest more than a bit of your spare time.
https://github.com/mschweiger/orbiter
💡 Read as well: 👇🏽
https://www.orbiter-forum.com/threads/orbiter-is-now-open-source.40023/
#orbiter #spaceflight #simulator #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Orbiter is a spaceflight simulator based on Newtonian mechanics. Its playground is our solar system with many of its major bodies – the sun, planets and moons. You take control of a spacecraft – either historic, hypothetical, or purely science fiction. Orbiter is unlike most commercial computer games with a space theme – there are no predefined missions to complete (except the ones you set yourself), no aliens to destroy and no goods to trade.
Instead, you will get a pretty good idea about what is involved in real space flight – how to plan an ascent into orbit, how to rendezvous with a space station, or how to fly to another planet. It is more difficult, but also more of a challenge. Some people get hooked, others get bored. Finding out for yourself is easy – simply give it a try. Orbiter is free, so you don’t need to invest more than a bit of your spare time.
https://github.com/mschweiger/orbiter
💡 Read as well: 👇🏽
https://www.orbiter-forum.com/threads/orbiter-is-now-open-source.40023/
#orbiter #spaceflight #simulator #opensource
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - orbitersim/orbiter: Open-source repository of Orbiter Space Flight Simulator
Open-source repository of Orbiter Space Flight Simulator - orbitersim/orbiter
Activision Blizzard Hires Notorious Union-Busting Firm WilmerHale
Yesterday, July the 28th, many of Activision’s 9,500 workers walked off the job to protest the culture of harassment and discrimination present at the company. Activision Blizzard is currently being sued by the state of California over alleged sexual harassment and ‘frat boy’ culture. The complaint from California asserts that “[f]emale employees receive lower starting pay and also earn less than male employees for substantially similar work.”
The lawsuit shows wide-ranging discrimination towards women from the company. The complaint notes that the company is “only 20 percent women.” Its top leadership is also exclusively male and white,” and that “very few women ever reach top roles in the company.” The women who do reach higher roles earn less salary, incentive pay, and total compensation than their male peers, as evidenced in Activision’s own records.
Activision has called in the experts to put down the claims of sexual harassment and discrimination and stop the protests by workers. Activision has hired WilmerHale. WilmerHale has been hired to “review” Activision’s policies. Wilmerhale’s own site advertises its expertise as “union awareness and avoidance.” They use attorneys and experts to develop “union avoidance strategies and union organizational campaigns.” WilmerHale was used extensively by Amazon to spread anti-union misinformation and propaganda to “sow doubts about the unionization drive.” WilmerHale was the firm that killed unionization efforts at an Amazon center in Bessemer, Alabama.
https://www.promethean.news/news/activision-hires-notorious-union-busting-firm-wilmerhale
#activision #blizzard #WilmerHale #amazon
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Yesterday, July the 28th, many of Activision’s 9,500 workers walked off the job to protest the culture of harassment and discrimination present at the company. Activision Blizzard is currently being sued by the state of California over alleged sexual harassment and ‘frat boy’ culture. The complaint from California asserts that “[f]emale employees receive lower starting pay and also earn less than male employees for substantially similar work.”
The lawsuit shows wide-ranging discrimination towards women from the company. The complaint notes that the company is “only 20 percent women.” Its top leadership is also exclusively male and white,” and that “very few women ever reach top roles in the company.” The women who do reach higher roles earn less salary, incentive pay, and total compensation than their male peers, as evidenced in Activision’s own records.
Activision has called in the experts to put down the claims of sexual harassment and discrimination and stop the protests by workers. Activision has hired WilmerHale. WilmerHale has been hired to “review” Activision’s policies. Wilmerhale’s own site advertises its expertise as “union awareness and avoidance.” They use attorneys and experts to develop “union avoidance strategies and union organizational campaigns.” WilmerHale was used extensively by Amazon to spread anti-union misinformation and propaganda to “sow doubts about the unionization drive.” WilmerHale was the firm that killed unionization efforts at an Amazon center in Bessemer, Alabama.
https://www.promethean.news/news/activision-hires-notorious-union-busting-firm-wilmerhale
#activision #blizzard #WilmerHale #amazon
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Hollows Hunter
Hollows Hunter allows you to scan your full system, searching for potentially malicious implants, and extract them for further analysis.
It is an application based on PE-sieve (a library version), so there is a big overlap of the features between those two. They have a similar command-line interface, but while PE-sieve is an engine dedicated to scanning a single process, Hollows Hunter offers many additional features and filters on the top of this base.
https://github.com/hasherezade/hollows_hunter
#hollowshunter #tool #antimalware #forensics #analysis
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Hollows Hunter allows you to scan your full system, searching for potentially malicious implants, and extract them for further analysis.
It is an application based on PE-sieve (a library version), so there is a big overlap of the features between those two. They have a similar command-line interface, but while PE-sieve is an engine dedicated to scanning a single process, Hollows Hunter offers many additional features and filters on the top of this base.
https://github.com/hasherezade/hollows_hunter
#hollowshunter #tool #antimalware #forensics #analysis
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants…
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). - hasherezade/hollows_hunter
Hacker downloads close to 300,000 personal ID photos
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
The culprit had already obtained personal names and ID codes and was able to obtain a third component, the photos, by making individual requests from thousands of IP addresses.
This data was not, however, enough for the hacker to access e-state services, meaning the normal means of authentication (ID card, mobile ID and SMART ID) have not been compromised.
A Information System Authority RIA database holding document photos was compromised.
Speaking at a press conference Wednesday, Oskar Gross, head of the central criminal police cyber crime office, said that: "To date, the individual who committed the attack has had the data he hacked seized and confiscated by the police," adding that the perpetrator was a resident of Tallinn.
https://news.err.ee/1608291072/hacker-downloads-close-to-300-000-personal-id-photos
#hacker #breach #estonia
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
The culprit had already obtained personal names and ID codes and was able to obtain a third component, the photos, by making individual requests from thousands of IP addresses.
This data was not, however, enough for the hacker to access e-state services, meaning the normal means of authentication (ID card, mobile ID and SMART ID) have not been compromised.
A Information System Authority RIA database holding document photos was compromised.
Speaking at a press conference Wednesday, Oskar Gross, head of the central criminal police cyber crime office, said that: "To date, the individual who committed the attack has had the data he hacked seized and confiscated by the police," adding that the perpetrator was a resident of Tallinn.
https://news.err.ee/1608291072/hacker-downloads-close-to-300-000-personal-id-photos
#hacker #breach #estonia
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
err.ee
Hacker downloads close to 300,000 personal ID photos
A hacker was able to obtain over 280,000 personal identity photos following an attack on the state information system last Friday. The suspect is reportedly a resident of Tallinn.
Kernel Pwning with eBPF: a Love Story
At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.
Find the released local privilege escalation (LPE) Proof-of-Concept for CVE-2021-3490 here: https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490. It targets Ubuntu 20.10 (Groovy Gorilla) kernels 5.8.0-25.26 through 5.8.0-52.58. and Ubuntu 21.04 (Hirsute Hippo) 5.11.0-16.17.
This blog post is intended to give a detailed overview of eBPF from the perspective of an exploit developer.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
#linux #kernel #pwning #ebpf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.
Find the released local privilege escalation (LPE) Proof-of-Concept for CVE-2021-3490 here: https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490. It targets Ubuntu 20.10 (Groovy Gorilla) kernels 5.8.0-25.26 through 5.8.0-52.58. and Ubuntu 21.04 (Hirsute Hippo) 5.11.0-16.17.
This blog post is intended to give a detailed overview of eBPF from the perspective of an exploit developer.
https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
#linux #kernel #pwning #ebpf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
GitHub
GitHub - chompie1337/Linux_LPE_eBPF_CVE-2021-3490
Contribute to chompie1337/Linux_LPE_eBPF_CVE-2021-3490 development by creating an account on GitHub.
Meet Paragon: An American-Funded, Super-Secretive Israeli Surveillance Startup That ‘Hacks WhatsApp And Signal’
Paragon Solutions doesn’t have a website. There’s very little information at all about them online, even if the Tel Aviv-based smartphone surveillance startup’s employees are all over LinkedIn, more than 50 of them. That’s not a bad headcount for a company that’s still in stealth mode.
But it does have a cofounder, director and chief shareholder that will turn heads: Ehud Schneorson, the former commander of Israel’s NSA equivalent, known as Unit 8200. The other cofounders - CEO Idan Nurick, CTO Igor Bogudlov and vice president of research Liad Avraham - are ex-Israeli intelligence too. Also on the board is cofounding director and former Israeli prime minister Ehud Barak. They also have a significant American financial backer: Boston, Massachusetts-based Battery Ventures. According to two senior employees at companies in the Israeli surveillance industry, who spoke on the condition of anonymity, the venture capital business put in between $5 and $10 million, though Battery declined to comment on the nature of its investment, which is only mentioned in brief on the company’s website.
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted.
https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/
#paragon #hacking #surveillance #spyware #israel #usa #whatsapp #signal
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Paragon Solutions doesn’t have a website. There’s very little information at all about them online, even if the Tel Aviv-based smartphone surveillance startup’s employees are all over LinkedIn, more than 50 of them. That’s not a bad headcount for a company that’s still in stealth mode.
But it does have a cofounder, director and chief shareholder that will turn heads: Ehud Schneorson, the former commander of Israel’s NSA equivalent, known as Unit 8200. The other cofounders - CEO Idan Nurick, CTO Igor Bogudlov and vice president of research Liad Avraham - are ex-Israeli intelligence too. Also on the board is cofounding director and former Israeli prime minister Ehud Barak. They also have a significant American financial backer: Boston, Massachusetts-based Battery Ventures. According to two senior employees at companies in the Israeli surveillance industry, who spoke on the condition of anonymity, the venture capital business put in between $5 and $10 million, though Battery declined to comment on the nature of its investment, which is only mentioned in brief on the company’s website.
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted.
https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/
#paragon #hacking #surveillance #spyware #israel #usa #whatsapp #signal
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Forbes
Meet Paragon: An American-Funded, Super-Secretive Israeli Surveillance Startup That ‘Hacks WhatsApp And Signal’
NSO has a new competitor, one cofounded by the former commander of Israel’s NSA equivalent, Unit 8200. It’s promising to only sell to democratic regimes.
Media is too big
VIEW IN TELEGRAM
Fighting porch pirates with artificial intelligence (and flour)
I got a package stolen, so I did the only thing I know how to do - build an unnecessarily complicated and ethically ambiguous machine.
This is the story of how I built a machine to recognize if a package is being stolen from my porch, and respond accordingly. The project uses a combination of python, tensorflow, and the last of my sanity.
https://github.com/rydercalmdown/package_theft_preventor
https://www.youtube.com/watch?v=nPnOtm1Uadw
#ai #machinelearning #porchpirates #packagetheive #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
I got a package stolen, so I did the only thing I know how to do - build an unnecessarily complicated and ethically ambiguous machine.
This is the story of how I built a machine to recognize if a package is being stolen from my porch, and respond accordingly. The project uses a combination of python, tensorflow, and the last of my sanity.
https://github.com/rydercalmdown/package_theft_preventor
https://www.youtube.com/watch?v=nPnOtm1Uadw
#ai #machinelearning #porchpirates #packagetheive #video
🎥@cRyPtHoN_INFOSEC_FR
🎥@cRyPtHoN_INFOSEC_EN
🎥@cRyPtHoN_INFOSEC_DE
🎥@BlackBox_Archiv
felix_acmmm21_faketagger.pdf
4 MB
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The system, entitled FakeTagger, uses an encoder/decoder process to embed visually indiscernible ID information into images at a low enough level that the injected information will be interpreted as essential facial characteristic data, and therefore passed through abstraction processes intact, in the same way, for instance, as eye or mouth data.
https://www.unite.ai/identifying-deepfake-data-sources-with-ai-based-tagging-faketagger/
https://xujuefei.com/felix_acmmm21_faketagger.pdf
#faketagger #deepfake #tracking #tagging #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
PwnedPiper vulnerabilities impact 80% of major hospitals in North America
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Details have been published today about a collection of nine vulnerabilities known as PwnedPiper that impact a common type of medical equipment that’s installed in roughly 80% of all major hospitals in North America.
The TransLogic Pneumatic Tube Systems (PTS), from Swisslog Healthcare, is a complex system that uses compressed air to move medical supplies (lab samples, medicine, blood products, etc.) using tubes that connect different departments inside large hospitals.
Installed in more than 3,000 hospitals, TransLogic systems effectively work as the blood vessels of modern hospitals as they allow the movement of sensitive medical material while keeping nurses free to provide patient care.
In research published today, IoT security firm Armis said it discovered nine vulnerabilities in the Nexus Control Panel, the software that doctors and nurses use to control how medical material moves between hospital sections.
“These vulnerabilities can enable an unauthenticated attacker to take over Translogic PTS stations and essentially gain complete control over the PTS network of a target hospital,” the Armis team said today.
“This type of control could enable sophisticated and worrisome ransomware attacks, as well as allow attackers to leak sensitive hospital information,” the company added.
While the vulnerabilities can be exploited only if an attacker can connect or has a foothold on the hospital’s internal network, the PwndPiper issues were deemed extremely severe due to the prevalence of TransLogic devices across North America and how easy they could be weaponized to impact a hospital’s ability to provide proper medical care.
The issues —listed at the bottom of this article— were discovered in May and reported to Swisslog Healthcare, Armis said.
“A software update for all but one of the vulnerabilities has been developed, and specific mitigation strategies for the remaining vulnerability are available for customers,” a Swisslog Healthcare spokesperson told The Record in an email.
The company has released today version 7.2.5.7 of the Nexus Control Panel, along with a blog post with additional information for its customers. It also said the issue is primarily restricted to hospitals in North America, where most of these tube systems are installed, and that a patch for the ninth issue is expected later this year.
https://therecord.media/pwnedpiper-vulnerabilities-impact-80-of-major-hospitals-in-north-america/
#PwnedPiper #vulnerabilities #hospitals #usa #swisslog
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail: User data for the USA thanks to good cooperation with authorities
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
ProtonMail, which claims to be a "secure e-mail service from Switzerland," supplies user data to security authorities. User data also goes to law enforcement agencies in the USA, as a current case shows.
The proceedings concern threats against, among others, the well-known immunologist Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family.
As the U.S. Department of Justice writes, the defendant used "an email account from a provider of secure, encrypted email services based in Switzerland."
According to the corresponding affidavit, this email service was ProtonMail. The relevant emails end accordingly with "Sent with ProtonMail Secure Email".
On the basis of data from ProtonMail, which was sent to the USA by way of legal assistance, it emerged that the defendant had used several user accounts at ProtonMail.
According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail as well as other online services.
https://steigerlegal.ch/2021/08/02/protonmail-daten-usa/
https://www.justice.gov/usao-md/press-release/file/1416926/download
#protonmail #usa #doj #userdata #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Steiger Legal
ProtonMail: Nutzerdaten für die USA dank Rechtshilfe und guter Zusammenarbeit mit Behörden – Steiger Legal
ProtonMail, nach eigenen Angaben ein «sicherer E-Mail-Dienst aus der Schweiz», liefert Nutzerdaten an Sicherheitsbehörden. Nutzerdaten gehen auch an Strafverfolgungsbehörden in den USA, wie ein aktuelles Verfahren zeigt. Das Verfahren betrifft …
Shares slide after China brands online games 'electronic drugs'
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Shares in two of China's biggest online gaming firms have slipped after a state media outlet called them "electronic drugs".
Tencent and NetEase shares fell more than 10% in early Hong Kong trade before regaining some of those losses.
Investors are increasingly concerned about Beijing cracking down on firms.
In recent months authorities have announced a series of measures to tighten their grip on technology and private education companies.
An article published by the state-run Economic Information Daily said many teenagers had become addicted to online gaming and it was having a negative impact on them. The news outlet is affiliated with the official Xinhua news agency.
The article cited Tencent's hugely popular game Honor of Kings, saying students were playing it for up to eight hours a day, and asked for more curbs on the industry.
"No industry, no sport, can be allowed to develop in a way that will destroy a generation," it said before going on to liken online games to "spiritual opium".
Tencent has said it would introduce measures to reduce children's access to and time spent on its Honor of Kings game. The company also said it plans to eventually roll out the policy to all of its games.`
The recovery in share prices came as Economic Information Daily deleted the article from its account on the Wechat social media platform.
Tencent also saw its shares fall last week after being ordered to end exclusive music licensing deals with record labels around the world.
The move was aimed at tackling the technology giant's dominance of online music streaming in the country - it currently controls more than 80% of China's exclusive music streaming rights after an acquisition in 2016.
Tencent is only one of a number of Chinese companies listed in the US, Hong Kong and mainland China to see shares fall sharply this year as Beijing clamps down on the country's technology and education industries.
Last week saw shares in Chinese online tutoring firms slump after they were stripped of the ability to make a profit from teaching core subjects in China.
The new guidelines also restricted foreign investment in the industry.
https://www.bbc.com/news/business-58066659
#china #online #gaming
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
BBC News
Shares slide after China brands online games 'electronic drugs'
In recent months Beijing has cracked down on China's technology and private education industries.
Blizzard Entertainment president steps down after workplace protests.
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Activision Blizzard, the video game maker, said on Tuesday that the president of its Blizzard Entertainment studio was stepping down immediately, as the company grapples with the fallout from allegations of workplace harassment and discrimination.
Activision, known for Call of Duty and other popular gaming franchises, has been under pressure following a lawsuit filed on July 20 by the state of California. The lawsuit accused the company of fostering a “frat boy workplace culture” in which men joked about rape and women were routinely harassed and paid less than their male colleagues.
Many of the misconduct accusations in the lawsuit focused on the Blizzard division, with which Activision merged through a 2008 deal with Vivendi Games.
The departing executive, J. Allen Brack, will be replaced by two Blizzard executives, Jen Oneal and Mike Ybarra, who will be co-leaders of the studio, Activision said in a statement. Mr. Brack was mentioned in the lawsuit as an executive who had failed to take “effective remedial measures” when sexual harassment and discrimination complaints were brought to him.
Bobby Kotick, Activision’s chief executive, initially stumbled in his response to the lawsuit but has since moved aggressively to contain employee discontent. Activision was at first dismissive of the allegations, and more than 1,500 employees last week staged a walkout to protest the response and to urge executives to take the issues seriously.
On the eve of the walkout, Mr. Kotick apologized and said Activision would improve its culture and hire the law firm WilmerHale to review the company’s policies. “I am sorry that we did not provide the right empathy and understanding,” he told employees at the time. Activision is set to report earnings later on Tuesday, when Mr. Kotick is expected to speak.
https://www.nytimes.com/2021/08/03/business/blizzard-entertainment-activision.html
#blizzard
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
NY Times
Blizzard Entertainment president steps down after workplace protests.
The video game studio’s parent company, Activision Blizzard, has been accused of fostering a “frat boy workplace culture.”
GIFCT-TAWG-2021.pdf
1.1 MB
Gap analysis and recommendations for deploying technical solutions to tackle the terrorist use of the Internet
https://cdn-132.bayfiles.com/H187o3Acu0/c92ca5dd-1628020715/GIFCT-TAWG-2021.pdf
#analysis #terrorists #internet #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
https://cdn-132.bayfiles.com/H187o3Acu0/c92ca5dd-1628020715/GIFCT-TAWG-2021.pdf
#analysis #terrorists #internet #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Your Facebook Account Was Hacked. Getting Help May Take Weeks — Or $299
Angela McNamara's first hint that her Facebook account had been hacked was an early-morning email warning that someone was trying to log into her account.
"If this is not you, don't worry, we're keeping your account safe," she recalls the email from Facebook saying. But her relief only lasted a minute, when another email arrived, saying her password had been changed. Then another, notifying her that a two-factor authentication — an extra layer of security — had been set up for her account.
"And then from there I'm just like, 'OK, it is gone,' " said McNamara, who lives outside Toronto. She tried Facebook's automated process to recover her account: getting a backup code, resetting her password. But nothing worked.
https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299
#facebook #hacked #DeleteFacebook
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Angela McNamara's first hint that her Facebook account had been hacked was an early-morning email warning that someone was trying to log into her account.
"If this is not you, don't worry, we're keeping your account safe," she recalls the email from Facebook saying. But her relief only lasted a minute, when another email arrived, saying her password had been changed. Then another, notifying her that a two-factor authentication — an extra layer of security — had been set up for her account.
"And then from there I'm just like, 'OK, it is gone,' " said McNamara, who lives outside Toronto. She tried Facebook's automated process to recover her account: getting a backup code, resetting her password. But nothing worked.
https://www.npr.org/2021/08/02/1023801277/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299
#facebook #hacked #DeleteFacebook
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
RF_28_July_2021_-_E.pdf
602.2 KB
United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes
Russia has put forward a draft convention to the United Nations ostensibly to fight cyber-crime.
The proposal, titled "United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes," [PDF] calls for member states to develop domestic laws to punish a far broader set of offenses than current international rules recognize.
https://www.theregister.com/2021/08/03/russia_cybercrime_laws/
https://www.kommersant.ru/docs/2021/RF_28_July_2021_-_E.pdf
#russia #un #cybercrime #backdoors #censorship #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Russia has put forward a draft convention to the United Nations ostensibly to fight cyber-crime.
The proposal, titled "United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes," [PDF] calls for member states to develop domestic laws to punish a far broader set of offenses than current international rules recognize.
https://www.theregister.com/2021/08/03/russia_cybercrime_laws/
https://www.kommersant.ru/docs/2021/RF_28_July_2021_-_E.pdf
#russia #un #cybercrime #backdoors #censorship #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
2108.01077.pdf
12.4 MB
‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication Systems
Researchers from Israel have developed a neural network capable of generating ‘master’ faces – facial images that are each capable of impersonating multiple IDs. The work suggests that it’s possible to generate such ‘master keys’ for more than 40% of the population using only 9 faces synthesized by the StyleGAN Generative Adversarial Network (GAN), via three leading face recognition systems.
The paper is a collaboration between the Blavatnik School of Computer Science and the school of Electrical Engineering, both at Tel Aviv.
https://www.unite.ai/master-faces-that-can-bypass-over-40-of-facial-id-authentication-systems/
https://arxiv.org/pdf/2108.01077.pdf
#bypass #facial #id #authentication #GAN #StyleGAN #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Researchers from Israel have developed a neural network capable of generating ‘master’ faces – facial images that are each capable of impersonating multiple IDs. The work suggests that it’s possible to generate such ‘master keys’ for more than 40% of the population using only 9 faces synthesized by the StyleGAN Generative Adversarial Network (GAN), via three leading face recognition systems.
The paper is a collaboration between the Blavatnik School of Computer Science and the school of Electrical Engineering, both at Tel Aviv.
https://www.unite.ai/master-faces-that-can-bypass-over-40-of-facial-id-authentication-systems/
https://arxiv.org/pdf/2108.01077.pdf
#bypass #facial #id #authentication #GAN #StyleGAN #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
98: Zero Day Brokers
Darknet Diaries - EP 98: Zero Day Brokers
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it.
https://darknetdiaries.com/episode/98/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first which resulted in her writing a whole book on it.
https://darknetdiaries.com/episode/98/
#truecrime #darknetdiaries #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙@cRyPtHoN_INFOSEC_EN
🎙@cRyPtHoN_INFOSEC_DE
🎙@BlackBox_Archiv
Apple plans to scan US iPhones for child abuse imagery
Security researchers raise alarm over potential surveillance of personal devices
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.
Apple detailed its proposed system — known as “neuralMatch” — to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicised more widely as soon as this week, they said.
The automated system would proactively alert a team of human reviewers if it believes illegal imagery is detected, who would then contact law enforcement if the material can be verified. The scheme will initially roll out only in the US.
Apple declined to comment.
(Paywall)
https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Security researchers raise alarm over potential surveillance of personal devices
Apple intends to install software on American iPhones to scan for child abuse imagery, according to people briefed on its plans, raising alarm among security researchers who warn that it could open the door to surveillance of millions of people’s personal devices.
Apple detailed its proposed system — known as “neuralMatch” — to some US academics earlier this week, according to two security researchers briefed on the virtual meeting. The plans could be publicised more widely as soon as this week, they said.
The automated system would proactively alert a team of human reviewers if it believes illegal imagery is detected, who would then contact law enforcement if the material can be verified. The scheme will initially roll out only in the US.
Apple declined to comment.
(Paywall)
https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
#usa #apple #iphones #childabuse #surveillance
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Ft
Subscribe to read | Financial Times
News, analysis and comment from the Financial Times, the worldʼs leading global business publication
Operating Systems: Timeline and Family Tree
Includes over 830 operating systems so far
In this post you'll find a family tree and timeline of operating systems. I have tried to include all operating systems, no matter how old or obscure. Of course, a complete list is virtually impossible, as there is no way to catalogue all the tiny hobby and embedded systems that may exist somewhere.
Please also note that I only included a few selected Linux/BSD/Solaris distributions (it is arguable whether these should count as an OS on their own or not).
Currently, the family tree includes between 800 and 900 different operating systems. Tip: use Ctrl+F (Cmd+F on Mac) to search for a system.
https://eylenburg.github.io/os_familytree.htm
#os #familytree
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Includes over 830 operating systems so far
In this post you'll find a family tree and timeline of operating systems. I have tried to include all operating systems, no matter how old or obscure. Of course, a complete list is virtually impossible, as there is no way to catalogue all the tiny hobby and embedded systems that may exist somewhere.
Please also note that I only included a few selected Linux/BSD/Solaris distributions (it is arguable whether these should count as an OS on their own or not).
Currently, the family tree includes between 800 and 900 different operating systems. Tip: use Ctrl+F (Cmd+F on Mac) to search for a system.
https://eylenburg.github.io/os_familytree.htm
#os #familytree
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
eylenburg.github.io
Operating Systems: Timeline and Family Tree