Google has been DDoSing SourceHut for over a year
Just now, I took a look at the HTTP logs on git.sr.ht. Of the past 100,000 HTTP requests received by git.sr.ht (representing about 2Β½ hours of logs), 4,774 have been requested by GoModuleProxy β 5% of all traffic. And their requests are not cheap: every one is a complete git clone. They come in bursts, so every few minutes we get a big spike from Go, along with a constant murmur of Go traffic.
This has been ongoing since around the release of Go 1.16, which came with some changes to how Go uses modules. Since this release, following a gradual ramp-up in traffic as the release was rolled out to users, git.sr.ht has had a constant floor of I/O and network load for which the majority can be attributed to Go.
I started to suspect that something strange was going on when our I/O alarms started going off in February 2021 (we eventually had to tune these alarms up above the floor of I/O noise generated by Go), correlated with lots of activity from a Go user agent. I was able to narrow it down with some effort, but to the credit of the Go team they did change their User-Agent to make more apparent what was going on. Ultimately, this proved to be the end of the Go teamβs helpfulness in this matter.
I did narrow it down: it turns out that the Go Module Mirror runs some crawlers that periodically clone Git repositories with Go modules in them to check for updates. Once we had narrowed this down, I filed a second ticket to address the problem.
https://drewdevault.com/2022/05/25/Google-has-been-DDoSing-sourcehut.html
#ddos #sourcehut #google
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Just now, I took a look at the HTTP logs on git.sr.ht. Of the past 100,000 HTTP requests received by git.sr.ht (representing about 2Β½ hours of logs), 4,774 have been requested by GoModuleProxy β 5% of all traffic. And their requests are not cheap: every one is a complete git clone. They come in bursts, so every few minutes we get a big spike from Go, along with a constant murmur of Go traffic.
This has been ongoing since around the release of Go 1.16, which came with some changes to how Go uses modules. Since this release, following a gradual ramp-up in traffic as the release was rolled out to users, git.sr.ht has had a constant floor of I/O and network load for which the majority can be attributed to Go.
I started to suspect that something strange was going on when our I/O alarms started going off in February 2021 (we eventually had to tune these alarms up above the floor of I/O noise generated by Go), correlated with lots of activity from a Go user agent. I was able to narrow it down with some effort, but to the credit of the Go team they did change their User-Agent to make more apparent what was going on. Ultimately, this proved to be the end of the Go teamβs helpfulness in this matter.
I did narrow it down: it turns out that the Go Module Mirror runs some crawlers that periodically clone Git repositories with Go modules in them to check for updates. Once we had narrowed this down, I filed a second ticket to address the problem.
https://drewdevault.com/2022/05/25/Google-has-been-DDoSing-sourcehut.html
#ddos #sourcehut #google
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π±5π2π₯1
Belgium wants to ban Signal β a harbinger of European policy to come
Last week, the Belgian government launched a proposal that would ban Signal. What's going on?
Just over seven years ago, a Dutch court threw out the Dutch Telecommunications Data Retention Act. Under that law, telecommunication providers were obliged to retain metadata about our communications for up to two years. This did not concern the content of a message or conversation, but information about who has contact with whom. And when. And the location of the participants. It was almost inevitable that the court would invalidate this law: European judges previously declared the European Data Retention Directive invalid, and the Dutch law was its national implementation.
https://edri.org/our-work/belgium-wants-to-ban-signal-a-harbinger-of-european-policy-to-come/
#belgium #signal
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Last week, the Belgian government launched a proposal that would ban Signal. What's going on?
Just over seven years ago, a Dutch court threw out the Dutch Telecommunications Data Retention Act. Under that law, telecommunication providers were obliged to retain metadata about our communications for up to two years. This did not concern the content of a message or conversation, but information about who has contact with whom. And when. And the location of the participants. It was almost inevitable that the court would invalidate this law: European judges previously declared the European Data Retention Directive invalid, and the Dutch law was its national implementation.
https://edri.org/our-work/belgium-wants-to-ban-signal-a-harbinger-of-european-policy-to-come/
#belgium #signal
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
European Digital Rights (EDRi)
Belgium wants to ban Signal β a harbinger of European policy to come - European Digital Rights (EDRi)
Last week, the Belgian government launched a proposal that would ban Signal. What's going on?
π14β€2
CTI Fundamentals
A collection of essential resources related to cyber threat intelligence theory.
https://github.com/curated-intel/CTI-fundamentals
#cti #collection
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
A collection of essential resources related to cyber threat intelligence theory.
https://github.com/curated-intel/CTI-fundamentals
#cti #collection
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
GitHub
GitHub - curated-intel/CTI-fundamentals: A collection of papers, blogs, and resources that make up the quintessential aspects ofβ¦
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence - GitHub - curated-intel/CTI-fundamentals: A collection of papers, blogs, and reso...
π1
Dangerzone - Convert Suspect PDFs, Office-Documents, Images to Safe PDFs
Have you ever heard the computer security advice, βDonβt open attachmentsβ? This is solid advice, but unfortunately for journalists, activists, and many other people, itβs impossible to follow. Imagine if you were a journalist and got an email from someone claiming to work for the Trump Organization with βDonald Trump tax returns.pdfβ attached. Are you really going to reply saying, βSorry, I donβt open attachmentsβ and leave it at that?
The truth is, as a journalist, itβs your job to open documents from strangers, whether you get them in an email, a Signal or WhatsApp message, or through SecureDrop. Journalists also must open and read documents downloaded from all manner of websites, from leaked or hacked email dumps, or from any number of other potentially untrustworthy sources.
Dangerzone aims to solve this problem. You can install Dangerzone on your Mac, Windows, or Linux computer, and then use it to open a variety of types of documents: PDFs, Microsoft Office or LibreOffice documents, or images. Even if the original document is dangerous and would normally hack your computer, Dangerzone will convert it into a safe PDF that you can open and read.
You can think of it like printing a document and then rescanning it to remove anything sketchy, except all done in software.
https://dangerzone.rocks/about.html
https://github.com/freedomofpress/dangerzone
#dangerzone #pdf
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Have you ever heard the computer security advice, βDonβt open attachmentsβ? This is solid advice, but unfortunately for journalists, activists, and many other people, itβs impossible to follow. Imagine if you were a journalist and got an email from someone claiming to work for the Trump Organization with βDonald Trump tax returns.pdfβ attached. Are you really going to reply saying, βSorry, I donβt open attachmentsβ and leave it at that?
The truth is, as a journalist, itβs your job to open documents from strangers, whether you get them in an email, a Signal or WhatsApp message, or through SecureDrop. Journalists also must open and read documents downloaded from all manner of websites, from leaked or hacked email dumps, or from any number of other potentially untrustworthy sources.
Dangerzone aims to solve this problem. You can install Dangerzone on your Mac, Windows, or Linux computer, and then use it to open a variety of types of documents: PDFs, Microsoft Office or LibreOffice documents, or images. Even if the original document is dangerous and would normally hack your computer, Dangerzone will convert it into a safe PDF that you can open and read.
You can think of it like printing a document and then rescanning it to remove anything sketchy, except all done in software.
https://dangerzone.rocks/about.html
https://github.com/freedomofpress/dangerzone
#dangerzone #pdf
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π8π₯3
Attackers Can Use Electromagnetic Signals to Control Touchscreens Remotely
GhostTouch attack allows attackers to use electromagnetic signals to control touchscreen devices.
Researchers have demonstrated what they call the "first active contactless attack against capacitive touchscreens."
GhostTouch, as it's called, "uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it," a group of academics from Zhejiang University and Technical University of Darmstadt said in a new research paper.
The core idea is to take advantage of the electromagnetic signals to execute basic touch events such as taps and swipes into targeted locations of the touchscreen with the goal of taking over remote control and manipulating the underlying device.
The attack, which works from a distance of up to 40mm, hinges on the fact that capacitive touchscreens are sensitive to EMI, leveraging it to inject electromagnetic signals into transparent electrodes that are built into the touchscreen so as to register them as touch events.
https://thehackernews.com/2022/05/attackers-can-use-electromagnetic.html
#GhostTouch
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
GhostTouch attack allows attackers to use electromagnetic signals to control touchscreen devices.
Researchers have demonstrated what they call the "first active contactless attack against capacitive touchscreens."
GhostTouch, as it's called, "uses electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it," a group of academics from Zhejiang University and Technical University of Darmstadt said in a new research paper.
The core idea is to take advantage of the electromagnetic signals to execute basic touch events such as taps and swipes into targeted locations of the touchscreen with the goal of taking over remote control and manipulating the underlying device.
The attack, which works from a distance of up to 40mm, hinges on the fact that capacitive touchscreens are sensitive to EMI, leveraging it to inject electromagnetic signals into transparent electrodes that are built into the touchscreen so as to register them as touch events.
https://thehackernews.com/2022/05/attackers-can-use-electromagnetic.html
#GhostTouch
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π±5π1
Australian digital driving licenses can be defaced in minutes
Brute force attack leaves the license wide open for undetectable alteration, but back end data remains unchanged
An Australian digital driver's license (DDL) implementation that officials claimed is more secure than a physical license has been shown to easily defaced, but authorities insist the credential remains secure.
New South Wales, Australia's most populous state, launched its DDL program in 2019, and as of 2021 officials there said that slightly more than half of the state's eight million people use the "Service NSW" app that displays the DDL and offers access to many other government services.
Now, a security researcher at cybersecurity company Dvuln claims he was able to brute force his way into the app with nothing but a Python script and a consumer laptop. Once inside, he found numerous security flaws that made it simple to alter the DDL stored in the app.
https://www.theregister.com/2022/05/30/nsw_digital_drivers_licenses_hackable/
#australia #drivinglicense #attack #ddl
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Brute force attack leaves the license wide open for undetectable alteration, but back end data remains unchanged
An Australian digital driver's license (DDL) implementation that officials claimed is more secure than a physical license has been shown to easily defaced, but authorities insist the credential remains secure.
New South Wales, Australia's most populous state, launched its DDL program in 2019, and as of 2021 officials there said that slightly more than half of the state's eight million people use the "Service NSW" app that displays the DDL and offers access to many other government services.
Now, a security researcher at cybersecurity company Dvuln claims he was able to brute force his way into the app with nothing but a Python script and a consumer laptop. Once inside, he found numerous security flaws that made it simple to alter the DDL stored in the app.
https://www.theregister.com/2022/05/30/nsw_digital_drivers_licenses_hackable/
#australia #drivinglicense #attack #ddl
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
The Register
Australian digital driving licenses can be defaced in minutes
Brute force attack leaves the license wide open for undetectable alteration, but back end data remains unchanged
π7
Killing the Bear
Killing the Bear aims to centralize and compile and classify, in the simplest and most up-to-date way possible, all information concerning APTs and organized groups in general.
Using information from external sources and reports from researchers around the world, it extracts IOCs and other data of interest to help keep emerging threats in the spotlight.
All extracted IOCs are stored by target and date in AlienVault.
Parallel to this Gitbook, there is also a newsletter that I publish on my Linkedin for my entire network of contacts with the most up-to-date news and IOCs from my targets.
https://github.com/Ud0g-Py/Killing-The-Bear
#KillingTheBear #apt #tool
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Killing the Bear aims to centralize and compile and classify, in the simplest and most up-to-date way possible, all information concerning APTs and organized groups in general.
Using information from external sources and reports from researchers around the world, it extracts IOCs and other data of interest to help keep emerging threats in the spotlight.
All extracted IOCs are stored by target and date in AlienVault.
Parallel to this Gitbook, there is also a newsletter that I publish on my Linkedin for my entire network of contacts with the most up-to-date news and IOCs from my targets.
https://github.com/Ud0g-Py/Killing-The-Bear
#KillingTheBear #apt #tool
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
GitHub
GitHub - Ud0g-Py/Killing-The-Bear: Repository and archive for Killing The Bear Gitbook
Repository and archive for Killing The Bear Gitbook - Ud0g-Py/Killing-The-Bear
π1
Digital Forensics Fellowship
We are thrilled to launch the Digital Forensics Fellowship, a new programme that will run from July 2022 to May 2023 with a first cohort of 5 Fellows.
Amnesty Tech β a global collective of advocates, hackers, researchers, and technologists β is excited to announce the launch of the inaugural Digital Forensics Fellowship.
This innovative Fellowship is an opportunity for five human rights defenders (HRDs), researchers, or technologists from around the world to learn and work with Amnesty Tech's Security Lab to build skills and knowledge on advanced digital threats and forensics investigation techniques. This is a part-time Fellowship that will last 10 months and comes with a renumeration stipend.
https://careers.amnesty.org/vacancy/digital-forensics-fellowship-3390/3418/description/
#amnesty #digital #forensics #fellowship
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
We are thrilled to launch the Digital Forensics Fellowship, a new programme that will run from July 2022 to May 2023 with a first cohort of 5 Fellows.
Amnesty Tech β a global collective of advocates, hackers, researchers, and technologists β is excited to announce the launch of the inaugural Digital Forensics Fellowship.
This innovative Fellowship is an opportunity for five human rights defenders (HRDs), researchers, or technologists from around the world to learn and work with Amnesty Tech's Security Lab to build skills and knowledge on advanced digital threats and forensics investigation techniques. This is a part-time Fellowship that will last 10 months and comes with a renumeration stipend.
https://careers.amnesty.org/vacancy/digital-forensics-fellowship-3390/3418/description/
#amnesty #digital #forensics #fellowship
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π12π3π±2π₯1
We are experiencing a network-wide DDoS attempt
https://status.torproject.org/
#tor #ddos
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
https://status.torproject.org/
#tor #ddos
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
status.torproject.org
Tor Project status
We continuously monitor the status of our services and if there are any interruptions an update will be posted here. If you need to modify this page, follow the documentation (mirror).
π±19π1
Shanghai police database for sale in what could be Chinaβs biggest ever data breach
A database purportedly containing information about one billion Chinese residents has been listed for sale on Breach Forums for 10 Bitcoin, or approximately US$200,000.
Attracting 177 replies and 300,000 views within hours, the listing was posted a short time ago by an anonymous user named ChinaDan.
βIn 2022, the Shanghai National Police (SHGA) database was leaked. This database contains many terabytes of data and information on Billions of Chinese citizens,β said the post.
βDatabases contain information on 1 Billion Chinese national residents and several billion case records, including: name, address, birthplace, national ID Number, mobile number, all crime/case details.β
The seller has provided what he claims is a sample data set, with 750,000 files from the database. The sample data has been uploaded to the forumβs servers.
https://www.asiamarkets.com/shanghai-police-database-for-sale-in-what-could-be-chinas-biggest-ever-data-breach/
#ChinaDan
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
A database purportedly containing information about one billion Chinese residents has been listed for sale on Breach Forums for 10 Bitcoin, or approximately US$200,000.
Attracting 177 replies and 300,000 views within hours, the listing was posted a short time ago by an anonymous user named ChinaDan.
βIn 2022, the Shanghai National Police (SHGA) database was leaked. This database contains many terabytes of data and information on Billions of Chinese citizens,β said the post.
βDatabases contain information on 1 Billion Chinese national residents and several billion case records, including: name, address, birthplace, national ID Number, mobile number, all crime/case details.β
The seller has provided what he claims is a sample data set, with 750,000 files from the database. The sample data has been uploaded to the forumβs servers.
https://www.asiamarkets.com/shanghai-police-database-for-sale-in-what-could-be-chinas-biggest-ever-data-breach/
#ChinaDan
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Asia Markets
Shanghai police database for sale in what could be China's biggest ever data breach | Asia Markets
EXCLUSIVE: A database purportedly containing information on one billion Chinese national residents has been listed for sale on Breach Forums for US$200,000.
π±4π2
Media is too big
VIEW IN TELEGRAM
Decompiling Python Compiled Malware
Threat Researcher Charles Lomboni (@charleslomboni) shows a step by step guide on how to identify and decompile a malware written and compiled with Py2Exe, a Python Windows executable generator.
Charles also shows how to create a Yara rule to match the binary and how to ensure the binary is being caught by the Yara rule.
https://www.youtube.com/watch?v=2ahorISQcjo
#video #python #malware
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
Threat Researcher Charles Lomboni (@charleslomboni) shows a step by step guide on how to identify and decompile a malware written and compiled with Py2Exe, a Python Windows executable generator.
Charles also shows how to create a Yara rule to match the binary and how to ensure the binary is being caught by the Yara rule.
https://www.youtube.com/watch?v=2ahorISQcjo
#video #python #malware
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
Meta Hit With Massive Piracy Lawsuit Over Epidemic Sound Royalty-Free Music
Meta has been hit with a copyright infringement lawsuit demanding at least $142 million in damages. Epidemic Sound, a company that provides royalty-free music to YouTubers and other creators, claims that Meta hosts 94% of Epidemic's music in its own library, none of it licensed. According to Epidemic, this has resulted in billions of illegal views across Facebook and Instagram.
https://torrentfreak.com/meta-hit-with-massive-piracy-lawsuit-over-epidemic-sound-royalty-free-music-220721/
#meta #facebook #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Meta has been hit with a copyright infringement lawsuit demanding at least $142 million in damages. Epidemic Sound, a company that provides royalty-free music to YouTubers and other creators, claims that Meta hosts 94% of Epidemic's music in its own library, none of it licensed. According to Epidemic, this has resulted in billions of illegal views across Facebook and Instagram.
https://torrentfreak.com/meta-hit-with-massive-piracy-lawsuit-over-epidemic-sound-royalty-free-music-220721/
#meta #facebook #DeleteFacebook
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Torrentfreak
Meta Hit With Massive Piracy Lawsuit Over Epidemic Sound Royalty-Free Music * TorrentFreak
Epidemic Sound has hit Meta with a massive copyright lawsuit after its royalty-free content was hosted by Meta & viewed billions of times.
π1
Media is too big
VIEW IN TELEGRAM
Malware Theory - DLLs
In this video tutorial I will be teaching you about what a DLL is at a very high level. These concepts will be useful when reverse engineering or performing malware analaysis on DLL files.
https://www.youtube.com/watch?v=0OTYxOJAor4
#video #malware #dll
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
In this video tutorial I will be teaching you about what a DLL is at a very high level. These concepts will be useful when reverse engineering or performing malware analaysis on DLL files.
https://www.youtube.com/watch?v=0OTYxOJAor4
#video #malware #dll
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
π4β€1
Remember the PanamaPapers?
For six years the source #JohnDoe stayed silent. Now them is speaking up - in an exclusive interview
π Stay tunedβ¦ Friday, 11am CEST π
https://nitter.pussthecat.org/b_obermayer/status/1550133941386022912
via Twitter
#panamapapers
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
For six years the source #JohnDoe stayed silent. Now them is speaking up - in an exclusive interview
π Stay tunedβ¦ Friday, 11am CEST π
https://nitter.pussthecat.org/b_obermayer/status/1550133941386022912
via Twitter
#panamapapers
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π1
DuckDuckGo Tracker Blocklists
Web tracker blocklists used by DuckDuckGo apps and extensions. Blocklists are based on Tracker Radar data and updated monthly.
https://github.com/duckduckgo/tracker-blocklists
#ddg #tracker #blocklist
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Web tracker blocklists used by DuckDuckGo apps and extensions. Blocklists are based on Tracker Radar data and updated monthly.
https://github.com/duckduckgo/tracker-blocklists
#ddg #tracker #blocklist
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
GitHub
GitHub - duckduckgo/tracker-blocklists: Web tracker blocklists used by DuckDuckGo apps and extensions.
Web tracker blocklists used by DuckDuckGo apps and extensions. - duckduckgo/tracker-blocklists
β€1
Media is too big
VIEW IN TELEGRAM
Malware Theory - Bit Masking
In this video I will show you what bit masking is, and why it is important for malware analysis and reverse engineering.
https://www.youtube.com/watch?v=n4xs-X102ak
π watch as well - Malware Theory - DLLs π
https://t.iss.one/BlackBox_Archiv/2993
#malware #bitmasking #video
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
In this video I will show you what bit masking is, and why it is important for malware analysis and reverse engineering.
https://www.youtube.com/watch?v=n4xs-X102ak
π watch as well - Malware Theory - DLLs π
https://t.iss.one/BlackBox_Archiv/2993
#malware #bitmasking #video
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
BlackBox (Security) Archiv
Malware Theory - Bit Masking In this video I will show you what bit masking is, and why it is important for malware analysis and reverse engineering. https://www.youtube.com/watch?v=n4xs-X102ak π watch as well - Malware Theory - DLLs π https://t.iss.one/Blaβ¦
India Seeks to Oust China Firms From Sub-$150 Phone Market
Xiaomi, Realme and Transsion will be among those affected
India seeks to restrict Chinese smartphone makers from selling devices cheaper than 12,000 rupees ($150) to kickstart its faltering domestic industry, dealing a blow to brands including Xiaomi Corp.
The move is aimed at pushing Chinese giants out of the lower segment of the worldβs second-biggest mobile market, according to people familiar with the matter. It coincides with mounting concern about high-volume brands like Realme and Transsion undercutting local manufacturers, they said, asking not to be identified discussing a sensitive matter.
https://telegra.ph/India-Seeks-to-Oust-China-Firms-From-Sub-150-Phone-Market-08-09-2
via Bloomberg
#india #smartphones
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Xiaomi, Realme and Transsion will be among those affected
India seeks to restrict Chinese smartphone makers from selling devices cheaper than 12,000 rupees ($150) to kickstart its faltering domestic industry, dealing a blow to brands including Xiaomi Corp.
The move is aimed at pushing Chinese giants out of the lower segment of the worldβs second-biggest mobile market, according to people familiar with the matter. It coincides with mounting concern about high-volume brands like Realme and Transsion undercutting local manufacturers, they said, asking not to be identified discussing a sensitive matter.
https://telegra.ph/India-Seeks-to-Oust-China-Firms-From-Sub-150-Phone-Market-08-09-2
via Bloomberg
#india #smartphones
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
β€3π1π₯1
Rufus: Microsoft is blocking Windows ISO downloads (Fixed)
It appears that Microsoft has started to block Windows ISO downloads that originate from Rufus. Rufus is a popular open source tool to create bootable media.
Options to download Windows ISO images was introduced in Rufus 3.5, which the developer released in 2019. The ability to download Windows 8, Windows 10 and Windows 11 ISO images was a welcome feature addition, as it made the process of creating Windows boot media more comfortable.
The developer has added more features to Rufus in the meantime that improved the program for some Windows administrators and users significantly. Options to bypass Windows 11 system requirements during Inplace upgrades and to create local accounts instead of Microsoft accounts, and to deny privacy questions outright, were added in 2022.
Downloads are powered by the Fido script in Rufus, and this worked fine ever since the functionality was introduced. The script pulled download information from Microsoft servers and downloads were provided by Microsoft.
Now, Rufus users are receiving error messages on attempts to download Windows 8, 10 or 11 using Rufus.
https://www.ghacks.net/2022/08/13/rufus-microsoft-is-blocking-windows-iso-downloads/
#rufus #microsoft
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
It appears that Microsoft has started to block Windows ISO downloads that originate from Rufus. Rufus is a popular open source tool to create bootable media.
Options to download Windows ISO images was introduced in Rufus 3.5, which the developer released in 2019. The ability to download Windows 8, Windows 10 and Windows 11 ISO images was a welcome feature addition, as it made the process of creating Windows boot media more comfortable.
The developer has added more features to Rufus in the meantime that improved the program for some Windows administrators and users significantly. Options to bypass Windows 11 system requirements during Inplace upgrades and to create local accounts instead of Microsoft accounts, and to deny privacy questions outright, were added in 2022.
Downloads are powered by the Fido script in Rufus, and this worked fine ever since the functionality was introduced. The script pulled download information from Microsoft servers and downloads were provided by Microsoft.
Now, Rufus users are receiving error messages on attempts to download Windows 8, 10 or 11 using Rufus.
https://www.ghacks.net/2022/08/13/rufus-microsoft-is-blocking-windows-iso-downloads/
#rufus #microsoft
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
ghacks.net
Rufus: Microsoft is blocking Windows ISO downloads
It appears that Microsoft has started to block Windows ISO downloads that originate from Rufus.
π3π±3
The FTC takes aim at commercial surveillance
The biggest fallacy in the online privacy wars is that there is a difference between "state surveillance" and "commercial surveillance." Bizarrely, it's a fallacy that is widely held by both government snoops and Big Tech snoops.
Many's the time I've spoken to a DC audience about privacy, only to have an audience member say, "I'm OK with Uncle Sam spying on me β after all, I've already given up every sensitive scrap of information about my personal life to the Office of Personnel Management when I applied for security clearance. But I don't want my money going to Google β those bastards would sell their mothers out for a nickle."
https://pluralistic.net/2022/08/12/regulatory-uncapture/#conscious-uncoupling
#surveillance
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
The biggest fallacy in the online privacy wars is that there is a difference between "state surveillance" and "commercial surveillance." Bizarrely, it's a fallacy that is widely held by both government snoops and Big Tech snoops.
Many's the time I've spoken to a DC audience about privacy, only to have an audience member say, "I'm OK with Uncle Sam spying on me β after all, I've already given up every sensitive scrap of information about my personal life to the Office of Personnel Management when I applied for security clearance. But I don't want my money going to Google β those bastards would sell their mothers out for a nickle."
https://pluralistic.net/2022/08/12/regulatory-uncapture/#conscious-uncoupling
#surveillance
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Ransomware Summit 2022
Talks from the SANS Ransomware Summit 2022 security conference, which took place in July, are now available on YouTube
https://www.youtube.com/playlist?list=PLtgaAEEmVe6AGQj2LhA4UnN0XolmeYw9_
#ransomware #video
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
Talks from the SANS Ransomware Summit 2022 security conference, which took place in July, are now available on YouTube
https://www.youtube.com/playlist?list=PLtgaAEEmVe6AGQj2LhA4UnN0XolmeYw9_
#ransomware #video
π₯@cRyPtHoN_INFOSEC_IT
π₯@cRyPtHoN_INFOSEC_FR
π₯@cRyPtHoN_INFOSEC_EN
π₯@cRyPtHoN_INFOSEC_DE
π₯@BlackBox_Archiv
More Evil Markets
Take a sneak peek into the world of criminal markets, how they look on the inside, and how traders advertise and sell unauthorized access to organizations.
From ransomware operators like #LockBit and #BlackBasta to #APTs striking for or against Russian or Chinese interests, threat actors of various stripes all need one thing to get their operations off the ground: initial access to an organizationβs network.
Such access can be bought on a variety of trading forums from cyber criminals who specialize in running low-risk phishing campaigns and credential theft operations, or in scanning enterprise networks for known remote code execution (RCE) #software #vulnerabilities.
Because of the ease with which initial access can now be obtained thanks to poor patch management and lax controls over identity and user credentials, there exists a market where supply is outstripping demand, and vendors involved in selling initial access are lowering their prices in a race to the bottom, making it easier than ever before for threat actors to compromise organizations of all sizes and kinds.
In this post, we reveal what these marketplaces look like from the inside, exposing the ways these traders advertise and sell unauthorized access to organizations.
https://www.sentinelone.com/blog/more-evil-markets-how-its-never-been-easier-to-buy-initial-access-to-compromised-networks/
#criminal #markets
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
Take a sneak peek into the world of criminal markets, how they look on the inside, and how traders advertise and sell unauthorized access to organizations.
From ransomware operators like #LockBit and #BlackBasta to #APTs striking for or against Russian or Chinese interests, threat actors of various stripes all need one thing to get their operations off the ground: initial access to an organizationβs network.
Such access can be bought on a variety of trading forums from cyber criminals who specialize in running low-risk phishing campaigns and credential theft operations, or in scanning enterprise networks for known remote code execution (RCE) #software #vulnerabilities.
Because of the ease with which initial access can now be obtained thanks to poor patch management and lax controls over identity and user credentials, there exists a market where supply is outstripping demand, and vendors involved in selling initial access are lowering their prices in a race to the bottom, making it easier than ever before for threat actors to compromise organizations of all sizes and kinds.
In this post, we reveal what these marketplaces look like from the inside, exposing the ways these traders advertise and sell unauthorized access to organizations.
https://www.sentinelone.com/blog/more-evil-markets-how-its-never-been-easier-to-buy-initial-access-to-compromised-networks/
#criminal #markets
π‘@cRyPtHoN_INFOSEC_IT
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
SentinelOne
What Are Initial Access Brokers? β A Comprehensive Guide 101
Discover what initial access brokers are, their role in the cybercrime ecosystem, and how they facilitate unauthorized access to compromised networks.
π1