Salta al contenuto principale

Cybersecurity & cyberwarfare ha ricondiviso questo.


Cisco says it's tracking a large-scale brute-forcing campaign that is targeting VPN devices from multiple vendors.

The campaign started on March 18 and has targeted VPN web panels and SSH endpoints.

Cisco says most attacks originate from Tor exit nodes and other anonymizing tunnels and proxies.

The attacks have targeted VPN devices from Cisco, Fortinet, Check Point, SonicWall, Mikrotik, Draytek, Ubiquiti, and RD Web Services.

https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


New Zealand's National Cyber Security Centre has published its yearly threat report:

https://www.ncsc.govt.nz/resources/ncsc-annual-cyber-threat-reports/2023-web/ #infosec #cybersecurity #security

Questa voce è stata modificata (1 ora fa)

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Imperva's bot-v-human internet traffic trends. Bad-bot traffic reached an all-time high last year.

https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Pro-Ukrainian hacktivist group Cyber Resistance has hacked and leaked data from Russian UAV maker Albatross

https://informnapalm.org/ua/cybint-zlam-rosiiskoho-vyrobnyka-bpla-part-1/

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


I've been feeding the pigeons around my home for several years now. Recently, crows also started showing up.

As is their custom, they are now bringing me shiny objects as gifts.

Here's what I got so far.

reshared this

Unknown parent

Catalin Cimpanu

@alessandro Yes. They've seen me feed the pigeons and started hanging around too.

Now they wait in the trees next to pigeons to come out with a bag of seeds every day.


Cybersecurity & cyberwarfare ha ricondiviso questo.


UK plans to make the creation of sexually explicit deepfake images a crime

https://www.gov.uk/government/news/government-cracks-down-on-deepfakes-creation

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


PuTTY fixed a crypto bug that can be used in certain circumstances to expose private keys

It's a big deal because the bug can be used to connect to remote servers or fake commits in code repos

PuTTY versions from the last 8 years are all impacted

https://www.openwall.com/lists/oss-security/2024/04/15/6

#infosec #cybersecurity #security

reshared this

in reply to Catalin Cimpanu

Thanks for the heads up. 😀

Only 521-bit ECDSA keys (ecdsa-sha2-nistp521) are affected.

Questa voce è stata modificata (3 ore fa)

Cybersecurity & cyberwarfare ha ricondiviso questo.


Elastic's security team has open-sourced the company's Elastic Universal Profiling agent: https://www.elastic.co/blog/elastic-universal-profiling-agent-open-source

The code is on GitHub: https://github.com/elastic/otel-profiling-agent/ #infosec #cybersecurity #security

reshared this



Cybersecurity & cyberwarfare ha ricondiviso questo.


The OpenJS Foundation reports XZ-like supply chain attack attempts on one of its projects and two other on "popular" JavaScript libraries

https://openjsf.org/blog/openssf-openjs-alert-social-engineering-takeovers

reshared this

in reply to Catalin Cimpanu

um, what are those two other popular javascript libraries?


Cybersecurity & cyberwarfare ha ricondiviso questo.


And in your daily dose of Chinese propaganda brainworms, one of Beijing's mouthpieces has put forward the theory that the Volt Typhoon APT is nothing more than "a collusion among US politicians, intelligence community and companies to cheat funding, defame China."

Read the hot garbage hot-take in GlobalTimes for yourself: https://www.globaltimes.cn/page/202404/1310584.shtml

reshared this

in reply to Catalin Cimpanu

This post would be my only exposure to that. So I guess it's on you for passing along the brain worms?

Also have no idea what Volt Typhoon APT is. And not interested in looking it up.


Cybersecurity & cyberwarfare ha ricondiviso questo.


Proofpoint has published a profile on TA427, one of the three subgroups of the larger Kimsuky North Korean hacking group. More from Greg Lesnewich below.

https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


MGM Resorts sued the FTC to stop an investigation into how it dealt with a cybersecurity attack last year

https://archive.ph/mXIDQ

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


A threat actor exploited a vulnerability in the smart contract of the Zest Protocol cryptocurrency token.

The attacker used the bug to orchestrate a flash loan attack and steal almost $900,000

https://www.zestprotocol.com/blog/zest-protocol-security-update

reshared this



Cybersecurity & cyberwarfare ha ricondiviso questo.


Grok 1.5V: Il modello che vuole comprendere la realtà come un essere umano

La società #xAI di Elon #Musk ha introdotto il suo primo #modello multimodale, #Grok 1.5 #Vision (Grok-1.5V). Il #modello è progettato per competere con #OpenAI e ha la capacità di analizzare testi, documenti, grafici, diagrammi, screenshot e fotografie.

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/grok-1-5v-il-modello-che-vuole-comprendere-la-realta-come-un-essere-umano/



Grok 1.5V: Il modello che vuole comprendere la realtà come un essere umano


Avviso contenuto: La società xAI di Elon Musk ha introdotto il suo primo modello multimodale, Grok 1.5 Vision (Grok-1.5V). Il modello è progettato per competere con OpenAI e ha la capacità di analizzare testi, documenti, grafici, diagrammi, screenshot e fotografie. Nel nov



Pro-Russian Voice of Europe back online from Kazakhstan


The outlet Voice of Europe, allegedly involved in a pro-Russian propaganda network, has restarted operations, hosted in Kazakhstan after it was sanctioned by the Czech Republic last month, Euractiv’s data shows.


https://www.euractiv.com/section/global-europe/news/russiagates-voice-of-europe-back-online-from-kazakhstan/



Alternate Threaded Inserts for 3D Prints


Avviso contenuto: The usual way to put a durable threaded interface into a 3D print is to use a heat-set insert, but what about other options? [Thomas Sanladerer] evaluates a variety of …read more https://hackaday.com/2024/04/15/alternate-threaded-inserts-for-3d-prints/



Israele Iran, Ucraina Russia: Benvenuti nell’AI-War. Quando uccidere è solo questione di Silicio


Avviso contenuto: Lo sapevamo. Dietro al bello di CHAT GPT e Midjourney, il potenziamento continuo di robotica e AI, progetti classificati venivano realizzati in tutto il mondo. Droni autonomi, sistemi di controllo e di pianificazione delle operazioni e chissà quale altra




Germania in Prima Linea Contro le Minacce Informatiche: Nasce il CIR, l’Unità Speciale dell’Esercito!


Avviso contenuto: In risposta alle crescenti minacce informatiche, la Germania ha annunciato la creazione di un’unità informatica specializzata all’interno delle sue forze armate. La decisione è stata annunciata dal ministro della Difesa tedesco Boris Pistorius. Il nuovo C


Cybersecurity & cyberwarfare ha ricondiviso questo.


⏳CTF Della Red Hot Cyber Conference 2024: Sarai capace a risolvere le flag fisiche? ☠️

NFC, steganografia, radio frequenze, segreti della banca di stato e cifratura del ransomware dentro una rete Wi-Fi, saranno le sfide che abbiamo preparato per voi! ON SITE!

Chi vincerà?

👉 Iscriviti alla conferenza: https://www.eventbrite.it/e/biglietti-red-hot-cyber-conference-2024-731075074227
👉 Iscriviti alla CTF: https://ctf.redhotcyber.com/
👉 Pagina dell'evento: https://www.redhotcyber.com/red-hot-cyber-conference/rhc-conference-2024/
👉 Per ulteriori informazioni: redazione@redhotcyber.com

#redhotcyber #informationsecurity #ethicalhacking #dataprotection #hacking #cybersecurity #cybercrime #ctf #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #privacy #infosecurity #rhcconference #conference Antonio Montillo Vincenzo Alonge Giuseppe Longobardi Andrea Tassotti Cybersecurityup Hackmageddon



Cybersecurity & cyberwarfare ha ricondiviso questo.


Germania in Prima Linea Contro le Minacce Informatiche: Nasce il CIR, l’Unità Speciale dell’Esercito!

In risposta alle crescenti #minacce #informatiche, la #Germania ha annunciato la creazione di un’unità #informatica specializzata all’interno delle sue #forze #armate. La decisione è stata annunciata dal ministro della Difesa tedesco Boris Pistorius.

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/germania-in-prima-linea-contro-le-minacce-informatiche-nasce-il-cir-lunita-speciale-dellesercito/



Building a Tape Echo In A Coke Can Tape Player That Doesn’t Really Work


Avviso contenuto: Back in the 1990s, you could get a tape player shaped like a can of Coca Cola. [Simon the Magpie] scored one of these decks and decided to turn it …read more https://hackaday.com/2024/04/15/building-a-tape-echo-in-a-coke-can-tape-player-that-doesnt-reall


Cybersecurity & cyberwarfare ha ricondiviso questo.


Several security firms have published reports on the Lockbit ransomware itself, but Kaspersky has looked at the Lockbit 3.0 ransomware builder, which got leaked following an internal dispute back in 2022.

https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


Secureworks has published a report looking at the INC Ransom group.

The group, which Secureworks tracks as GOLD IONIC, launched in August of last year and has made 72 victims.

https://www.secureworks.com/blog/gold-ionic-deploys-inc-ransomware

reshared this


Cybersecurity & cyberwarfare ha ricondiviso questo.


The UK's new security law for smart devices is set to enter into effect on April 29 this year

PDF: https://www.ncsc.gov.uk/files/Security-law-smart-devices-NCSC.pdf

reshared this



Compaq Portable III is More Than Meets the Eye


Avviso contenuto: The Compaq Portable III hails from the 386 era — in the days before the laptop form factor was what we know today. It’s got a bit of an odd …read more https://hackaday.com/2024/04/15/compaq-portable-iii-is-more-than-meets-the-eye/


in reply to Catalin Cimpanu

🤬 🤬 🤬 🤬 🤬 🤬

(checking now to see if my workplace is implicated)



Plasma Cutter on the Cheap Reviewed


Avviso contenuto: If you have a well-equipped shop, it isn’t unusual to have a welder. Stick welders have become a commodity and even some that use shield gas are cheap if you …read more https://hackaday.com/2024/04/15/plasma-cutter-on-the-cheap-reviewed/



3D Printing a Cassette Is Good Retro Fun


Avviso contenuto: The cassette is one of the coolest music formats ever, in that you could chuck them about with abandon and they’d usually still work. [Chris Borge] recently decided to see …read more https://hackaday.com/2024/04/15/3d-printing-a-cassette-is-good-retro-fu

Gazzetta del Cadavere reshared this.


Joe Vinegar ha ricondiviso questo.


Logic Analyzers: Decoding And Monitoring


Avviso contenuto: Last time, we looked into using a logic analyzer to decode SPI signals of LCD displays, which can help us reuse LCD screens from proprietary systems, or port LCD driver …read more https://hackaday.com/2024/04/15/logic-analyzers-decoding-and-monitoring/



Analyzing the Code From The Terminator’s HUD


Avviso contenuto: The T1000, also known as the Terminator, was like some kind of non-giving up robot guy. The robot assassin viewed the world through a tinted view with lines of code …read more https://hackaday.com/2024/04/15/analyzing-the-code-from-the-terminators-hud/



Addio influenza e controllo. La Cina in 3 anni eliminerà i chip stranieri dai sistemi di telecomunicazione


Avviso contenuto: La settimana scorsa, le autorità cinesi hanno ordinato ai tre maggiori colossi delle telecomunicazioni del Paese – China Telecom, China Mobile e China Unicom – di eliminare completamente i semiconduttori statunitensi dalle loro apparecchiature nei prossim


Cybersecurity & cyberwarfare ha ricondiviso questo.


Addio influenza e controllo. La Cina in 3 anni eliminerà i chip stranieri dai sistemi di telecomunicazione

La settimana scorsa, le autorità #cinesi hanno #ordinato ai tre maggiori colossi delle telecomunicazioni del Paese – China Telecom, China Mobile e China Unicom – di #eliminare completamente i #semiconduttori statunitensi dalle loro #apparecchiature nei prossimi tre anni.

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/addio-influenza-e-controllo-la-cina-in-3-anni-eliminera-i-chip-stranieri-dai-sistemi-di-telecomunicazione/



Gli Hacker rubano 40 TB di dati dal server del Dipartimento IT di Mosca


Avviso contenuto: Secondo gli specialisti di Data Leakage & Breach Intelligence (DLBI), il gruppo di hacker di DumpForums ha annunciato di aver violato il server del Dipartimento di tecnologia dell’informazione di Mosca (mos[.]ru/dit/). Gli aggressori affermano di aver rub