Fake-SMS: A Malware Hunting Story
https://ift.tt/fZgHGSc
Submitted March 22, 2024 at 02:30AM by ssj_aleksa
via reddit https://ift.tt/NgMHmJD
https://ift.tt/fZgHGSc
Submitted March 22, 2024 at 02:30AM by ssj_aleksa
via reddit https://ift.tt/NgMHmJD
Medium
Fake-SMS: How Deep Does the Rabbit Hole Really Go?
Tracking a Bad Actor Through the Maze of Obfuscated Malware Code
Side-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)
https://gofetch.fail/
Submitted March 22, 2024 at 07:57AM by LordAlfredo
via reddit https://ift.tt/N32QGuO
https://gofetch.fail/
Submitted March 22, 2024 at 07:57AM by LordAlfredo
via reddit https://ift.tt/N32QGuO
gofetch.fail
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
A new microarchitectural side-channel attack exploiting data memory-dependent prefetchers in Apple silicons.
We need product security community
https://ift.tt/QVZuGcF
Submitted March 22, 2024 at 12:23PM by samsbp97
via reddit https://ift.tt/ZXfvzB2
https://ift.tt/QVZuGcF
Submitted March 22, 2024 at 12:23PM by samsbp97
via reddit https://ift.tt/ZXfvzB2
Random Access Memory
We need Product Security Community
Gaps in information security communities for product security engineers
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness
https://ift.tt/exs5SH1
Submitted March 22, 2024 at 02:16PM by barakadua131
via reddit https://ift.tt/G4kSO1U
https://ift.tt/exs5SH1
Submitted March 22, 2024 at 02:16PM by barakadua131
via reddit https://ift.tt/G4kSO1U
Mobile Hacker
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
This critical security issue allows third party user to record audio from Bluetooth speaker with built-in microphone in vicinity, even when it is already paired and connected with another device. This can result in eavesdropping on private conversations using…
Tool to quickly extract all URLs and paths from web pages.
https://ift.tt/tyg1k6d
Submitted March 23, 2024 at 06:55PM by SmokeyShark_777
via reddit https://ift.tt/ZMqiN7k
https://ift.tt/tyg1k6d
Submitted March 23, 2024 at 06:55PM by SmokeyShark_777
via reddit https://ift.tt/ZMqiN7k
GitHub
GitHub - trap-bytes/gourlex: Gourlex is a simple tool that can be used to extract URLs and paths from web pages.
Gourlex is a simple tool that can be used to extract URLs and paths from web pages. - trap-bytes/gourlex
How to continue learning without any rewards.
http://tryhackme.com
Submitted March 23, 2024 at 08:31PM by ashuraj_143
via reddit https://ift.tt/KH4gesQ
http://tryhackme.com
Submitted March 23, 2024 at 08:31PM by ashuraj_143
via reddit https://ift.tt/KH4gesQ
TryHackMe
TryHackMe | Cyber Security Training
TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!
Basic noscript to generate reverse shell payloads, generally most used in ctf.
https://ift.tt/mfTZBx5
Submitted March 23, 2024 at 08:29PM by m0rg4
via reddit https://ift.tt/TdnNpHL
https://ift.tt/mfTZBx5
Submitted March 23, 2024 at 08:29PM by m0rg4
via reddit https://ift.tt/TdnNpHL
GitHub
GitHub - washingtonP1974/Rev-Shell: Basic noscript to generate reverse shell payloads, generally most used in ctf.
Basic noscript to generate reverse shell payloads, generally most used in ctf. - washingtonP1974/Rev-Shell
What are Honeypots, their Uses and how to set one up for networks
https://ift.tt/RcmhfCT
Submitted March 23, 2024 at 10:42PM by Altrntiv-to-security
via reddit https://ift.tt/yEZoke7
https://ift.tt/RcmhfCT
Submitted March 23, 2024 at 10:42PM by Altrntiv-to-security
via reddit https://ift.tt/yEZoke7
DarkRelay
What is a honeypot?
Honeypots is catfishing in the world of cybersecurity – no candlelit dinners, just firewalls and encrypted love letters to trap hackers!IntroductionIn the ever-evolving landscape of cybersecurity, staying one step ahead of malicious actors is not just a challenge…
GitHub - ZephrFish/ChunkyIngress: Chunking Text Ingress
https://ift.tt/EdQAB1O
Submitted March 24, 2024 at 05:39AM by ZephrX112
via reddit https://ift.tt/tFshdxk
https://ift.tt/EdQAB1O
Submitted March 24, 2024 at 05:39AM by ZephrX112
via reddit https://ift.tt/tFshdxk
GitHub
GitHub - ZephrFish/ChunkyIngress: Leverages B64 chunks to split files and save to clipboard
Leverages B64 chunks to split files and save to clipboard - ZephrFish/ChunkyIngress
Wi-Fi “First Aid” Kit
https://ift.tt/BjJ63DC
Submitted March 24, 2024 at 05:04AM by wirelessbits
via reddit https://ift.tt/BeJIv2n
https://ift.tt/BjJ63DC
Submitted March 24, 2024 at 05:04AM by wirelessbits
via reddit https://ift.tt/BeJIv2n
Medium
Wi-Fi “First Aid” Kit
As I was doing a little seasonal cleaning recently I worked my way through all my tech gear and took stock of everything associated with my…
Bootfuzz: MBR-based Fuzzer
https://ift.tt/dlBNwcC
Submitted March 24, 2024 at 08:06AM by lightgrains
via reddit https://ift.tt/H5SyPeV
https://ift.tt/dlBNwcC
Submitted March 24, 2024 at 08:06AM by lightgrains
via reddit https://ift.tt/H5SyPeV
GitHub
GitHub - nstarke/bootfuzz: A MBR Fuzzer
A MBR Fuzzer. Contribute to nstarke/bootfuzz development by creating an account on GitHub.
Security Advisory: Remote Command Execution in Cisco Access Point WAP Products
https://ift.tt/J2DwBIX
Submitted March 25, 2024 at 11:40AM by g_e_r_h_a_r_d
via reddit https://ift.tt/k0fQ1gs
https://ift.tt/J2DwBIX
Submitted March 25, 2024 at 11:40AM by g_e_r_h_a_r_d
via reddit https://ift.tt/k0fQ1gs
Onekey
Security Advisory: Remote Command Execution in Cisco Access Point WAP Products | ONEKEY Research | Research | ONEKEY
Learn about the vulnerabilities affecting Cisco's WAP371 and other Small Business Wireless APs, and the importance of binary static analysis.
New OpenSecurityTraining2 class: "Architecture 1005: RISC-V Assembly" by Xeno Kovah (~28 hours)
https://ift.tt/5jdC6mR
Submitted March 25, 2024 at 04:58PM by OpenSecurityTraining
via reddit https://ift.tt/2DapSPc
https://ift.tt/5jdC6mR
Submitted March 25, 2024 at 04:58PM by OpenSecurityTraining
via reddit https://ift.tt/2DapSPc
p.ost2.fyi
Architecture 1005: RISC-V Assembly
This class teaches RISC-V assembly language. It requires you know C programming.
Metasploit Framework 6.4 Released
https://ift.tt/qVmgu76
Submitted March 25, 2024 at 08:16PM by Fugitif
via reddit https://ift.tt/h08xUsw
https://ift.tt/qVmgu76
Submitted March 25, 2024 at 08:16PM by Fugitif
via reddit https://ift.tt/h08xUsw
Rapid7
Metasploit Framework 6.4 Released | Rapid7 Blog
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms
https://ift.tt/UQzLIy4
Submitted March 26, 2024 at 05:49AM by netsec_burn
via reddit https://ift.tt/FVMvgqE
https://ift.tt/UQzLIy4
Submitted March 26, 2024 at 05:49AM by netsec_burn
via reddit https://ift.tt/FVMvgqE
Computer Security Group
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms - Computer Security Group
Our work shows that it is possible to trigger Rowhammer bit flips on DDR4 devices on AMD Zen 2 and Zen 3 systems despite deployed TRR mitigations. This result proves that AMD systems are equally vulnerable to Rowhammer as Intel systems, which greatly increases…
GitHub - TracecatHQ/tracecat: 😼 The AI-native, open source alternative to Tines / Splunk SOAR.
https://ift.tt/iy1a2cv
Submitted March 26, 2024 at 08:03AM by supernetworks
via reddit https://ift.tt/pqE8Qv2
https://ift.tt/iy1a2cv
Submitted March 26, 2024 at 08:03AM by supernetworks
via reddit https://ift.tt/pqE8Qv2
GitHub
GitHub - TracecatHQ/tracecat: All-in-one AI automation platform (workflows, agents, cases, tables) for security and IT teams.
All-in-one AI automation platform (workflows, agents, cases, tables) for security and IT teams. - TracecatHQ/tracecat
Frida on Java applications and applets in 2024
https://ift.tt/woZ8Rqp
Submitted March 26, 2024 at 02:57PM by 0xdea
via reddit https://ift.tt/s9Qke5J
https://ift.tt/woZ8Rqp
Submitted March 26, 2024 at 02:57PM by 0xdea
via reddit https://ift.tt/s9Qke5J
hn security
Frida on Java applications and applets in 2024 - hn security
As explained in Federico‘s latest article, […]
Inside the shadowy global battle to tame the world’s most dangerous technology
https://ift.tt/xuCwV6N
Submitted March 26, 2024 at 02:44PM by enkrstic
via reddit https://ift.tt/Tz4W89f
https://ift.tt/xuCwV6N
Submitted March 26, 2024 at 02:44PM by enkrstic
via reddit https://ift.tt/Tz4W89f
POLITICO
US and EU don’t agree on AI rules. Will China step in? – POLITICO
Can anyone control AI?
Glitching in 3D: Low Cost EMFI Attacks
https://ift.tt/X5jezWR
Submitted March 26, 2024 at 05:09PM by wrongbaud
via reddit https://ift.tt/mopdCbe
https://ift.tt/X5jezWR
Submitted March 26, 2024 at 05:09PM by wrongbaud
via reddit https://ift.tt/mopdCbe
ShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wild
https://ift.tt/BbnimS2
Submitted March 26, 2024 at 04:42PM by cov_id19
via reddit https://ift.tt/VCRA62b
https://ift.tt/BbnimS2
Submitted March 26, 2024 at 04:42PM by cov_id19
via reddit https://ift.tt/VCRA62b
www.oligo.security
ShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wild | Oligo Security
The Oligo research team discovered a live crypto miner campaign targeting a vulnerability in Ray, a widely used open-source AI framework.
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
https://ift.tt/WwbHJ9Q
Submitted March 26, 2024 at 04:40PM by barakadua131
via reddit https://ift.tt/BE3zWqp
https://ift.tt/WwbHJ9Q
Submitted March 26, 2024 at 04:40PM by barakadua131
via reddit https://ift.tt/BE3zWqp
Mobile Hacker
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
BlueDucky solves the problem of auto device discovery, locally stores found Bluetooth devices and utilized Rubber Ducky noscripts that are injected from separated