


Technical news and discussion of information security.
Rules:
- Be excellent to each other
- Keep it on topic
- Absolutely no PII or doxing
- No disclosure posts
-
netsec @lemmy.world chaospatterns @lemmy.worldLink Actions -
netsec @lemmy.world Aconite33 @lemmy.worldBBoT 2.0 Released!
blog.blacklanternsecurity.com BBOT 2.0 - Release AnnouncementThe recursive internet scanner gets an upgrade
Link ActionsBBoT 2.0 is our new release! Check out our GitHub:
-
netsec @lemmy.world maltfield @monero.town3TOFU: Verifying Unsigned Releases
tech.michaelaltfield.net 3TOFU: Verifying Unsigned Releases - Michael Altfield's Tech BlogIntroducing 3TOFU -- a Harm-Reduction process to Supply Chain Security when downloading software that cannot be verified cryptographically
Link Actions3TOFU: Verifying Unsigned Releases
By Michael Altfield
License: CC BY-SA 4.0
https://tech.michaelaltfield.net/This article introduces the concept of 3TOFU - a harm-reduction process when downloading software that cannot be verified cryptographically.
Verifying Unsigned Releases with 3TOFU ⚠ NOTE: This article is about harm reduction.
It is dangerous to download and run binaries (or code) whose authenticity you cannot verify (using a cryptographic signature from a key stored offline). However, sometimes we cannot avoid it. If youre going to proceed with running untrusted code, then following the steps outlined in this guide may reduce your risk.
TOFU
-
netsec @lemmy.world Optional @lemmy.worldwww.theverge.com Microsoft left internal passwords exposed in latest security blunderAn internal Azure-hosted server was left without password protection.
Link Actionscross-posted from: https://lemmy.zip/post/13403067
Microsoft left internal passwords exposed in latest security blunder
An internal Azure-hosted server was left without password protection.
-
netsec @lemmy.world repostbot33 @lemmy.worldBOTGalactical Bug Hunting: How we discovered new issues in CD Projekt Red’s Gaming Platform
www.anvilsecure.com Galactical Bug Hunting: How we discovered new issues in CD Projekt Red's Gaming Platform - Anvil SecureThe main purpose behind starting this research project was to get further understanding on how to review and exploit both Windows Applications and Environments…
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTWifi credential dumping
www.r-tec.net Blog WIFI Credential DumpingThis blog won't dive into any of the mentioned WIFI attacks, but will highlight techniques to retrieve the PSK from a workstation post-compromise instead.
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTDiving Deeper into AI Package Hallucinations
www.lasso.security Lasso Research: AI Package HallucinationsExplore Lasso’s latest research on AI Package Hallucinations, their impact on security, and mitigation strategies for enterprises.
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTSecurity Advisory: Systems with a SONIX Technology Webcam vulnerable to DLL hijacking attack allowing attackers to execute malicious DLL and escalate privileges
herolab.usd.de usd-2023-0029 - usd HeroLabAdvisory ID: usd-2023-0029 | Product: SONIX Technology Webcam | Vulnerability Type: CWE 732 - Incorrect Permission Assignment for Critical Resource
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTunch 😗: Hides message with invisible Unicode characters
github.com GitHub - dwisiswant0/unch: Hides message with invisible Unicode charactersHides message with invisible Unicode characters. Contribute to dwisiswant0/unch development by creating an account on GitHub.
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTGram - Self-hosted Threat Modeling Webapp
github.com GitHub - klarna-incubator/gram: Gram is Klarna's own threat model diagramming toolGram is Klarna's own threat model diagramming tool - klarna-incubator/gram
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTKobold letters – Why HTML emails are a risk to your organization
lutrasecurity.com Kobold letters – Lutra SecurityAnyone who has had to deal with HTML emails on a technical level has probably reached the point where they wanted to quit their job or just set fire to all the mail clients due to their inconsistent implementations. But HTML emails are not just a source of frustration, they can also be a serious sec...
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTShowcasing Incinerator a Powerful Android Malware Reversing Tool
boschko.ca Incinerator: The Ultimate Android Malware Reversing ToolMaster Android malware reversal with ease using Incinerator, your trusted ally in the fight against threat actors for experts and novices alike.
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTPersistence - DLL Proxy Loading
pentestlab.blog Persistence – DLL Proxy LoadingDLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow…
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTAdventures in Stegoland - Adventures with a stego shellcode loader
tierzerosecurity.co.nz Tier Zero SecurityInformation Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTXZ-actly What You Need (CVE 2024-3094): Detecting Exploitation with Oligo
www.oligo.security XZ-actly What You Need (CVE 2024-3094): Detecting Exploitation with Oligo | Oligo SecuritySee how Oligo ADR Detects Exploitation of CVE-2024-3094 (XZ backdoor in liblzma).
Link Actions -
netsec @lemmy.world repostbot33 @lemmy.worldBOTwww.pentagrid.ch IBIS hotel check-in terminal keypad-code leakageAn IBIS hotel check-in terminal leaked room door key codes of almost half of the rooms.
Link Actions