BlackBox (Security) Archiv
4.07K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
These are the 37 Senators that voted to let the FBI seize your internet history without a warrant

A key amendment to the USA Freedom Reauthorization Act of 2020 that would have required authorities to obtain a warrant before gaining access to American internet browsing and search history just failed on the Senate floor by a single vote. For those that are unaware, key parts of the Patriot Act โ€“ namely the mass surveillance section โ€“ is currently unauthorized and needs to be reauthorized by Congress to stay in effect.

The current bill under consideration to do that is called the US FREEDOM Reauthorization Act of 2020 and Senate Majority Leader Mitch McConnell has snuck in an amendment that would allow the Federal Bureau of Investigation (FBI) and Department of Justice (DOJ) to seize internet search and browsing history if they claim it is tied to an active investigation. To try and stop this, Senators Wyden and Daines introduced their own amendment that would stop the FBI from being able to get that information without a warrant โ€“ as makes sense. That amendment needed 60 votes to pass, and only received 59 Wednesday afternoon.

37 Senators voted against an amendment that would have stopped the FBI from being able to seize your internet search and browsing history

All in all, 27 Republicans and 10 Democrats voted against the amendment and 4 senators were no-shows. One of the senators that didnโ€™t vote is under self quarantine due to a staff member testing positive for COVID-19. But where were the other 3 senators? Hereโ€™s who voted against the Wyden-Daines Amendment to the USA Freedom Reauthorization Act of 2020 that would have blocked McConnellโ€™s plan to let FBI collect web browsing history without a warrant:

๐Ÿ‘‰๐Ÿผ Read more:
https://www.privateinternetaccess.com/blog/these-are-the-37-senators-that-voted-to-let-the-fbi-seize-your-internet-history-without-a-warrant/

#USA #Congress #patriotact #DOJ #phone #metadata #surveillance #privacy #why #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Linux not Windows: Why Munich is shifting back from Microsoft to open source โ€“ again

Munich's flip-flop back to open source is the latest sign of Germany's political sea change over proprietary software.

In a notable U-turn for the city, newly elected politicians in Munich have decided that its administration needs to use open-source software, instead of proprietary products like Microsoft Office.

"Where it is technologically and financially possible, the city will put emphasis on open standards and free open-source licensed software," a new coalition agreement negotiated between the recently elected Green party and the Social Democrats says.

The agreement was finalized Sunday and the parties will be in power until 2026. "We will adhere to the principle of 'public money, public code'. That means that as long as there is no confidential or personal data involved, the source code of the city's software will also be made public," the agreement states.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.zdnet.com/article/linux-not-windows-why-munich-is-shifting-back-from-microsoft-to-open-source-again/

#OpenSource #linux #munich
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Hackers target the air-gapped networks of the Taiwanese and Philippine military

Third state-sponsored malware strain disclosed this week that can jump the air gap and reach isolated networks.

Hackers believed to be operating in the interests of the Chinese government have targeted the air-gapped networks of the Taiwanese and the Philippine military.

Trend Micro says the attacks have been carried out by a group known as Tropic Trooper, also known as KeyBoy.

Attacks involved the use of USBferry, a malware strain that contains a feature allowing it to self-replicate to removable USB devices, such as thumb drives and portable storage systems.

Trend Micro says the point of these attacks was to allow hackers to reach inside air-gapped (isolated, internet-disconnected) networks operated by the Taiwanese and the Philippine militaries, and other targets.

The malware would infect a system with fewer security protections, then wait for a USB device to be connected, infect the device, and wait to be ferried to other parts of a victim's internal network.

On the new device, USBferry would collect sensitive documents inside the USB device's internal storage, and wait until it was ferried back to another internet-connected device, where it would send the data back to Tropic Trooper's command and control servers.

Attacks have been going on for six years
Trend Micro says it's been tracking attacks with the USBferry malware since 2018, but that older incidents have been traced back to 2014 when Tropic Trooper appears to have deployed the malware for the first time.

Historically, the hacker group has been interested in stealing defense and marine-related intelligence from Taiwan and the Philippines.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.zdnet.com/article/hackers-target-the-air-gapped-networks-of-the-taiwanese-and-philippine-military/

#china #hackers #hacked #USBferry #taiwanese #philippine #military
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Attack against supercomputers

More than 10 high-performance data centers were hacked, including the one in the city of Garching (Germany). They are used for research on Covid-19 therapies, but those affected suspect other motives behind the attacks.

Dieter Kranzlmรผller cannot explain what the hacker wanted. "Someone broke in and manipulated the system. But we don't know exactly what he did," says the head of the Leibniz computer centre in Garching near Munich. The high-performance computer SuperMUC-NG is located there. Kranzlmรผller's team had to take it off the Internet this week after a hacker had gained access to the system. The Cybercrime Department of the Bavarian State Office of Criminal Investigation is investigating.

The case has shaken the research community, which depends on the expensive machines for its investigations. They are scattered internationally, but can no longer access the computers online. According to Kranzlmรผller, in addition to Garching, more than ten high-performance computer centres in different countries are affected, including those in Freiburg, Stuttgart and Jรผlich. A "serious problem right across the academic community", is what those responsible for the super computer Archer in Edinburgh call it.

Read more ๐Ÿ‡ฉ๐Ÿ‡ช:
https://www.computerbase.de/2020-05/sicherheitsprobleme-europaeische-rechenzentren-supercomputer/

https://www.sueddeutsche.de/digital/supercomputer-hacker-garching-corona-1.4909397

#attack #hacker #hacked #supercumputers #datacenter #research
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Hackers who stole files from a law firm to stars like Lady Gaga and Drake doubled their ransom to $42 million and threatened to release 'dirty laundry' on Trump

Grubman, Shire, Meiselas and Sacks was recently the target of a hack by a group called REvil, which is attempting to random the information.

One of the top entertainment law firms in the US โ€” Grubman, Shire, Meiselas and Sacks โ€” was recently the target of a ransomware attack.

REvil, the group behind the attack, on Thursday doubled their ransom to $42 million, Page Six reported.
They also threatened to release "dirty laundry" on President Donald Trump if the amount wasn't paid.
They did not elaborate on what the material might be. Sources told Page Six that Trump had never been a client of the firm.

A hacker group that stole 756 gigabytes of data from one of top US entertainment law firms has doubled their ransom to $42 million, and threatened to release "dirty laundry" on President Donald Trump if the money is not paid.

๐Ÿ‘‰๐Ÿผ Weiter auf:
https://www.businessinsider.fr/us/revil-hackers-threaten-trump-dirty-laundry-taken-from-law-firm-2020-5

#hacker #hacked #ransom #LadyGaga #drake #trump
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Forwarded from We Are Change
๐Ÿšจ๐ŸšจThe US Government is Seizing Massive New Surveillance Powers

We tried to warn you. The Patriot Act will soon be much stronger and more invasive.

https://news4achange.com/the-us-government-is-seizing-massive-new-surveillance-powers/
Huge, mysterious list appears online of where people met, personal information and more of tens of millions

'There's nothing you nor I can do about it,' notes security expert

A huge data dump includes the personal information of tens of millions of people and where they have met โ€“ and its origin is a mystery.

The breach includes almost 90GB of people's personal data, including details of where they have been and met people.

But there is no clue where the information has actually come from in the first place.

Though the information has been hosted publicly, and available to anyone, there is no hint about where it was first collected from.

The dump includes listings of individual people, including information on their social media sites, phone numbers and addresses. Unusually, however, it also includes details about where people have met, and information about where the people listed within the dump may know each other from.

As such, it appears that the data was probably collected from CRM, or customer relationship management, software. Users presumably took down a contact's personal information as well as a note about where they had met them to remember in future, and recorded it in a piece of software, which has since been breached.

But Troy Hunt, who tracks such data breaches and runs the website HaveIBeenPwned.com to allow users to check if they have been caught up in them, said that he had been unable to find any clue about what that software might be or how it had become public.

"Nowhere โ€“ absolutely nowhere โ€“ was there any indication of where the data had originated from," he wrote in a blog post announcing the find.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.independent.co.uk/life-style/gadgets-and-tech/news/data-dump-personal-information-breach-crm-a9515931.html

https://www.troyhunt.com/the-unattributable-db8151dd-data-breach/

#leak #breach #CRM
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Facebook Welcomes GIPHY as Part of Instagram Team

GIPHY, a leader in visual expression and creation, is joining the Facebook company today as part of the Instagram team. GIPHY makes everyday conversations more entertaining, and so we plan to further integrate their GIF library into Instagram and our other apps so that people can find just the right way to express themselves.

A lot of people in our community already know and love GIPHY. In fact, 50% of GIPHYโ€™s traffic comes from the Facebook family of apps, half of that from Instagram alone. By bringing Instagram and GIPHY together, we can make it easier for people to find the perfect GIFs and stickers in Stories and Direct. Both our services are big supporters of the creator and artist community, and that will continue. Together, we can make it easier for anyone to create and share their work with the world.

๐Ÿ‘‰๐Ÿผ Read more:
https://about.fb.com/news/2020/05/welcome-giphy/

#DeleteFacebook #fb #giphy #instagram
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
2Africa: a transformative subsea cable for future internet connectivity in Africa announced by global and African partners

2Africa is one of the largest subsea projects in the world, connecting 23 countries in Africa, the Middle East and Europe

#China #Mobile #International, #Facebook, #MTN #GlobalConnect, #Orange, #stc, #Telecom #Egypt, #Vodafone and #WIOCC announced today that they will partner to build #2Africa, which will be the most comprehensive #subsea #cable to serve the African continent and Middle East region. The parties have appointed #Alcatel Submarine Networks (โ€œ#ASNโ€) to build the cable in a fully funded project which will greatly enhance connectivity across Africa and the Middle East.

At 37,000km long, 2Africa will be one of the worldโ€™s largest subsea cable projects and will interconnect Europe (eastward via Egypt), the Middle East (via Saudi Arabia), and 21 landings in 16 countries in Africa. The system is expected to go live in 2023/4, delivering more than the total combined capacity of all subsea cables serving Africa today, with a design capacity of up to 180Tbps on key parts of the system. 2Africa will deliver much needed internet capacity and reliability across large parts of Africa, supplement the fast-growing capacity demand in the Middle East and underpin the further growth of 4G, 5G and fixed broadband access for hundreds of millions of people.

In countries where the 2Africa cable will land, service providers will obtain capacity in carrier-neutral data centres or open-access cable landing stations on a fair and equitable basis. This will support healthy internet ecosystem development by facilitating greatly improved accessibility for businesses and consumers alike.

The 2Africa cable has been designed to improve resilience and maximise performance, including the option of a seamless optical crossing between East Africa and Europe. The 2Africa parties and Airtel have signed an agreement with Telecom Egypt to provide a completely new crossing linking the Red Sea and the Mediterranean, the first in over a decade. This includes new cable landing stations and deployment of next-generation fibre on two new, diverse terrestrial routes parallel to the Suez Canal from Ras Ghareb to Port Said, and a new subsea link that will provide a third path between Ras Ghareb and Suez.

Read more:
https://www.orange.com/en/Press-Room/press-releases/press-releases-2020/2Africa-a-transformative-subsea-cable-for-future-internet-connectivity-in-Africa-announced-by-global-and-African-partners

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Average American had personal data stolen at least 4 times last year, report says

Over the past decade or so youโ€™ve probably noticed the increasing frequency of major data breaches around the world. There have been at least 200 documented data breaches since 2005, and the number of records exposed is only on the rise as more folks move their lives online. With more people transitioning facets of their lives online in the context of the โ€œstay homeโ€ orders of the 2020 pandemic, these numbers of are sure to climb even higher in years to come.

Itโ€™s impossible to know the impact and extent to which data breaches are occurring as many almost certainly go unreported. Here are some of the data breaches we analyzed in our research:

๐Ÿ‘‰๐Ÿผ Read more:
https://www.interest.com/personal-finance/the-average-american-had-personal-information-stolen-at-least-4-times-in-2019/

https://en.wikipedia.org/wiki/List_of_data_breaches

https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

https://theweek.com/articles/730439/have-almost-certainly-been-hacked

#USA #hacked #breach #leak
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Noyb files complaint against Google under GDPR, saying Android Advertising ID can be tracked

Every phone has an Android Advertising ID and it can be used to track your phoneโ€™s actions โ€“ and tied back to your identity. A privacy advocacy group called Noyb โ€“ European Center for Digital Rights has filed a legal complaint with the Austrian Data Protection Agency against Google under Europeโ€™s GDPR law. Noyb stands for None of Your Business โ€“ and thatโ€™s exactly how activists feel about the use of the Android Advertising ID to track Android users. Noyb was started by Austrian privacy activist Max Schrems who has filed privacy cases against Google and Facebook in the past and is deservedly highly celebrated in the privacy community.

โ€ผ๏ธ Noybโ€™s privacy lawyer, Stefano Rossetti succinctly summed up the problem:

โ€œIn essence, you buy a new Android phone, but by adding a tracking ID they ship you a tracking device.โ€

How the Android Advertising ID violates the GDPR
This Android Advertising ID is on by default and does not allow users to opt-out. If you choose not to be targeted by โ€œinterest-based adsโ€ that still doesnโ€™t get rid of the Android Advertising ID. Even if it did, that still wouldnโ€™t be a GDPR compliant for Google to go about this. To be compliant under the GDPR, Google is supposed to get opt-in user consent before setting up any sort of tracking ID. Right now, all users can do is have Google change their advertising ID โ€“ which may hinder the ability of third party apps to track your Android device, but doesnโ€™t do anything to stop Google from tracking you with the Android Advertising ID.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.privateinternetaccess.com/blog/noyb-files-complaint-against-google-under-gdpr-saying-android-advertising-id-can-be-tracked/

#android #google #DeleteGoogle #GDPR #advertising #id #tracking #privacy
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Dark Winter, Restaurant Snitches, Black Mirror โ€“ New World Next Week

This week on the New World Next Week: Plandemic planners threaten a dark winter for America; the reopening comes with strings attached; and reality has officially overtaken science fiction.

https://www.corbettreport.com/dark-winter-restaurant-snitches-black-mirror-new-world-next-week/

MP3:
https://www.corbettreport.com/mp3/2020-05-14_James_Evan_Pilato.mp3

#corbettreport #video #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
U.S. Secret Service: โ€œMassive Fraudโ€ Against State Unemployment Insurance Programs

A well-organized Nigerian crime ring is exploiting the COVID-19 crisis by committing large-scale fraud against multiple state unemployment insurance programs, with potential losses in the hundreds of millions of dollars, according to a new alert issued by the U.S. Secret Service.

A memo seen by KrebsOnSecurity that the Secret Service circulated to field offices around the United States on Thursday says the ring has been filing unemployment claims in different states using Social Security numbers and other personally identifiable information (PII) belonging to identity theft victims, and that โ€œa substantial amount of the fraudulent benefits submitted have used PII from first responders, government personnel and school employees.โ€

โ€œIt is assumed the fraud ring behind this possesses a substantial PII database to submit the volume of applications observed thus far,โ€ the Secret Service warned. โ€œThe primary state targeted so far is Washington, although there is also evidence of attacks in North Carolina, Massachusetts, Rhode Island, Oklahoma, Wyoming and Florida.โ€

The Secret Service said the fraud network is believed to consist of hundred of โ€œmules,โ€ a term used to describe willing or unwitting individuals who are recruited to help launder the proceeds of fraudulent financial transactions.

โ€œIn the state of Washington, individuals residing out-of-state are receiving multiple ACH deposits from the State of Washington Unemployment Benefits Program, all in different individualsโ€™ names with no connection to the account holder,โ€ the notice continues.

๐Ÿ‘‰๐Ÿผ Read more:
https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/

#USA #SecretService #alert #nigerian #fraud #coronavirus
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
RATicate Group Hits Industrial Firms With Revolving Payloads

A new threat group uses NSIS as an installer to target industrial companies with revolving payloads, including LokiBot, FormBook, BetaBot, Agent Tesla and Netwire.

Researchers have unearthed a new cybercrime group, RATicate, which is behind several waves of malspam attacks targeting industrial companies with various information-stealing payloads โ€“ from LokiBot to Agent Tesla.

At least six separate campaigns have been tied to RATicate, with the first wave starting November and the most recent spotted in March. All campaigns leveraged Nullsoft Scriptable Install System (NSIS), a legitimate, open-source tool used to create Windows installers, to ultimately drop various remote access trojans (RATs) on victimsโ€™ systems.

More recently, โ€œa new campaign we believe connected to the same actors leverages concern about the global COVID-19 pandemic to convince victims to open the payloads,โ€ said Markel Picado, threat researcher with SophosLabs, in a Thursday analysis. โ€œThis is a shift in tactics, but we suspect that this group constantly changes the way they deploy malware โ€” and that the group has conducted campaigns prior to this past November.โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://threatpost.com/raticate-group-industrial-firms-revolving-payloads/155775/

#RATicate #payloads #LokiBot #NSIS #RATs #malspam
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
NOT DELIVERING Amazon ending โ€˜hero payโ€™ in Canada slashing hourly wages and cutting double overtime pay despite coronavirus outbreaks

AMAZON is cancelling "hero pay" for its Canadian workforce, despite rising infections in its warehouses - and as CEO Jeff Bezos prepares to become the world's first trillionaire.

The pay was granted in recognition of working in hazardous conditions during the pandemic, and equated to a $2 wage increase and double overtime pay.

The announcement was made in an internal company memo, obtained by PressProgress, and came as a number of workers tested positive in warehouses across the country.

โ€œWe are providing a final extension of the temporary $2/hour pay increase and double overtime pay through May 30.โ€

After that, the memo continues: โ€œwe will return to our regular pay and overtime structure.โ€

On May 1, an outbreak at an Alberta warehouse was declared, after five people tested positive.

๐Ÿ‘‰๐Ÿผ Read more:
https://pressprogress.ca/amazon-tells-canadian-warehouse-workers-theyre-getting-a-pay-cut/

#DeleteAmazon #bezos #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
News Wrap May 15
News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Threatpost editors discuss the top news stories of the week ended May 15

https://threatpost.com/news-wrap-ransomware-extortion-tactics-contact-tracing-app-security/155796/

#NewsWrap #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )

With this script, you can recharge your account indefinitely.

About warp+
WARP+ uses Cloudflareโ€™s virtual private backbone, known as Argo, to achieve higher speeds and ensure your connection is encrypted across the long haul of the Internet.

๐Ÿ‘‰๐Ÿผ Read more:
https://github.com/ALIILAPRO/warp-plus-cloudflare

https://blog.cloudflare.com/announcing-warp-plus/

#cloudflare #warp #FuckCloudflare #script
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Smart-tv-telegram

A Telegram Bot to stream content on your smart TV (also Chromecast, FireTV and other UPnP device)
Feature

๐Ÿ‘‰๐Ÿผ
Streaming, the bot will not have to download the entire file before playing it on your device

๐Ÿ‘‰๐Ÿผ You can play anything if your device has the right codec

๐Ÿ‘‰๐Ÿผ You can streaming on any device that supports UPnP (AVTransport)

๐Ÿ‘‰๐Ÿผ Chromecast support

๐Ÿ‘‰๐Ÿผ Streaming over HTTP

Note: Chromecast (1st, 2nd and 3rd Gen.) only supports H.264 and VP8 video codecs

Note: Most LG TVs with WebOS have an incorrect UPnP implementation, throw it in the trash and buy a new TV

๐Ÿ‘‰๐Ÿผ Read more:
https://github.com/andrew-ld/smart-tv-telegram

#smart #tv #tg #bot #streaming
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
โ€œWhat about building 7?โ€ A social psychological study of online discussion of 9/11 conspiracy theories

Recent research into the psychology of conspiracy belief has highlighted the importance of belief systems in the acceptance or rejection of conspiracy theories. We examined a large sample of conspiracist (pro-conspiracy-theory) and conventionalist (anti-conspiracy-theory) comments on news websites in order to investigate the relative importance of promoting alternative explanations vs. rejecting conventional explanations for events.

In accordance with our hypotheses, we found that conspiracist commenters were more likely to argue against the opposing interpretation and less likely to argue in favor of their own interpretation, while the opposite was true of conventionalist commenters. However, conspiracist comments were more likely to explicitly put forward an account than conventionalist comments were. In addition, conspiracists were more likely to express mistrust and made more positive and fewer negative references to other conspiracy theories.

The data also indicate that conspiracists were largely unwilling to apply the โ€œconspiracy theoryโ€ label to their own beliefs and objected when others did so, lending support to the long-held suggestion that conspiracy belief carries a social stigma. Finally, conventionalist arguments tended to have a more hostile tone. These tendencies in persuasive communication can be understood as a reflection of an underlying conspiracist worldview in which the details of individual conspiracy theories are less important than a generalized rejection of official explanations.

โ€œThe Internet was made for conspiracy theory: it is a conspiracy theory: one thing leads to another, always another link leading you deeper into no thing and no place.โ€ (Stewart, 1999, p. 18).

๐Ÿ‘‰๐Ÿผ Kent Academic Repository Full text document (pdf)
https://kar.kent.ac.uk/36252/1/Wood%20and%20Douglas%202013%20Frontiers.pdf

๐Ÿ‘‰๐Ÿผ Read more:
https://www.frontiersin.org/articles/10.3389/fpsyg.2013.00409/full

https://www.forschung-und-wissen.de/nachrichten/psychologie/menschen-die-an-verschwoerungstheorien-glauben-sind-vernuenftiger-13372102

#research #psychological #study #conspiracy #theories #pdf #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Gangnam Industrial Style APT campaign targets South Korea.
Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies

Section 52, CyberXโ€™s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.

๐Ÿ‘‰๐Ÿผ The research can be found here:
https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/

#apt #korea #CyberX #Section52 #cyberwire #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Generate WireGuard profile from Cloudflare Warp account

wgcf is a utility for Cloudflare Warp that allows you to create and manage accounts, assign license keys, and generate WireGuard profiles.

๐Ÿ’ก Features
:

๐Ÿ‘‰๐Ÿผ Register new Cloudflare Warp device and account

๐Ÿ‘‰๐Ÿผ Update account to allow connection via WireGuard

๐Ÿ‘‰๐Ÿผ Update account with new license key, sharing Warp+ status with up to 5 devices

๐Ÿ‘‰๐Ÿผ Generate WireGuard profile

๐Ÿ‘‰๐Ÿผ Check Cloudflare device status

๐Ÿ‘‰๐Ÿผ Print trace information to debug Warp/Warp+ status

๐Ÿ’ป Download:
You can find pre-compiled binaries on the releases page.
https://github.com/ViRb3/wgcf/releases

๐Ÿ‘‰๐Ÿผ Read more:
https://github.com/ViRb3/wgcf

๐Ÿš€ Try with:
Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ )
https://t.iss.one/BlackBox_Archiv/919

#cloudflare #warp #FuckCloudflare #script
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv