bane, to linux
@bane@exploit.social avatar

I am looking for a job. It's becoming a little urgent, so if anyone has any leads whatsoever, please send them my way.

I'm a malware guy: reversing, detection, Intel, anything really related to defending and proactive research. I can also do system administration duties when it comes to Linux. I am able to quickly pick up anything I don't already know.

jsrailton, (edited ) to poland
@jsrailton@mastodon.social avatar

BREAKING: spyware abused in 🇵🇱 under previous PiS-party government, confirms the new PM Donald Tusk

"Very, very long" victim list.

Vindication.

When we @citizenlab first confirmed the hacking in 2021 both we & victims were targeted w/extensive harassment & disinformation.

REPORT: https://apnews.com/article/poland-government-pegasus-spyware-tusk-duda-78420fc7099401926d28b5be98669192

epixoip, to random

Happy !

I've cracked billions of from tens of thousands of in the past 12+ years, and because of this, I likely know at least one for 90% of people on the Internet. And I'm not alone! While I primarily crack breached passwords for research purposes and the thrill of the sport, others are selling your breached passwords to criminals who leverage them in and attacks.

How can you keep your accounts safe?

  • Use a ! I recommend @bitwarden and @1password

  • Use a style - four or more words selected at random - for passwords you have to commit to memory, like your master password!

  • Enable MFA for important online accounts, including cloud-based password managers!

  • Harden your master password by tweaking your password manager's KDF settings! For , use Argon2id with 64MB memory, 3 iterations, 4 parallelism. For and other PBKDF2 based password managers, set the iteration count to at least 600,000.

  • Use unique, randomly generated passwords for all your accounts! Use your password manager to generate random 14-16 character passwords for everything. Modern password cracking is heavily optimized for human-generated passwords, because humans are highly predictable. Randomness defeats this and forces attackers to resort to incremental brute force! There's no trick you can do to make a secure, uncrackable password on your own - your meat glob will only betray you.

  • Use an ad blocker like Origin to keep you safe from password-stealing and other browser based threats!

  • Don't fall for attacks and other social engineering attacks! Browser-based password managers help defend against phishing attacks because they'll never autofill your passwords on fake login pages. Think before you click, and never give your passwords to anyone, not even if they offer you chocolate or weed.

  • : require ad blockers, invest in an enterprise password management solution, audit password manager logs to ensure employes aren't sharing passwords outside the org, implement a Fine Grained Password Policy that requires a minimum of 20 characters to encourage the use of long passphrases, implement a password filter to block commonly used password patterns and compromised passwords, disable authentication and disable RC4 for , disable legacy broadcast protocols like LLMNR and NBT-NS, require mandatory signing, use Group Managed Service Accounts instead of shared passwords, monitor public data breaches for employee credentials, and crack your own passwords to audit the effectiveness of your password policy and user training!

ppival, to random
@ppival@glammr.us avatar

Yikes, I had that one from a long time ago!

Uninstall NightOwl From Your Mac ASAP https://lifehacker.com/uninstall-nightowl-from-your-mac-asap-1850721644

kuketzblog, to microsoft German
@kuketzblog@social.tchncs.de avatar

Nach meiner Einschätzung sind nicht nur große Teile der Microsoft-O365-Service kompromittiert, sondern auch alle Windows-Rechner, die damit verbunden waren. Ein Super-Gau epischen Ausmaßes - scheint vielen aktuell nicht klar zu sein. 🤷‍♂️ 👇

https://www.heise.de/news/Neue-Erkenntnisse-Microsofts-Cloud-Luecken-viel-groesser-als-angenommen-9224640.html

spaf, to Cybersecurity
@spaf@mstdn.social avatar

Today is the 35th anniversary of the Internet Worm.

"Ancient history," you say? Or perhaps, "What's that?"

Read my blog post about it to get my perspective on why it is important:
https://www.cerias.purdue.edu/site/blog/post/reflecting_on_the_internet_worm_at_35/

#cybersecurity #malware #security

jsrailton, (edited ) to hacking
@jsrailton@mastodon.social avatar

BREAKING: private investigator arrested for cyberespionage on behalf of American PR firm.

Caught by UK under from 🇺🇸US while boarding a flight.

BIG TWIST in a wild case that began w/our @citizenlab investigation into indian hack-for-hire group

Sound familiar?

Because Amit Forlit is the second PI from arrested in similar way for this case.

First = convicted.

https://www.reuters.com/world/israeli-private-eye-arrested-uk-over-alleged-hacking-us-pr-firm-2024-05-02/

jsrailton, (edited )
@jsrailton@mastodon.social avatar

There's a disgraceful ecosystem of public relations & lobbying firms using hackers for hire.

Sometimes they are used to silence critics & advocacy groups.

Like US nonprofits doing climate advocacy.

Our investigation into a group we christened uncovered a sprawling -based hack-for-hire operation.

They enabled US corporations to outsource lawbreaking.

https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/

Codeberg, to random
@Codeberg@social.anoxinon.de avatar

We saw #malware uploads to Codeberg increase in the past weeks. Although our users are likely not the target audience of these files, we still want to remind you:

Watch out and stay secured. Do not run files from untrusted authors.
On Codeberg, double-check the project's legitimacy (e.g. user age, stars / issues / activity) or the source code itself.
Visit the project's homepage and use official download sources.
Never let emails panic you, consider if it's part of a #phishing campaign.

Bluedepth, to windows
@Bluedepth@mastodon.social avatar

As a general PSA, this is the very thing I fight against every single working day of my life. An acquaintance of mine is an older lady, this popped up on her screen. She sent me this snapshot in a panic. For her, considering everything, I told her to simply turn off the machine without shutdown. Wait ten seconds and turn it back on. She’s all set, but these scams are getting disturbingly high quality. #hack #scam #malware #Windows #today

TomSellers, to security

Nice, someone registered 'ngithub [dot] com` and in some cases redirecting users to scam / malware sites. So, if you click on a stack trace message that included a new line..

somethingngithub.comYourAccountYourRepblah

.. and Slack or something else converted that to a link you're likely to end up there.

#Security #Malware

ChristinaLekati, to Cybersecurity

🚨The ENISA Threat Landscape Report 2023 was released today!

It includes the top threats, major trends observed with respect to threats, threat actors & attack techniques, impact and motivation analysis.

It also describes relevant mitigation measures.

The top 3 threats that were identified and analyzed were:

🔹 Ransomware
🔹 Malware
🔹 Social Engineering

The report is a very insightful resource, especially for those who seek to make informed decisions for their cybersecurity strategy the coming year.

https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends

thisven, to microsoft
@thisven@digitalcourage.social avatar

Using has broken , now this client turns into . ⚠️

https://social.heise.de/

Switch to a compliant and respecting and solution such as @thunderbird and @k9mail on mobile (which soon becomes for ). :awesome:

InfobloxThreatIntel, to Cybersecurity

Hi. This is Renée, the head of Infoblox Threat Intel (@knitcode). Myself and a few of my researchers are sharing this Mastodon account. Our plan is to toot about suspicious and malicious activity in DNS. Our team tends to write very in-depth papers and want to use Mastodon to complement that with nuggets we've seen, updates on the DNS threat actors or TTPs we are seeing, and articles we are reading. Here goes!

kagan, to security
@kagan@wandering.shop avatar

Oh, great. Computer security researchers have developed a proof-of-concept for a type of ransomware that would act when you try to upload a file. It would be able to encrypt any files in the folder you uploaded from, and any subfolders of it.

This is a proof-of-concept; the researchers have not seen any such attacks in the wild. But stay careful out there, okay?

Affects Chrome and Edge, but not Firefox or Safari!

https://theconversation.com/cybersecurity-researchers-spotlight-a-new-ransomware-threat-be-careful-where-you-upload-files-219560

cxiao, to ReverseEngineering

🦀 Have you been noticing that over the past two years, there seems to be more and more malware written in Rust? Have you ever wished there was one page that collected all these malware families and samples in one place, so that you could practice your Rust reverse engineering?

Here is that place! The Rust Malware Sample Gallery: https://github.com/cxiao/rust-malware-gallery

I have collected information about every Rust malware family that I could find, and scoured public malware repositories to find at least one public sample that is available for each family. Download links are provided for each sample to MalShare or Malware Bazaar, neither of which require an account for you to download the samples.

I hope that this can help reversers get a better understanding of Rust binaries, and improve the state of the art in Rust malware reversing. We have a long way to go 😅

Please send a pull request if you notice something is incorrect or missing! Happy reversing!

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

World's biggest bank hit by ransomware, forced to trade via USB stick.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/worlds-biggest-bank-hit-by-ransomware-forced-to-trade-via-usb-stick/

v, to ads Spanish
@v@mstdn.mx avatar

No se les olvide:

Extensiones de Firefox.
✅ ublock Origin
✅ Disconnect
✅ Privacy Badger
✅ Video Download Helper
✅ Bypass paywalls
✅ I dont care about cookies
✅ Ghostery
✅ LibRedirect
✅ Image search options
✅ Open subtitles
✅ Dark reader
✅ Adguard popblocker
✅ Ultra Popblocker
✅ ClearURLs
✅ SponsorBlock
✅ Facebook/Amazon container
✅ Universal Bypass
✅ Stylus
✅ Decentraleyes
✅ NoScript
✅ Cookie AutoDelete
✅ Multi-Account Container

#malware #ads #firefox #extensions

jbzfn, to opensource
@jbzfn@mastodon.social avatar

🚪 Highly invasive backdoor snuck into open source packages targets developer
➥ Ars Technica
https://arstechnica.com/security/2023/11/developers-targeted-with-malware-that-monitors-their-every-move/

#Malware #Opensource #Cybersecurity

FirehaK, to ReverseEngineering

Hey fediverse,

As many have already heard last week, Dragos had to let go about 50 people. Tuesday last week was my last day on the job, and as of today I am slowly beginning my search for a new role while allowing myself plenty of time to unwind between roles (for a change).

My role at Dragos was to reverse engineer ransomware and I would love to continue reverse engineering malware (not just ransomware) in the future. I've worked in a few different threat intelligence roles over the last several as well.

I'm located on the US East coast and am currently looking to stay remote as relocation and travel are not an option for my family.

Any leads are appreciated! My LinkedIn profile can be found at the top of my profile as well.

#malware #reverseengineering #jobs #jobsearch

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 ✈️ breach: LockBit leaks 50 GB of data
➝ 🇨🇳 World’s largest commercial bank confirms attack
➝ 🔓 ☁️ Sumo Logic alerts customers about ; advises rotate Sumo Logic API access keys
➝ 🔓 🇮🇪 Electric Ireland admits data breach that could see customer financial data compromised
➝ 🔓 🇨🇦 says ransomware data breach affects 267,000 patients
➝ 🔓 🇸🇬 Marina Bay Sands reward members data breached, over 650k people exposed
➝ 🇮🇱 🇵🇸 🇮🇷 Cyber ops linked to - conflict largely improvised, researchers say
➝ 🧨 🤖 confirms attacks behind ongoing outages
➝ 🛍️ 💸 Fake Ledger Live app in Store steals $768,000 in
➝ 🔓 🐰 ‘Looney Tunables’ Vulnerability Exploited in Attacks
➝ 🇺🇸 🇷🇺 US Sanctions Russian National for Helping Ransomware Groups Launder Money
➝ 🇮🇷 🇮🇱 Iranian Hackers Launch Destructive Cyber Attacks on Israeli and Sectors
➝ 🇫🇷 🇬🇧 , Seek Greater Regulation of Commercial
➝ 🇪🇺 🤐 is trading security for digital
➝ 🇷🇺 🇺🇦 Russian Hackers Used Attack to Disrupt Power in Amid Mass Missile Strikes
➝ 🦠 🚪 Highly invasive snuck into packages targets developers
➝ 🦠 🇰🇵 N. Korea's Blamed for Hacking Machines with ObjCShellz
➝ 🫣 tests usernames that keep your phone number private
➝ 🔐 Microsoft Authenticator now blocks suspicious alerts by default
➝ ☁️ 💰 Researchers Uncover Undetectable Technique on Automation
➝ 👥 💰 Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study
➝ 🩹 Microsoft Says Exchange ‘Zero Days’ Disclosed by Already Patched or Not Urgent
➝ 🐛 Veeam warns of critical bugs in ONE monitoring platform

📚 This week's recommended reading is: "How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language" by Dr Darryl Carlton

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-452023

bane, to infosec
@bane@exploit.social avatar

Still looking for work, if anyone is interested in getting to know me. Hit me up! Always willing to chat and nerd out about stuff.

davemark, to security
@davemark@mastodon.social avatar

😮

Incredible new malware trick, worth being aware of.

In a nutshell, the character "ķ" (note the little tail under the k) is substituted for the letter "k".

The link looks legit, because who would think to look for that little tail?

Read more here...

https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/
#Security #Malware #Google

andrewbrandt, to random
@andrewbrandt@toot.bldrweb.org avatar

Last year I was invited to present a talk at a conference called #MicrosoftDCC and spoke about a particularly vicious #botnet #malware called #qakbot.

My colleague Steeve and I had cracked the methodology for decoding their command-and-control functionality. We published our work in a blog post and presented it at #VirusBulletin, #RMISC, and #DCC.

Today, the #FBI announced that in an international operation with France, Germany, the Netherlands, Romania, Latvia, and the United Kingdom they have shut down the botnet.

I do this work to help people everywhere.

https://www.fbi.gov/news/stories/fbi-partners-dismantle-qakbot-infrastructure-in-multinational-cyber-takedown

estherschindler, to random
@estherschindler@hachyderm.io avatar

attacks against millions of repositories have been discovered. Assume all the content you host on a publicly accessible repository might be compromised.
https://cloudnativenow.com/topics/cloudnativedevelopment/docker/jfrog-reveals-docker-hub-compromise-spanning-millions-of-repositories/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • khanakhh
  • mdbf
  • InstantRegret
  • Durango
  • Youngstown
  • rosin
  • slotface
  • thenastyranch
  • osvaldo12
  • ngwrru68w68
  • kavyap
  • cisconetworking
  • DreamBathrooms
  • megavids
  • magazineikmin
  • cubers
  • vwfavf
  • modclub
  • everett
  • ethstaker
  • normalnudes
  • tacticalgear
  • tester
  • provamag3
  • GTA5RPClips
  • Leos
  • JUstTest
  • All magazines