Ruby Of Security – Telegram
Ruby Of Security
1.14K subscribers
151 photos
9 videos
114 files
1.03K links
Here you will find content like:

🌎 Notícias | 📡 Tecnologia | 🌐Hacking
📚 Cursos | Ferramentas | 📝Tutoriais

@DARKNET_BR
@TIdaDepressaoOficial
@ExploitHub
@AcervoDoSam

Acervo:@AcervoRubyOfSec

Group:@RubyOfSecGroup

© Ruby Of Security - 2014 - 2019
Download Telegram
Forwarded from AcervoRubyOfSec
A Historia Secreta do Homem mais procurado do Mundo! Este livro conta os bastidores das acoes de Edward Snowden e dos jornalistas que enfrentaram a pressao dos governos norte-americano e britanico para conseguir um furo historico.

O que se seguiu foi o mais espetacular vazamento de segredos de Estado de todos os tempos, realizado por um homem extraordinario. Os desdobramentos deste vazamento estremeceramas relacoes de lideres politicos de todo o mundo, de Barack Obama ao primeiro ministro britanico David Cameron, passando pelos presidentes da Franca, da Indonesia, pela chanceler alema Angela Merkel, e ate mesmo por Dilma Roussef e o alto escalao do governo brasileiro.

🌍@AcervoRubyOfSec
Falha em site da Caixa permitia que hackers enganassem e roubassem usuários
Uma falha em uma página da Caixa permitia que hackers modificassem o site para enganar usuários e, possivelmente, aplicar golpes. A vulnerabilidade estava presente em uma página do Fies (Fundo de Financiamento Estudantil) do banco brasileiro e oferecia a possibilidade de criminosos remodelarem totalmente o site...


🌎@RubyOfSec

Fonte : http://brunosampaioblog.com/2019/08/30/falha-em-site-da-caixa-permitia-que-hackers-enganassem-e-roubassem-usuarios-30-08-2019/
Google says hackers have put ‘monitoring implants’ in iPhones for years
Visiting hacked sites was enough for server to gather users’ images and contacts.
An unprecedented iPhone hacking operation, which attacked “thousands of users a week” until it was disrupted in January, has been revealed by researchers at Google’s external security team.


🌎@RubyOfSec

Fonte : https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says
Jack Dorsey: Twitter CEO's account briefly hacked
Tweets sent from account included racial slurs, profanity and a reference to ‘a bomb at Twitter HQ’ and were quickly deleted.
At 12.44pm Pacific time, the account @jack began publishing a series of tweets from the hackers. The rapid stream of tweets included racial slurs, profanity, praise for Adolf Hitler and a reference to “a bomb at Twitter HQ”. The hackers appear to refer to themselves as the “Chuckling Squad”.


🌎@RubyOfSec

Fonte : https://www.theguardian.com/technology/2019/aug/30/twitter-ceo-jack-dorsey-account-hacked
Forwarded from Acervo Priv@do
Cisco CCNA CCENT 100-105- Curso Completo e Atualizado
https://mega.nz/#F!a50RgSrB!H8LNLvc0xveJfEy4aslPUQ
====================
Cisco CCNA (200-125) - Curso Completo e Atualizado
https://mega.nz/#F!T1d2TQKD!41ROaeFPLkBKfoBkoDr0VA
====================
Cisco CCNA - Guia para Iniciantes Senha: @centralderedesvault ou @centralderedes
https://drive.google.com/file/d/0B3uiNKfQYxBddHZDalFrR1B1Z2M/view
====================
Cisco CCNA Data Center (DCICN + DCICT) v6.2 - 2018
https://mega.nz/#F!e50wnCiC!UIm3UdnacF7ggZFwjWp6ig
====================
Curso de Redes Cisco
https://mega.nz/#F!39MyzAIY!1UsdwN7h_hIlgELzZN61lQ
====================
@acervoprivado
Forwarded from burpsuite (not official)
burpsuite_pro_v2.1.zip
279.3 MB
pass: 311138
java -jar burpsuite_pro_v2.1_BurpHelper.jar
Forwarded from Tica 0x177
meu projeto esta disponivel no kickante para apoiar


https://www.kickante.com.br/campanhas/invisible-project-mesh-network


alem de apoiar com crypto, tambem é possivel apoiar com reais, usd ou outra moeda fiat
Forwarded from DARKNET BR via @like
🇧🇷 HOJE O CANAL DARKNET BRAZIL COMPLETA 3 ANOS!

🇺🇸 TODAY THE DARKNET BRAZIL CHANNEL COMPLETES 3 YEARS!

👥 GP: @darknet_brazil
👤: @XonionX

©️ ÐƗǤƗƬᗩᒪ ᖇᕮSISƬᕮᘉᑕᕮ 2016 ~ 2019
IBM lança materiais didáticos sobre computação quântica.

Programar um computador quântico é uma disciplina bastante diferente da programação em computadores tradicionais.
Os computadores quânticos são bastante diferentes, em nível arquitetural, dos computadores tradicionais, e a IBM, uma das maiores empresas de TI do mundo e que se investe na área, lança materiais didáticos sobre computação quântica.

A programação de computadores quânticos, é lógico, é igualmente diferente: os computadores quânticos usam qubits, não bits.

As propriedades dos qubits são fundamentalmente o que potencializa o potencial dos computadores quânticos, embora aprender a aproveitar os qubits efetivamente exija uma maneira diferente de pensar.

Não é totalmente diferente, no entanto, como o Q System da IBM pode ser programado usando Python, fornecendo uma linguagem familiar para os desenvolvedores começarem.


🌎@RubyOfSec

Fonte: https://sempreupdate.com.br/ibm-lanca-materiais-didaticos-sobre-computacao-quantica/
Lilu/Lilocked ransomware has now infected thousands of Linux servers

Lilu (also known as Lilocked) is a relatively new ransomware that is specifically targeting Linux servers. The ransomware has been infecting systems since mid-July and has so far attacked at least 6700 systems. Lilu targets specific file types (like HTML, PHP, and image files) and alters their file extension to ".lilocked." The ransomware also leaves a note instructing affected users to access an Onion site and pay either 0.03 BTC or US $325 to decrypt file affected files. 


🌎@RubyOfSec

Fonte : https://www.notebookcheck.net/Lilu-Lilocked-ransomware-has-now-infected-thousands-of-Linux-servers.434547.0.html
Machine Learning With Microcontrollers Hack Chat

We’ve gotten to the point where a $35 Raspberry Pi can be a reasonable alternative to a traditional desktop or laptop, and microcontrollers in the Arduino ecosystem are getting powerful enough to handle some remarkably demanding computational jobs. But there’s still one area where microcontrollers seem to be lagging a bit: machine learning. Sure, there are purpose-built edge-computing SBCs, but wouldn’t it be great to be able to run AI models on versatile and ubiquitous MCUs that you can pick up for a couple of bucks?...


🌎@RubyOfSec

Fonte : https://hackaday.com/2019/09/09/machine-learning-with-microcontrollers-hack-chat/
Security issues and vulnerabilities across popular IoT devices have almost doubled in last 5 years


The set of newly discovered vulnerabilities affects devices offered by vendors like Belkin, TP-Link, Asus, and Linksys.

A total of 125 vulnerabilities have identified across 13 wireless routers and NAS devices.

As the Internet-connected devices become smarter and efficient, the potential attack surface for cyberattackers increases. A group of researchers has uncovered that the number of vulnerabilities has increased by two times as compared to five years earlier.
What does the finding say?

In 2013, research firm Independent Security Evaluators (ISE) had published a study about the vulnerabilities across 13 SOHO wireless routers and NAS devices. The study ‘SOHOplessly Broken 1.0 had revealed that these devices offered by vendors like Belkin, TP-Link, Asus, and Linksys were affected by a total of 52 vulnerabilities.

However, in a follow-up study, the ISE has examined that the same number of devices are now affected by a total of 125 vulnerabilities...


🌎@RubyOfSec

Fonte : https://cyware.com/news/security-issues-and-vulnerabilities-across-popular-iot-devices-have-almost-doubled-in-last-5-years-5eee3483


U.S. Department of Treasury imposes sanctions targeting three North-Korean hacking groups

The three threat actor groups are Lazarus, Bluenoroff, and Andariel.

OFAC believes that these groups are controlled by Pyongyang’s primary intelligence bureau, Reconnaissance General Bureau (RGB).

The Office of Foreign Assets Control (OFAC) has identified three North-Korean hacking groups that are responsible for widespread attacks on critical infrastructures. The three threat actor groups are Lazarus, Bluenoroff, and Andariel. OFAC believes that these groups are controlled by Pyongyang’s primary intelligence bureau, Reconnaissance General Bureau (RGB). Hence, it has effectively demanded that global banks should block any transactions related to the groups.

What are the targets?

These groups are known for conducting large scale attacks against the government, military, financial, manufacturing, publishing, media, entertainment, and international shipping companies.

“Treasury is taking action against North Korean hacking groups that have been perpetrating cyberattacks to support illicit weapon and missile programs,” said Sigal Mandelker, Treasury Under Secretary for Terrorism and Financial Intelligence...


🌎@RubyOfSec

Fonte : https://cyware.com/news/us-department-of-treasury-imposes-sanctions-targeting-three-north-korean-hacking-groups-3ea681dd
iOS 13 passcode bypass bug allows access to victim’s phone book

A passcode bypass flaw has been discovered in iOS 13, which is scheduled to go live next week.

This vulnerability allows the attacker access to the victim’s phone book, including contact names and email addresses.

Jose Rodriguez, a security researcher has reported a vulnerability that allows hackers to harvest contact details from the victim’s phonebook on locked devices. This vulnerability exists in the beta version of iOS 13.

What is a passcode bypass?

A passcode bypass is a vulnerability that allows access to the content on a device without proper authorization...


🌎@RubyOfSec

Fonte : https://cyware.com/news/ios-13-passcode-bypass-bug-allows-access-to-victims-phone-book-202728ab