"Geschenk für Cyberkriminelle": Im Darknet stehen Passwörter Dutzender deutscher Politiker

Mit #Wurm-Potenzial:
#Kritische #Windows-Lücken lassen #Hacker #Malware einschleusen.
Angreifer können durch #LDAP- und #RDS-Lücken in #Windows aus der Ferne und ohne Nutzerinteraktion #Schadcode ausführen. Auch #Office ist angreifbar.
Zum #April-Patchday hat #Microsoft am Dienstag #Patches für insgesamt 135 #Sicherheitslücken in seinen Produkten bereitgestellt.
Seeking a very specific kind of #hacker help here... Does anyone know how to override the temperature limits on this Honeywell Home thermostat?
@deviantollam I've heard you mention it for hotel thermostats - any idea if it can be done for consumer-grade?
Il 19enne membro della cyber-gang d’élite Scattered Spider rischia 60 anni di reclusione
Link all'articolo : https://www.redhotcyber.com/post/il-19enne-membro-della-cyber-gang-delite-scattered-spider-rischia-60-anni-di-reclusione/
Un membro del gruppo #hacker di Scattered Spider, è stato accusato di furto di criptovaluta su larga scala e #operazioni di hacking dei #sistemi aziendali. Noah Michael Urban è stato arrestato all’inizio del 2024 , patteggiando le accuse in Florida, dove è stato accusato di #frode e furto di #identità.
Hi guys, I have tried the #CC1101 from #Lilygo. It is important that you pay attention to the identification CC1101 if you want to reproduce this yourself, because the device is also sold under other identifiers with a different range of functions and looks exactly the same.
It is a #hacker #tool with which you can record and analyze #Wifi, #Bluetooth, #NFC and #Lora signals. You can also use it as a #BadUSB #development tool. It is much cheaper than a #FlipperZero, but also has a smaller range of functions.
It is somewhat disappointing that the default firmware supplied is only suitable for testing the screen, LEDs and controls. It is otherwise useless and should therefore be replaced immediately.
For my first test I choose the #firmware from #CapibaraZero: https://capibarazero.com
It is very easy to #install via the #browser. However, my Firefox refused to do this, which is why I used Thorium (a free Chrome variant): https://flash.capibarazero.com
READ FULL POST here: https://0.0g.gg/?1d21337660218bf2#2XG9iGKx2sFTbdLP7KYNbde2LvsXmyBeWfpsMu1PPirm
Stay tuned and follow me if you don't want to miss it and I'll tell you what you can do with the device.
#software #utility #test #unbox #nerd #hacker #coder #scanner #scan #signal
Going to write a blog about how I view this as a major turning point in the #hacking subculture. Erik Bloodaxe publicly stated at Summercon #hacker convention in 1992 that ratting out fellow #hackers to the FBI over hacker beef was actually the correct and proper thing to do.
https://phrack.org/issues/40/11
The thing that happens is, I create a new unique address for a business I'm dealing with. I put the company's name in the local-part of the email address I give them (that's the part before the "@" symbol in an email address).
And then they contact me demanding to know why (or how) I'm using "their" email. They see their company name or domain name in the local-part of my address and get incensed, thinking it's impossible, or illegal even. It makes no sense; would the greeting card mafia have a case against a big webmail provider if one of their users created the "hallmark@BigWebmailProviderDomain" address?
On more than one occasion, I have picked up the phone to find someone YELLING at me about "hacking their server" because of this.
I spend some time explaining it to them. Half the time, they kinda/sorta get it and calm down. The other half refuse to even stop yelling and think about what I'm telling them.
And this isn't some random one-person business I'm dealing with. Today, it was *my bank* that called me to demand to know why my support request email address had "their email" in it.
You would hope a bank, operating an online banking site, would have staff that have at least a passing familiarly with email and the internet. But nope.
To make it worse, this is actually the second time my bank has gotten upset about it.
3/3
Die Babuk Ransomware Gruppe (babuk-bjorka) hat heute auf ihrer Website im Darknet bekanntgegeben, dass sie Rheinmetall Defence (rheinmetall.com) gehackt hat.
Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
https://www.forescout.com/research-labs/sun-down-a-dark-side-to-solar-energy-grids/
@bsi
Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws
Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments
DDoS Attacks (HTTP/2, DNS, Hacktivist)
This is Real World Technical Analysis
YouTube video: https://youtu.be/t2jKcA1OyBE
#Sponsored #cybersecurity #ddos #dos #DNS #http #tls #hack #hacker #hacking #cyber #internet Radware
Die letzte der frühen #hacker.innen hat mit 101 Jahren den Weg über den angetreten.
Nordkoreanische "IT-Krieger" bewerben sich verstärkt für Remote-Jobs in Deutschland und Europa. Ziel: Zugang zu Geschäftsgeheimnissen und mögliche Erpressungsversuche. #Cybersecurity #Hacker #Nordkorea https://winfuture.de/news,150046.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Etliche sensible #Daten von Kunden von #Samsung #Deutschland wurden nun geklaut und werden im Darknet verkauft. Dabei sind auch Namen, Telefonnummern und Adressen. Der #Hacker hatte erschreckend leichtes Spiel. https://winfuture.de/news,150009.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
#KI und #Cybersecurity
Wie uns KI vor #Hacker-Angriffen schützen kann
Für die #IT-Sicherheit ist Künstliche Intelligenz längst unersetzlich. Moderne #Virenscanner hätten wohl einige der bekanntesten #Cyberangriffe der Geschichte verhindert. KI-Tools, die uns schützen sollen, können aber auch zur Gefahr werden. #podcast #datenschutz #news #nachrichten
https://www.deutschlandfunk.de/ki-cybersecurity-hackerangriffe-computerviren-sicherheit-100.html
PI: Stützt sich die Berichterstattung über rechtsextemistische Inhalte eines Chatverlaufs einer namentlich benannten Person auf eine von einem #Hacker erstellte sog. html-Datei, muss die Authentizität der Datei und die Vertrauenswürdigkeit des Hackers besonders sorgfältig geprüft werden.
Manchmal ist es schon interessant was man alles in den Untiefen eines Büros finden kann, wenn es nur lange genug verwendet wird... hier in der Firma sitzt die IT seit Gründung im selben Büro, und heute habe ich auf der Suche nach etwas ganz anderen etwas gefunden was mein Vor-vor-vorgänger wohl irgendwann in den 80ern angeschafft hat.
Das "Wörterbuch für Hacker", herausgegeben 1985