cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qilingยป, bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

BlackBox (Security) Archiv

๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats ๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks ๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet ๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org

Ko'proq ko'rsatish
Reklama postlari
4 474
Obunachilar
-124 soatlar
-77 kunlar
+1930 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Stealing everything youโ€™ve ever typed or viewed on your own Windows PC is now possible with two lines of code โ€” inside the Copilot+ Recall disaster https://doublepulsar.com/recall-stealing-everything-youve-ever-typed-or-viewed-on-your-own-windows-pc-is-now-possible-da3e12e9465e #windows #copilot #recall ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Recall: Stealing everything youโ€™ve ever typed or viewed on your own Windows PC is now possible.

Photographic memory comes to Windows, and is the biggest security setback in a decade.

๐Ÿ‘ 6
Very big cyber incident playing out at Snowflake, who describe themselves as โ€œAI Data Cloudโ€. They have a free trial where anybody can sign up and upload dataโ€ฆ and they have. Threat actors have been scraping customer data using a tool called rapeflake, for about a month. https://cyberplace.social/@GossiTheDog/112536407633131499 #snowflake #cybersecurity #rapeflake #hacked ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Kevin Beaumont (@[email protected])

Very big cyber incident playing out at Snowflake, who describe themselves as โ€œAI Data Cloudโ€. They have a free trial where anybody can sign up and upload dataโ€ฆ and they have. Threat actors have been scraping customer data using a tool called rapeflake, for about a month.

๐Ÿ‘ 1
no-defender A slightly more fun way to disable windows defender. There's a WSC (Windows Security Center) service in Windows which is used by antiviruses to let Windows know that there's some other antivirus in the hood and it should disable Windows Defender. This WSC API is undocumented and furthermore requires people to sign an NDA with Microsoft to get its documentation, so I decided to take an interesting approach for such a thing and used an already existing antivirus called Avast. This AV engine includes a so-called wsc_proxy.exe service, which essentially sets up the WSC API for Avast. With a little bit of reverse engineering, I turned this service into a service that could add my own stuff there. https://github.com/es3n1n/no-defender #reverseengineering #windows #defender #microsoft ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
GitHub - es3n1n/no-defender: A slightly more fun way to disable windows defender. (through the WSC api)

A slightly more fun way to disable windows defender. (through the WSC api) - es3n1n/no-defender

๐Ÿ”ฅ 6๐Ÿ‘ 4
CensysGPT Beta CensysGPT beta simplifies building queries and empowers users to conduct efficient and effective reconnaissance operations. The tool enables users to quickly and easily gain insights into hosts on the internet, streamlining the process and allowing for more proactive threat hunting and exposure management. https://gpt.censys.io/ #cybersecurity #infosec #AI #censys #gpt ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...

Generate Censys Search Queries

๐Ÿ‘ 2
Foxit PDF โ€œFlawed Designโ€ Exploitation Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands. Check Point Research has observed variants of this exploit being actively utilized in the wild. Its low detection rate is attributed to the prevalent use of Adobe Reader in most sandboxes or antivirus solutions, as Adobe Reader is not susceptible to this specific exploit. Additionally, Check Point Research has observed various exploit builders, ranging from those coded in .NET to those written in Python, being used to deploy this exploit. https://research.checkpoint.com/2024/foxit-pdf-flawed-design-exploitation/ #exploit #foxit #pdf ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Foxit PDF โ€œFlawed Designโ€ Exploitation - Check Point Research

Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands. Check Point Research has observed variants of this exploit being actively utilized in the wild.

๐Ÿ‘ 1
Tornado Cash Developer Found Guilty of Laundering $1.2 Billion of Crypto Alexey Pertsev, cofounder of the crypto-anonymizing tool, has been sentenced to more than five years behind bars. https://www.wired.com/story/tornado-cash-developer-found-guilty-of-laundering-crypto/ #crypto #tornadocash #pertsev ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Tornado Cash Developer Found Guilty of Laundering $1.2 Billion of Crypto

Alexey Pertsev, cofounder of the crypto-anonymizing tool, has been sentenced to more than five years behind bars.

๐Ÿ‘Ž 4๐Ÿ‘ 2
Firefox now collects data about search queries https://blog.mozilla.org/en/products/firefox/firefox-search-update/ #firefox #privacy ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Whatโ€™s new in Firefoxโ€™s approach to search dataย 

Innovation and privacy go hand in hand here at Mozilla. To continue developing features and products that resonate with our users, weโ€™re adopting a new a

๐Ÿ‘Ž 9๐Ÿ˜ฑ 4๐Ÿ‘ 1
A Threat Actor Claims Sale of Outlook RCE Exploit 0-Day for $1,700,000 In a concerning development, a threat actor known as โ€œCvspโ€ has announced the sale of an alleged Outlook Remote Code Execution (RCE) exploit 0-day. This alleged exploit, designed to target various versions of Microsoft Office across both x86 and x64 architectures, poses a significant security threat to users worldwide. https://dailydarkweb.net/a-threat-actor-claims-sale-of-outlook-rce-exploit-0-day-for-1700000/ #outlook #zeroday #exploit ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
A Threat Actor Claims Sale of Outlook RCE Exploit 0-Day for $1,700,000 - Daily Dark Web

A Threat Actor Claims Sale of Outlook RCE Exploit 0-Day for $1,700,000 Discover the latest security threats and database leaks, including unauthorized VPN access and email breaches, in the cyber underground world.Stay informed about emerging cyber threats, such as unauthorized access to databases and sensitive information leaks, affecting global companies and organizations.Learn about the latest cyber incidents, including DDoS attacks and malware threats targeting cryptocurrency wallets and financial institutions.

๐Ÿ‘ 3โค 1
ShodanX ShodanX is a versatile information gathering tool that harnesses the power of Shodan's extensive database. it offers multiple modes and flexible queries to extract valuable insights for security assessments, reconnaissance, and threat intelligence. With colorful output and intuitive commands, ShodanX empowers users to efficiently gather and analyze data from Shodan's facets, enhancing their cybersecurity efforts. https://github.com/RevoltSecurities/ShodanX/tree/main #shodan #shodanx #pentesting #cybersecurity #infosec ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
GitHub - RevoltSecurities/ShodanX: ShodanX is a tool to gather information of targets using shodan dorksโšก.

ShodanX is a tool to gather information of targets using shodan dorksโšก. - RevoltSecurities/ShodanX

๐Ÿ‘ 3
Telegram has launched a pretty intense campaign to malign Signal as insecure, with assistance from Elon Musk. The goal seems to be to get activists to switch away from encrypted Signal to mostly-unencrypted Telegram. I want to talk about this a bit.... https://twitter.com/matthew_d_green/status/1789687898863792453 #signal #telegram #durov #elonmusk ๐Ÿ“ก@cRyPtHoN_INFOSEC_IT ๐Ÿ“ก@cRyPtHoN_INFOSEC_FR ๐Ÿ“ก@cRyPtHoN_INFOSEC_EN ๐Ÿ“ก@cRyPtHoN_INFOSEC_DE ๐Ÿ“ก@BlackBox_Archiv
Hammasini ko'rsatish...
Matthew Green (@matthew_d_green) on X

Telegram has launched a pretty intense campaign to malign Signal as insecure, with assistance from Elon Musk. The goal seems to be to get activists to switch away from encrypted Signal to mostly-unencrypted Telegram. I want to talk about this a bit. 1/

๐Ÿ‘Ž 6๐Ÿ‘ 5