Plus récents

Group-IB, one of the leading providers of solutions dedicated to detecting and preventing attacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, has supported INTERPOL in its Lyrebird operation that resulted in the identification and apprehension of a threat actor presumably responsible for multiple attacks, including on telecommunications companies in , the county's major banks and multinational corporations, following a two-year investigation. The alleged perpetrator, who turned out to be a citizen of , was arrested in May 2021 by the Moroccan based on the data about his cybercrimes that was provided by Group-IB.

group-ib.com/media/gib-interpo

A certification authority (CA) official website was harboring and facilitated downloads of a backdoored client to users. Attackers clearly intended to spread malware to users in Mongolia by compromising a trustworthy source, which in this case is a CA in Mongolia

decoded.avast.io/luigicamastra

(fr) Le site web bitcoin.org cible d'une attaque « absolument massive ». Inaccessible durant des heures, bitcoin.org a ensuite reçu une demande de rançon s'élevant à la moitié d'un , soit approximativement 14,000 € . (en) bitcoin.org, one of the first bitcoin-related websites, was the target of a major assault. It was attacked with a DDoS assault, and the hackers wanted 0.5 Bitcoin as a ransom.

Russian government hackers APT29 breached the computer systems of the Republican National Committee last week, around the time a Russia-linked criminal group unleashed a massive attack.

bloomberg.com/news/articles/20

(Golang) Fast golang web crawler for gathering URLs and JavaSript file locations.

github.com/hakluke/hakrawler

CVE-2021-30116 SQL injection vulnerability in Kaseya Virtual System Administrator (VSA) allows remote malicious users to execute arbitrary SQL commands.

vulmon.com/vulnerabilitydetail

(Golang) Gotator is a tool to generate DNS wordlists through permutations.

github.com/Josue87/gotator

On July 4, the day of the site' official launch, a hacker broke into and defaced some of the site's most prominent users, including its founder Jason Miller, former CIA director Mike Pompeo, former Trump advisor Steve Bannon, and pro-Trump congresswoman Marjorie Taylor Greene

businessinsider.com/gettr-trum

Hackers have scraped the new right-wing social media platform GETTR, getting 90,000 usernames and email addresses

vice.com/en/article/dyv44m/hac

Realtek Firmware and a Fully 8051-based Keylogger Using RealWOW Technology

  • The Realtek rtl8821ae Chip+The Basic Firmware Structure
  • Dumping the Mask ROM
  • The Bluetooth Firmware
  • How the Driver Sends Packets
  • Welcome to use Realtek RealWoW Tech
  • A Purely 8051-based Keylogger

« The funny thing is that this is effectively a keylogger that does not run any code on the CPU while it is running. »

8051enthusiast.github.io/2021/

Without too much effort, we now have a pretty powerful script for continuously testing our firmware for basic BLE functionality.

lagerdata.com/articles/automat

The password generator included in Kaspersky Password Manager had several problems. The most critical one is that it used a PRNG not suited for purposes. Its single source of entropy was the current time. All the passwords it created could be bruteforced in seconds.

donjon.ledger.com/kaspersky-pa

Privacy vs The Government: Why backdoors are a security nightmare

There are indeed valid arguments for why the government should have access to data necessary to ensure public safety and stop . But the question is at what cost does the government obtain this information ?

It's not a matter of whether the government can access data. It's a matter of whether anyone can access it. There's no way to design a system such that only the « good guys » have access. It's a question of security vs insecurity. This is the opinion of most people who deal professionally with and communications , and the government would do well to finally start taking the advice of these security people. What the government has expressly stated they want is not only access to information held by companies, but also a backdoor into information that technology companies don't have access to.

serpentsec.1337.cx/privacy-vs-

Plus anciens