Check out what online companies know about you
https://clario.co/blog/which-company-uses-most-data/
#bigdata #DeleteFacebook #DeleteMeta
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://clario.co/blog/which-company-uses-most-data/
#bigdata #DeleteFacebook #DeleteMeta
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Legitimate SaaS Platforms Being Used to Host Phishing Attacks
Executive Summary
Instead of creating phishing pages from scratch, more and more cybercriminals are now abusing legitimate software-as-a-service (SaaS) platforms, including various website builders or form builders, to host their phishing pages. Since these URLs are hosted on legitimate domains, they can be especially difficult for many phishing detection engines to detect. Furthermore, these platforms typically require little to no coding experience, significantly lowering the barrier to entry for creating and launching phishing attacks.
From the beginning of 2020 to June 2022, Palo Alto Networks analyzed the URLs detected by our Advanced URL Filtering service, and discovered that the number of phishing URLs hosted on legitimate SaaS platforms has continued to increase at an alarming rate. In fact, from June 2021-June 2022, the rate of newly detected phishing URLs hosted on legitimate SaaS platforms has increased over 1100%.
The Palo Alto Networks Advanced URL Filtering uses deep learning to analyze the content of each webpage at the URL level instead of the domain level. Customers with an Advanced URL Filtering subscription therefore receive protections from these platform-abuse phishing attacks.
Table of Contents
- Introduction to Platform-Abuse Phishing Attacks
- Methodology
- Results: Platform-Abuse Phishing Is on the Rise
- Platform-Abuse Phishing Case Studies
- Conclusion
- Acknowledgements
https://unit42.paloaltonetworks.com/platform-abuse-phishing/
#phishing
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Executive Summary
Instead of creating phishing pages from scratch, more and more cybercriminals are now abusing legitimate software-as-a-service (SaaS) platforms, including various website builders or form builders, to host their phishing pages. Since these URLs are hosted on legitimate domains, they can be especially difficult for many phishing detection engines to detect. Furthermore, these platforms typically require little to no coding experience, significantly lowering the barrier to entry for creating and launching phishing attacks.
From the beginning of 2020 to June 2022, Palo Alto Networks analyzed the URLs detected by our Advanced URL Filtering service, and discovered that the number of phishing URLs hosted on legitimate SaaS platforms has continued to increase at an alarming rate. In fact, from June 2021-June 2022, the rate of newly detected phishing URLs hosted on legitimate SaaS platforms has increased over 1100%.
The Palo Alto Networks Advanced URL Filtering uses deep learning to analyze the content of each webpage at the URL level instead of the domain level. Customers with an Advanced URL Filtering subscription therefore receive protections from these platform-abuse phishing attacks.
Table of Contents
- Introduction to Platform-Abuse Phishing Attacks
- Methodology
- Results: Platform-Abuse Phishing Is on the Rise
- Platform-Abuse Phishing Case Studies
- Conclusion
- Acknowledgements
https://unit42.paloaltonetworks.com/platform-abuse-phishing/
#phishing
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Unit 42
Legitimate SaaS Platforms Being Used to Host Phishing Attacks
Platform-abuse phishing is on the rise. We analyze how attackers use services such as website builders to host phishing pages.
๐1
In wake of EPIC data breach - Samsung forcing users to accept T&Cs or risk their data
Users attempting to take sensible precautions after a recent spate of data breaches at Korean techmonger, Samsung, are being forced to accept updated terms and conditions in order to do so.
Samsung has fallen prey to two data breaches in 2022 to date. The first orchestrated by the notorious Lapsus$ group, saw 190GB of data exfiltrated from the company, and included algorithms for all biometric unlocking operations, source code for the bootloader for newer Samsung products, and all the source code behind the process of authorizing and authenticating Samsung accounts.
The second affected users directly and saw Samsung wait a month before notifying customers that a huge trove of personally identifying information was now in the hands of criminals.
While the understated press release from Samsung reassured customers that there was no need for panic, prudent users - perhaps alarmed at Samsungโs lack of alarm - immediately logged into their Samsung account to change their password.
Many users create a Samsung account when they buy their phones and then immediately forget about it. Some read the terms and conditions, and some donโt. You should always read the terms and conditions.
And if you created your account before September 2021, Samsung is under no obligation to notify you when those terms change - unless you attempt to log into your online account, that is.
Samsungโs terms and conditions were last updated on 30 September 2021, in a change that went largely unnoticed by everyone.
While itโs technically possible to request a password reset without logging in and accepting the updated terms and conditions, you do need to accept them in order to access other security features of your Samsung account.
https://thecrow.uk/in-wake-of-epic-data-breach-samsung-forcing-users-to-accept-new-terms-or-risk-their-data/
#samsung #breach
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Users attempting to take sensible precautions after a recent spate of data breaches at Korean techmonger, Samsung, are being forced to accept updated terms and conditions in order to do so.
Samsung has fallen prey to two data breaches in 2022 to date. The first orchestrated by the notorious Lapsus$ group, saw 190GB of data exfiltrated from the company, and included algorithms for all biometric unlocking operations, source code for the bootloader for newer Samsung products, and all the source code behind the process of authorizing and authenticating Samsung accounts.
The second affected users directly and saw Samsung wait a month before notifying customers that a huge trove of personally identifying information was now in the hands of criminals.
While the understated press release from Samsung reassured customers that there was no need for panic, prudent users - perhaps alarmed at Samsungโs lack of alarm - immediately logged into their Samsung account to change their password.
Many users create a Samsung account when they buy their phones and then immediately forget about it. Some read the terms and conditions, and some donโt. You should always read the terms and conditions.
And if you created your account before September 2021, Samsung is under no obligation to notify you when those terms change - unless you attempt to log into your online account, that is.
Samsungโs terms and conditions were last updated on 30 September 2021, in a change that went largely unnoticed by everyone.
While itโs technically possible to request a password reset without logging in and accepting the updated terms and conditions, you do need to accept them in order to access other security features of your Samsung account.
https://thecrow.uk/in-wake-of-epic-data-breach-samsung-forcing-users-to-accept-new-terms-or-risk-their-data/
#samsung #breach
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The Crow
In wake of EPIC data breach - Samsung forcing users to accept T&Cs or risk their data
Whether or not Samsungโs updated terms affect you, youโll have to accept them in order to get the reassurance that no-one has logged into your Samsung account, and is currently monitoring your whereabouts using the โfind my deviceโ feature, checking out yourโฆ
๐1
Kiwi Farms all but finished after bill comes due for years of trolling and harassment
Thereโs an old saying, โYou play with the bull, you get the horns.โ One of the most noxious corners of the tubes learned that the hard way this weekend. Kiwi Farms, a message board notorious for vicious and criminal harassment of vulnerable peopleโespecially trans peopleโwas essentially driven out of existence over the weekend. In the wake of heightened scrutiny over Kiwi Farmsโ tactics, multiple companies cut ties with the site, rendering it all but inaccessible.
The beginning of the end came when Cloudflare, which protected Kiwi Farms from DDoS attacks, dropped Kiwi Farms (diaried here) after increasingly threatening posts led Cloudflare to reverse its initial decision to continue working with the site. In the last 24 hours, multiple companies, including its replacement DDoS protector, cut ties with the site as well. It as been offline since late Sunday night/early Monday morning, and the siteโs founder and administrator suggests it may be awhile before it comes backโif it does come back.
https://www.dailykos.com/stories/2022/9/5/2120881/-Kiwi-Farms-all-but-finished-after-bill-comes-due-for-years-of-trolling-and-harassment
#kiwifarms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Thereโs an old saying, โYou play with the bull, you get the horns.โ One of the most noxious corners of the tubes learned that the hard way this weekend. Kiwi Farms, a message board notorious for vicious and criminal harassment of vulnerable peopleโespecially trans peopleโwas essentially driven out of existence over the weekend. In the wake of heightened scrutiny over Kiwi Farmsโ tactics, multiple companies cut ties with the site, rendering it all but inaccessible.
The beginning of the end came when Cloudflare, which protected Kiwi Farms from DDoS attacks, dropped Kiwi Farms (diaried here) after increasingly threatening posts led Cloudflare to reverse its initial decision to continue working with the site. In the last 24 hours, multiple companies, including its replacement DDoS protector, cut ties with the site as well. It as been offline since late Sunday night/early Monday morning, and the siteโs founder and administrator suggests it may be awhile before it comes backโif it does come back.
https://www.dailykos.com/stories/2022/9/5/2120881/-Kiwi-Farms-all-but-finished-after-bill-comes-due-for-years-of-trolling-and-harassment
#kiwifarms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Daily Kos
How hate site KiwiFarms finally fell, after years of trolling and harassing marginalized people
Thereโs an old saying: โYou play with the bull, you get the horns.โ The users and leadership of one of the most noxious corners of the internet learned that the hard way this weekend. KiwiFarms, a message board notorious for vicious and criminal...
๐10๐ฅ2
CSharp PoC for transacted hollowing
https://github.com/daem0nc0re/TangledWinExec/commit/f898bf157ad993f900985d78b8d8fdc22df0163c
#CSharp #poc #hollowing
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://github.com/daem0nc0re/TangledWinExec/commit/f898bf157ad993f900985d78b8d8fdc22df0163c
#CSharp #poc #hollowing
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
GitHub
Added Transacted Hollowing ยท daem0nc0re/TangledWinExec@f898bf1
PoCs and tools for investigation of Windows process execution techniques - Added Transacted Hollowing ยท daem0nc0re/TangledWinExec@f898bf1
ctpot_usec2022.pdf
735.9 KB
Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots
https://www.securitee.org/files/ctpot_usec2022.pdf
#pdf #bots
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://www.securitee.org/files/ctpot_usec2022.pdf
#pdf #bots
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
We won. Kiwi Farms is dead
https://nitter.pussthecat.org/keffals/status/1566921249036681217
via Twitter
#DropKiwifarms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://nitter.pussthecat.org/keffals/status/1566921249036681217
via Twitter
#DropKiwifarms
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐21๐10
Inside the Windows Cache Manager
The cache is an integral part of the operating system and its hybrid kernel. Roughly speaking, it's just a virtual memory region in the kernel address space, on which the Cache Manager maps file data to provide quick access to them in the future. This access is frequently used by the File System Driver (FSD) or the Windows Memory Manager (VMM). Instead of reading file data from disk every time a user or system needs to access to it, the OS kernel calls the Cache Manager in an attempt to get this data from memory. In turn, the Cache Manager is a set of function in the kernel executable file ntoskrnl.exe, which starts with a prefix Cc. These functions are private, so to get to their names, you need to configure the symbol server settings in WinDbg or IDA.
Learning the Windows Cache Manager is quite a difficult task for beginners. This Windows kernel subsystem is closely related to the VMM, so if you don't have enough knowledge in it, try to understand the basic concepts without going into complicated technical aspects. In addition, you should have some knowledge in the field of file system drivers (FSD), because they are the most frequent clients of the Cache Manager. It's worth to note that the cache concept exists only at the level of file system, lower drivers on the device stack like the volume manager, partition manager, disk driver, and disk port driver don't use it.
https://www.linkedin.com/pulse/inside-windows-cache-manager-artem-baranov
#windows #cachemanager
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The cache is an integral part of the operating system and its hybrid kernel. Roughly speaking, it's just a virtual memory region in the kernel address space, on which the Cache Manager maps file data to provide quick access to them in the future. This access is frequently used by the File System Driver (FSD) or the Windows Memory Manager (VMM). Instead of reading file data from disk every time a user or system needs to access to it, the OS kernel calls the Cache Manager in an attempt to get this data from memory. In turn, the Cache Manager is a set of function in the kernel executable file ntoskrnl.exe, which starts with a prefix Cc. These functions are private, so to get to their names, you need to configure the symbol server settings in WinDbg or IDA.
Learning the Windows Cache Manager is quite a difficult task for beginners. This Windows kernel subsystem is closely related to the VMM, so if you don't have enough knowledge in it, try to understand the basic concepts without going into complicated technical aspects. In addition, you should have some knowledge in the field of file system drivers (FSD), because they are the most frequent clients of the Cache Manager. It's worth to note that the cache concept exists only at the level of file system, lower drivers on the device stack like the volume manager, partition manager, disk driver, and disk port driver don't use it.
https://www.linkedin.com/pulse/inside-windows-cache-manager-artem-baranov
#windows #cachemanager
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Linkedin
Inside the Windows Cache Manager
Introduction The cache is an integral part of the operating system and its hybrid kernel. Roughly speaking, it's just a virtual memory region in the kernel address space, on which the Cache Manager maps file data to provide quick access to them in the future.
๐1
Encrypted app Signal just hired one of Big Techโs sharpest critics
Meredith Whittaker, the former Google manager, is Signalโs first president. She is out to convince users to pay for the free app.
Signal has hired Meredith Whittaker, a former Google manager who has been outspoken about the harms of Big Tech, as its first president, adding to the roster of tech critics leading the encrypted messaging app.
In the crowded market for messaging apps, Signal stands apart. Itโs committed to encryption in an industry built on collecting personal data. Itโs run by a nonprofit but competes against WhatsApp and iMessage, backed by some of the richest companies in the world, Facebook parent Meta and Apple.
As president, Whittaker will help guide strategy, communications and policy. In an interview, she said she plans to focus on sustaining Signal, which hopes to support itself with small donations from millions of users. Signal announced her new role Monday at an event in Berlin.
...(...)
"An alternative to data collection only exists if the community of people who rely on it โkick in a little bit." (Meredith Whittaker)
https://www.washingtonpost.com/technology/2022/09/06/signal-meredith-whittaker/
#signal #messenger
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Meredith Whittaker, the former Google manager, is Signalโs first president. She is out to convince users to pay for the free app.
Signal has hired Meredith Whittaker, a former Google manager who has been outspoken about the harms of Big Tech, as its first president, adding to the roster of tech critics leading the encrypted messaging app.
In the crowded market for messaging apps, Signal stands apart. Itโs committed to encryption in an industry built on collecting personal data. Itโs run by a nonprofit but competes against WhatsApp and iMessage, backed by some of the richest companies in the world, Facebook parent Meta and Apple.
As president, Whittaker will help guide strategy, communications and policy. In an interview, she said she plans to focus on sustaining Signal, which hopes to support itself with small donations from millions of users. Signal announced her new role Monday at an event in Berlin.
...(...)
"An alternative to data collection only exists if the community of people who rely on it โkick in a little bit." (Meredith Whittaker)
https://www.washingtonpost.com/technology/2022/09/06/signal-meredith-whittaker/
#signal #messenger
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐9๐3๐ฑ2
New EU law amplifies risks of state over-reach and mass surveillance
The EDRi network published its position paper on the proposed Regulation on automated data exchange for police cooperation (โPrรผm IIโ). The European Commissionโs Prรผm II proposal fails to put in place vital safeguards designed to protect all of us from state overreach and authoritarian mass surveillance practices. In the worst case scenario, we may no longer be able to walk freely on our streets as the new law would treat large parts of the population as a criminal before proven otherwise.
https://edri.org/our-work/new-eu-law-amplifies-risks-of-state-over-reach-and-mass-surveillance/
#surveillance #edri
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The EDRi network published its position paper on the proposed Regulation on automated data exchange for police cooperation (โPrรผm IIโ). The European Commissionโs Prรผm II proposal fails to put in place vital safeguards designed to protect all of us from state overreach and authoritarian mass surveillance practices. In the worst case scenario, we may no longer be able to walk freely on our streets as the new law would treat large parts of the population as a criminal before proven otherwise.
https://edri.org/our-work/new-eu-law-amplifies-risks-of-state-over-reach-and-mass-surveillance/
#surveillance #edri
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
European Digital Rights (EDRi)
New EU law amplifies risks of state over-reach and mass surveillance
๐จOUT NOW: @edri's new paper flags high risks of over-policing in new EU law #PrumII. @EU_Commission Prรผm II proposal threatens to create a EU-wide facial recognition system, providing NO safeguards for people from state overreach & #MassSurveillance. Readโฆ
Media is too big
VIEW IN TELEGRAM
Trans activist celebrates rare victory against online trolls after Kiwi Farms deplatforming
Belfast, Northern Ireland (CNN Business) Clara Sorrenti, a trans activist who was forced to flee her home in Canada after users of a hate-filled website targeted her, has succeeded in her campaign to get the site taken offline, for now.
https://edition.cnn.com/2022/09/06/tech/kiwi-farms-clara-sorrenti-keffals/index.html
๐ก Read as well:
- We won. Kiwi Farms is dead
- Kiwi Farms all but finished after bill comes due for years of trolling and harassment
#DropKiwifarms #video
๐ฅ@cRyPtHoN_INFOSEC_IT
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
Belfast, Northern Ireland (CNN Business) Clara Sorrenti, a trans activist who was forced to flee her home in Canada after users of a hate-filled website targeted her, has succeeded in her campaign to get the site taken offline, for now.
https://edition.cnn.com/2022/09/06/tech/kiwi-farms-clara-sorrenti-keffals/index.html
๐ก Read as well:
- We won. Kiwi Farms is dead
- Kiwi Farms all but finished after bill comes due for years of trolling and harassment
#DropKiwifarms #video
๐ฅ@cRyPtHoN_INFOSEC_IT
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
๐23โค7
InterContinental Hotels Group PLC - Unauthorised access to technology systems
InterContinental Hotels Group PLC (IHG or the Company) reports that parts of the Company's technology systems have been subject to unauthorised activity. IHG's booking channels and other applications have been significantly disrupted since yesterday, and this is ongoing.
IHG has implemented its response plans, is notifying relevant regulatory authorities and is working closely with its technology suppliers. External specialists have also been engaged to investigate the incident.
IHG is working to fully restore all systems as soon as possible and to assess the nature, extent and impact of the incident. We will be supporting hotel owners and operators as part of our response to the ongoing service disruption. IHG's hotels are still able to operate and to take reservations directly.
A further update will be provided as and when appropriate.
https://www.londonstockexchange.com/news-article/IHG/unauthorised-access-to-technology-systems/15617013
#ihg #breach
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
InterContinental Hotels Group PLC (IHG or the Company) reports that parts of the Company's technology systems have been subject to unauthorised activity. IHG's booking channels and other applications have been significantly disrupted since yesterday, and this is ongoing.
IHG has implemented its response plans, is notifying relevant regulatory authorities and is working closely with its technology suppliers. External specialists have also been engaged to investigate the incident.
IHG is working to fully restore all systems as soon as possible and to assess the nature, extent and impact of the incident. We will be supporting hotel owners and operators as part of our response to the ongoing service disruption. IHG's hotels are still able to operate and to take reservations directly.
A further update will be provided as and when appropriate.
https://www.londonstockexchange.com/news-article/IHG/unauthorised-access-to-technology-systems/15617013
#ihg #breach
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Londonstockexchange
London Stock Exchange | London Stock Exchange
null
About Detection Engineering
In recent months Iโve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this topic in a short blog post.
This blog post tries to cover all possible purposes of detection engineering to develop a broad definition of the term, excluding only a few borderline areas.
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
#detection #engineering
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
In recent months Iโve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this topic in a short blog post.
This blog post tries to cover all possible purposes of detection engineering to develop a broad definition of the term, excluding only a few borderline areas.
https://cyb3rops.medium.com/about-detection-engineering-44d39e0755f0
#detection #engineering
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Medium
About Detection Engineering
In recent months Iโve noticed several attempts to define the term detection engineering and thought I should share my thoughts on thisโฆ
Don't miss out on the first-ever #ColourOfSurveillanceEurope Conference
#edri #dff #bitsoffreedom and #CntrleAltDlt are organising the conference in Amsterdam on 15-16 Sept.
๐ You can follow our Day 1 discussion LIVE here: ๐
https://edri.org/take-action/events/call-for-proposals-colour-of-surveillance-europe-conference-15-16-september-2022/
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
#edri #dff #bitsoffreedom and #CntrleAltDlt are organising the conference in Amsterdam on 15-16 Sept.
๐ You can follow our Day 1 discussion LIVE here: ๐
https://edri.org/take-action/events/call-for-proposals-colour-of-surveillance-europe-conference-15-16-september-2022/
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐7๐6
Twitter whistleblower reveals employees concerned China agent could collect user data
Sept 13 (Reuters) - The FBI informed Twitter Inc (TWTR.N) of at least one Chinese agent working at the company, U.S. Senator Chuck Grassley said during a Senate hearing on Tuesday where a whistleblower testified, raising new concerns about foreign meddling at the influential social media platform.
Peiter "Mudge" Zatko, a famed hacker who served as Twitter's head of security until his firing in January, said some Twitter employees were concerned the Chinese government would be able to collect data on the company's users.
Twitter has come under fire previously for lax security, most notably in 2020 when teenage hackers seized control of dozens of high-profile accounts, including the verified profile of former U.S. President Barack Obama.
On Tuesday, Zatko's testimony before the Senate Judiciary Committee revealed Twitter's security issues could be far more serious, alleging for the first time that the company was informed of agents of the Chinese government working at the social media firm.
https://www.reuters.com/legal/twitter-whistleblower-detail-dire-security-threats-ahead-musk-deal-vote-2022-09-13/
#twitter
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Sept 13 (Reuters) - The FBI informed Twitter Inc (TWTR.N) of at least one Chinese agent working at the company, U.S. Senator Chuck Grassley said during a Senate hearing on Tuesday where a whistleblower testified, raising new concerns about foreign meddling at the influential social media platform.
Peiter "Mudge" Zatko, a famed hacker who served as Twitter's head of security until his firing in January, said some Twitter employees were concerned the Chinese government would be able to collect data on the company's users.
Twitter has come under fire previously for lax security, most notably in 2020 when teenage hackers seized control of dozens of high-profile accounts, including the verified profile of former U.S. President Barack Obama.
On Tuesday, Zatko's testimony before the Senate Judiciary Committee revealed Twitter's security issues could be far more serious, alleging for the first time that the company was informed of agents of the Chinese government working at the social media firm.
https://www.reuters.com/legal/twitter-whistleblower-detail-dire-security-threats-ahead-musk-deal-vote-2022-09-13/
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Reuters
Twitter whistleblower reveals employees concerned China agent could collect user data
The FBI informed Twitter Inc of at least one Chinese agent working at the company, U.S. Senator Chuck Grassley said during a Senate hearing on Tuesday where a whistleblower testified, raising new concerns about foreign meddling at the influential social mediaโฆ
๐ฅ3๐2๐ฑ1
About 50,000 user credentials of Indonesia's largest cryptocurrency exchange "INDODAX" were leaked to the dark web by stealer malware. Of these, 82.7% are the credentials of Indonesian users.
https://nitter.pussthecat.org/darktracer_int/status/1569969935593664512
via Twitter
#leak #indonesia #indodax
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
https://nitter.pussthecat.org/darktracer_int/status/1569969935593664512
via Twitter
#leak #indonesia #indodax
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ฑ3๐1
hackback2.webm.webm
18.5 MB
Estado Mayor Conjunto de las Fuerza Armadas de Chile
Nearly 400,000 emails hacked by Guacamaya from the Estado Mayor Conjunto de las Fuerza Armadas de Chile (Joint Chiefs of Staff of the Chilean Armed Forces), who advise the Ministro de Defensa de Chile (Minister of Defense). They're responsible for seeing that the Directorates and Departments are properly handled for personnel, intelligence, operations and logistics.
The emails cache spans over five years, offering the most detailed looks at the leadership, operations and interests of the Chilean military.
This is the first release in a new series from Guacamaya - Fuerzas Represivas. Later Fuerzas Represivas releases will include police and military data from Mexico, Peru, Salvador, Chile, Colombia
https://enlacehacktivista.org/comunicado_guacamaya4.txt
https://ddosecrets.com/wiki/Estado_Mayor_Conjunto_de_las_Fuerza_Armadas_de_Chile
#guacamaya
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Nearly 400,000 emails hacked by Guacamaya from the Estado Mayor Conjunto de las Fuerza Armadas de Chile (Joint Chiefs of Staff of the Chilean Armed Forces), who advise the Ministro de Defensa de Chile (Minister of Defense). They're responsible for seeing that the Directorates and Departments are properly handled for personnel, intelligence, operations and logistics.
The emails cache spans over five years, offering the most detailed looks at the leadership, operations and interests of the Chilean military.
This is the first release in a new series from Guacamaya - Fuerzas Represivas. Later Fuerzas Represivas releases will include police and military data from Mexico, Peru, Salvador, Chile, Colombia
https://enlacehacktivista.org/comunicado_guacamaya4.txt
https://ddosecrets.com/wiki/Estado_Mayor_Conjunto_de_las_Fuerza_Armadas_de_Chile
#guacamaya
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐3๐1
CTIVD+NR74+Toezichtsrapport+ENG.pdf
1.2 MB
Publication review report 74 regarding automated OSINT by the AIVD and MIVD
The CTIVD investigated the use of automated Open Source Intelligence (OSINT) by the General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD).
The report was published in Dutch on 8 February 2022. A summary of the report was already published in English.
Today, the CTIVD releases the full report in English.
#osint #pdf
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
The CTIVD investigated the use of automated Open Source Intelligence (OSINT) by the General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD).
The report was published in Dutch on 8 February 2022. A summary of the report was already published in English.
Today, the CTIVD releases the full report in English.
#osint #pdf
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐1๐1
Americaโs Open Wound - The CIA is not your friend
โBetter that right counsels be known to enemies than that the evil secrets of tyrants should be concealed from the citizens. They who can treat secretly of the affairs of a nation have it absolutely under their authority; and as they plot against the enemy in time of war, so do they against the citizens in time of peace.โ
โ Baruch Spinoza
It hasnโt been a month since President Biden mounted the steps of Philadelphiaโs Independence Hall, declaring it his duty to ensure each of us understands the central faction of his political opposition are extremists that โthreaten the very foundations of our Republic.โ Flanked by the uniformed icons of his military and standing atop a Leni Riefenstahl stage, the leader clenched his fists to illustrate seizing the future from the forces of โfear, division, and darkness.โ The words falling from the teleprompter ran rich with the language of violence, a โdagger at the throatโ emerging from the โshadow of lies.โ
โWhatโs happening in our country,โ the President said, โis not normal.โ
Is he wrong to think that? The question the speech intended to raiseโthe one lost in the unintentionally villainous pageantryโis whether and how we are to continue as a democracy and a nation of laws. For all the Twitter arguments over Bidenโs propositions, there has been little consideration of his premises.
Democracy and the rule of law have been so frequently invoked as a part of the American political brand that we simply take it for granted that we enjoy both.
Are we right to think that?
https://edwardsnowden.substack.com/p/americas-open-wound
#snowden
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
โBetter that right counsels be known to enemies than that the evil secrets of tyrants should be concealed from the citizens. They who can treat secretly of the affairs of a nation have it absolutely under their authority; and as they plot against the enemy in time of war, so do they against the citizens in time of peace.โ
โ Baruch Spinoza
It hasnโt been a month since President Biden mounted the steps of Philadelphiaโs Independence Hall, declaring it his duty to ensure each of us understands the central faction of his political opposition are extremists that โthreaten the very foundations of our Republic.โ Flanked by the uniformed icons of his military and standing atop a Leni Riefenstahl stage, the leader clenched his fists to illustrate seizing the future from the forces of โfear, division, and darkness.โ The words falling from the teleprompter ran rich with the language of violence, a โdagger at the throatโ emerging from the โshadow of lies.โ
โWhatโs happening in our country,โ the President said, โis not normal.โ
Is he wrong to think that? The question the speech intended to raiseโthe one lost in the unintentionally villainous pageantryโis whether and how we are to continue as a democracy and a nation of laws. For all the Twitter arguments over Bidenโs propositions, there has been little consideration of his premises.
Democracy and the rule of law have been so frequently invoked as a part of the American political brand that we simply take it for granted that we enjoy both.
Are we right to think that?
https://edwardsnowden.substack.com/p/americas-open-wound
#snowden
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Substack
Americaโs Open Wound
The CIA is not your friend
๐5๐1
This media is not supported in your browser
VIEW IN TELEGRAM
Greetings Citizens of the Iran
This is a message from #Anonymous to all #Iran.
We are here and we are with you!
#OpIran Engaged. Expect Us!
๐ก Read as well
https://justpaste.it/2klw1
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
This is a message from #Anonymous to all #Iran.
We are here and we are with you!
#OpIran Engaged. Expect Us!
๐ก Read as well
https://justpaste.it/2klw1
๐ก@cRyPtHoN_INFOSEC_IT
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐15โค7
This media is not supported in your browser
VIEW IN TELEGRAM
๐22๐ฅ3๐2