hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,6 Tsd.
aktive Profile

#Hacker

12 Beiträge11 Beteiligte2 Beiträge heute

Il 19enne membro della cyber-gang d’élite Scattered Spider rischia 60 anni di reclusione

📌 Link all'articolo : redhotcyber.com/post/il-19enne

Un membro del gruppo #hacker di Scattered Spider, è stato accusato di furto di criptovaluta su larga scala e #operazioni di hacking dei #sistemi aziendali. Noah Michael Urban è stato arrestato all’inizio del 2024 , patteggiando le accuse in Florida, dove è stato accusato di #frode e furto di #identità.

il blog della sicurezza informatica · Il 19enne membro della cyber-gang d'élite Scattered Spider rischia 60 anni di reclusioneNoè Michael Urban, membro di Scattered Spider, patteggia per furto e hacking. Rischia 60 anni e perde milioni di cripto. E la corona di King Bob.
#redhotcyber#hacking#cti

Hi guys, I have tried the #CC1101 from #Lilygo. It is important that you pay attention to the identification CC1101 if you want to reproduce this yourself, because the device is also sold under other identifiers with a different range of functions and looks exactly the same.

It is a
#hacker #tool with which you can record and analyze #Wifi, #Bluetooth, #NFC and #Lora signals. You can also use it as a #BadUSB #development tool. It is much cheaper than a #FlipperZero, but also has a smaller range of functions.

It is somewhat disappointing that the default firmware supplied is only suitable for testing the screen, LEDs and controls. It is otherwise useless and should therefore be replaced immediately.

For my first test I choose the
#firmware from #CapibaraZero: https://capibarazero.com

It is very easy to
#install via the #browser. However, my Firefox refused to do this, which is why I used Thorium (a free Chrome variant): https://flash.capibarazero.com

READ FULL POST here:
https://0.0g.gg/?1d21337660218bf2#2XG9iGKx2sFTbdLP7KYNbde2LvsXmyBeWfpsMu1PPirm

Stay tuned and follow me if you don't want to miss it and I'll tell you what you can do with the device.

#software #utility #test #unbox #nerd #hacker #coder #scanner #scan #signal

Antwortete im Thread

The thing that happens is, I create a new unique address for a business I'm dealing with. I put the company's name in the local-part of the email address I give them (that's the part before the "@" symbol in an email address).

And then they contact me demanding to know why (or how) I'm using "their" email. They see their company name or domain name in the local-part of my address and get incensed, thinking it's impossible, or illegal even. It makes no sense; would the greeting card mafia have a case against a big webmail provider if one of their users created the "hallmark@BigWebmailProviderDomain" address?

On more than one occasion, I have picked up the phone to find someone YELLING at me about "hacking their server" because of this.

I spend some time explaining it to them. Half the time, they kinda/sorta get it and calm down. The other half refuse to even stop yelling and think about what I'm telling them.

And this isn't some random one-person business I'm dealing with. Today, it was *my bank* that called me to demand to know why my support request email address had "their email" in it.

You would hope a bank, operating an online banking site, would have staff that have at least a passing familiarly with email and the internet. But nope.

To make it worse, this is actually the second time my bank has gotten upset about it.

3/3

#security#hacker#ignorance
Antwortete im Thread

Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
forescout.com/research-labs/su
@bsi

Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws

Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments

PI: Stützt sich die Berichterstattung über rechtsextemistische Inhalte eines Chatverlaufs einer namentlich benannten Person auf eine von einem erstellte sog. html-Datei, muss die Authentizität der Datei und die Vertrauenswürdigkeit des Hackers besonders sorgfältig geprüft werden.

hessenlink.de/PM20250331

Ordentliche Gerichtsbarkeit HessenHohe Anforderungen an die Prüfung der Zuverlässigkeit einer QuelleDas Oberlandesgericht Frankfurt am Main hat die Beklagten zum Unterlassen verurteilt, da sie nicht nachgewiesen haben, dass die Chat-Inhalte tatsächlich vom Kläger stammten.

Manchmal ist es schon interessant was man alles in den Untiefen eines Büros finden kann, wenn es nur lange genug verwendet wird... hier in der Firma sitzt die IT seit Gründung im selben Büro, und heute habe ich auf der Suche nach etwas ganz anderen etwas gefunden was mein Vor-vor-vorgänger wohl irgendwann in den 80ern angeschafft hat.

Das "Wörterbuch für Hacker", herausgegeben 1985