kpwn, to infosec

Wondering what CVEs are being discussed on Mastodon right now?

I've just launched https://cvecrowd.com, a website that shows you exactly that!

Learn more below 🧵

jsrailton, (edited ) to poland
@jsrailton@mastodon.social avatar

BREAKING: spyware abused in 🇵🇱 under previous PiS-party government, confirms the new PM Donald Tusk

"Very, very long" victim list.

Vindication.

When we @citizenlab first confirmed the hacking in 2021 both we & victims were targeted w/extensive harassment & disinformation.

REPORT: https://apnews.com/article/poland-government-pegasus-spyware-tusk-duda-78420fc7099401926d28b5be98669192

beejjorgensen, to hacking
@beejjorgensen@mastodon.sdf.org avatar

Hacking a Philips toothbrush head to allow you to use it beyond its normal lifetime. Yes, the toothbrush head is hackable. This is a fantastic tale of reverse engineering. Be sure to read the followup at the bottom of the article.

https://kuenzi.dev/toothbrush/

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Vielleicht könntet ihr mein Anliegen streuen: Für ein längeres Radiostück suche ich Hacktivists, die mit mir reden würden. Gerne anonym, wir können die Stimme verändern oder sogar die verwendeten Audios neu einsprechen. Mir geht es um politisch motivierte "Hacks & Leaks."
Ich bin per Signal, Threema und Matrix erreichbar (s. Bio) und verspreche natürlich absolute Vertraulichkeit.
#cybersecurity #hacking

PogoWasRight, to SEC
tinker, to infosec

So some of you might remember this post (and the subsequent demonstration on national news) of using a voice cloning tool (AI, Audio Deep Fake) by @racheltobac

Link to post: https://infosec.exchange/@racheltobac/110963070495263373

(If you haven't seen it, go watch it. Rachel is amazing.)

I'd never needed to do a similar attack before, but! I was just tasked yesterday with researching it.

Asked some friends for a turn-key solution to clone voices. Got pointed to a website. Signed up for $1 a month (first month... then it goes to $5 a month thereafter).

Pulled some audio of my mark down from a youtube interview (a podcast works great too).

Only needed a minute's worth of audio.

Uploaded it to the website for cloning.

Typed out a quick script for the voice to read.

30 seconds later, I had my cloned audio.

It was so good, that it even included natural voice inflections AND!!! verbal pauses like umm's and uhh's that matched the mark's original presentation. I can't tell the difference between the cloned voice and the original person.

Y'all... voice cloning and audio deep fakes are well past the ease of "script-kiddy" level. Anyone can do it.

#infosec #hacking #socialEngineering #scams #deepfake #AI #phishing #vishing

icm, to retrocomputing
@icm@mastodon.sdf.org avatar

Have you logged in to a PDP-10 today? Access our Remote Systems with information available at https://icm.museum

Tire kickers welcome and permanent accounts available by request.

#retrocomputing #vintagecomputing #lisp #hacking

greg, to hacking
@greg@clar.ke avatar

I updated my instances terms of service to say "no hacking". It was much easier than upgrading. If that doesn't work I'll block the hashtag "" and defederate from hackers.town.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

When I talk about the danger of online vanishing, and the importance of the Wayback Machine, this is the kind of jackass decision making I am talking about, among many other things.
https://gizmodo.com/cnet-deletes-thousands-old-articles-google-search-seo-1850721475

paul_denton, to hacking French
@paul_denton@mastodon.social avatar

43 millions de personnes touchées par un piratage de données chez Pôle emploi ou France Travail, les pirates ont aspiré les noms et prénoms, numéros de sécu, date de naissance, identifiants, adresses mail et postales et téléphones. Autrement dit, tout. Quelle catastrophe! https://www.francetravail.fr/candidat/soyez-vigilants/cyberattaque-soyez-vigilants.html

#Politique #Travail #PoleEmploi #FranceTravail #Hacking #cybersecurity

daniel, to Cybersecurity
@daniel@danielnorton.com avatar

Tell your Mastodon admins to apply this update ASAP!

If your server has the very latest version of Mastodon, it should be at v4.2.5, now, but the patch is available for earlier releases.

  • Fix insufficient origin validation (CVE-2024-23832, GHSA-3fjr-858r-92rw)

https://github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rw

amigalove, to linux
@amigalove@mastodon.social avatar

Linux on a Commodore 64
?!?!?!?

https://github.com/onnokort/semu-c64

"The screenshots took VICE a couple hours in 'warp mode' to generate. So, as is, a real C64 should be able to boot Linux within a week or so."

#linux #c64 #commodore #commodore64 #retrocomputing #hacking

bytephantom, to Mac
jsrailton, to infosec
@jsrailton@mastodon.social avatar

FINALLY: a 🇺🇸US official speaks the truth security researchers keep warning about...

Americans' movements being tracked with well-known weaknesses that US telcos aren't fixing.

It's remarkable how bad the problem with & is.

Must-read story by @josephcox
https://www.404media.co/cyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s/

ems, to random

https://chudbuds.lol/ has been hacked via a RAT attack. Request to all instance admin of Fediverse be more careful about your security.

paul_denton, to hacking French
@paul_denton@mastodon.social avatar

Si vous êtes comme moi déjà un peu énervé ne lisez pas cette enquête de France Info sur le piratage de nos données à Pôle Emploi pardon France Travail (et patrie). Je suis en train de bouillir... https://www.francetvinfo.fr/replay-radio/le-choix-franceinfo/piratage-de-france-travail-la-direction-avait-ete-alertee-sur-une-faille-de-securite_6536786.html

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

I received some preprocessed records from the #FBI today relating to a #FOIA request for records on Chaos Computer Club in 1987. Preprocessed means they were already released to someone else, but I am not sure they were ever released publicly?
#CCC #hacker #hacking #history #histodons

paul_denton, to Cybersecurity French
@paul_denton@mastodon.social avatar

Silence du gouvernement après le piratage massif de données de France Travail: 43 millions de Français sur... 20 ans, un boulevard pour l'usurpation d'identité. Il y a bien une ministre au numérique, Marina Ferrari, aux abonnées absentes. La CNIL dit "accompagner l'organisme" pour l'aider à "informer les personnes concernées". 43 millions de Français, cela mériterait plus une sanction, non? https://www.cnil.fr/fr/france-travail-la-cnil-enquete-sur-la-fuite-de-donnees-et-donne-des-conseils-pour-se-proteger

#Politique #FranceTravail #PoleEmploi #Cybersecurity #Hacking #Gouvernement

crowgirl, to tech
@crowgirl@hachyderm.io avatar

I have exciting news. My new O'Reilly book Hacker Culture: A to Z (which is already available in paperback and eBook) will be available in audiobook format on January 9th 2024.

You should be able to preorder the audiobook from audiobooks.com, Google Play, Barnes & Noble, and other retailers about 30 days before publication. Which means very soon.

I will share preorder links very soon. #tech #cybersecurity #infosec #hacking

Back cover. Text: "O'REILLY "Few tech books deserve the moniker "page-turner," but Kim Crawley deserves that praise-and more-for Hacker Culture A to Z. Nerds and makers of a certain age will find fun nostalgia on every page, while everyone will discover plenty of new, often overlooked details along the way. Our tech history has such a rich and diverse cast of characters and gadgets. They all spring to life under Crawley's insightful gaze. I'm earnestly hoping for a second volume!" -Marc Loy, Author of Learning Java, 6th Edition Hacker Culture A to Z A FUN GUIDE TO THE PEOPLE, IDEAS, AND GADGETS THAT MADE THE TECH WORLD Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. • Understand the relationship between hacker culture and cybersecurity... "

admin, (edited ) to psychology

UPDATE:

Zoom Video and Zoom Info are TWO DIFFERENT companies. Sorry everyone.

Still not a bad idea to get out of their database however.

This is Zoom's privacy policy. It is an amazing piece of legal engineering granting them the rights to buy, sell, and gather just about any data about business users they want -- including listing you in a Business or Professional Profile (the "directory"):

<https://www.zoominfo.com/about-zoominfo/privacy-policy>

This is their form to opt-out of all tracking in their database which they use to sell your information to 3rd parties. Somewhat ironically, this page won't work unless you turn-off Privacy Badger and Ghostery web browser plug-ins:

<https://www.zoominfo.com/privacy-center/update/remove>

If you use Zoom at work through a business account and don't wish to be listed, consider opting out. They are also collecting information from around the Web outside of Zoom apparently to help build out your profile.

#psychology #neurology #socialwork #psychiatry @psychology@a.gup.pe @socialwork@a.gup.pe @psychiatry@a.gup.pe #mentalhealth #psychotherapists @psychotherapists@a.gup.pe #cookies #tracking #hacking #3rdpartytrackers #HIPAA #privacy #dataprivacy #webbeacons #videoconference #televideo #telehealth #zoom #databrokers
realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Finally getting this blog published, on how the year 1983 changed the way #hackers were seen in pop culture and the news forever. I cover WarGames, Whiz Kids & #hacking groups the 414s & Inner Circle.
#hacker #history #histodons
https://realhackhistory.org/2023/09/29/1983-the-year-pop-culture-caught-up-with-hackers/

icm, to history
@icm@mastodon.sdf.org avatar

CREATE and DESTROY historical UNIX Systems where you are the SYSTEMS ADMINISTRATOR.

https://unix50.org

Presented by the SDF Computer Museum

#unix #history #retrocomputing #sysadmin #root #hacking

dannyjpalmer, to Cybersecurity

Ah yes, the insider threat...

Also, the company being hacked would probably call this a sophisticated cyber attack. #cybersecurity #hacking

(Comic via Extrafabulous Comics, which I don't think is on here)

SDF, to machinelearning
@SDF@mastodon.sdf.org avatar

The SDF Plan9 Boot Camp Fall 2023 begins in a month on September 22nd and free registration is open now.

https://sdf.org/plan9

Come learn about the Plan9 operation system self-paced in a fun and friendly community environment

#learning #class #study #hacking #plan9 #unix

the source code for cat(1) in a plan9 acme buffer with a catclock

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Proof that people caught up in #hacking related investigations back in the day were not all young guys.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines