Forwarded from cRyPtHoN™ INFOSEC (EN)
regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server
The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration.
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration.
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
🥴11🖕6✍4👀4🍌3👍2🤡2
Forwarded from Privacy & Security Goys
I don’t want to neg open source since it is the best, but blindly assuming something is safe and not jewware because it is open source is a cope.
“But you can audit the code.”
Sure. Will you? If you even had the time to read 1.2 million lines, do you know what they all say? And will you get it done before the next update?
“But you can audit the code.”
Sure. Will you? If you even had the time to read 1.2 million lines, do you know what they all say? And will you get it done before the next update?
💯105👍15👏6💋4🍌1
Forwarded from Privacy & Security Goys
As we've said before, systemd is a highly complex backdoor.
Pardon the minor edit in the second image; anon's original analogy was needlessly sexual.
Pardon the minor edit in the second image; anon's original analogy was needlessly sexual.
🤣46🔥9👍7❤3🤔2🌭2🤡1🍌1
Forwarded from cKure Red
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
👍48🔥16🤯9💯2🍌2❤1
Forwarded from Privacy & Security Goys
Signal stores data locally; most of it is unencrypted and accessible by any app
https://fxtwitter.com/mysk_co/status/1809287118235070662
https://fxtwitter.com/mysk_co/status/1809287118235070662
FxTwitter / FixupX
Mysk 🇨🇦🇩🇪 (@mysk_co)
TL;DR: Don't install @signalapp for macOS, it is not secure.
I carried out this small experiment:
- I wrote a simple Python script that copies the directory of Signal's local storage to another location (to mimic a malicious script or app)
- I ran the script…
I carried out this small experiment:
- I wrote a simple Python script that copies the directory of Signal's local storage to another location (to mimic a malicious script or app)
- I ran the script…
😱42😁13🤡9🤣5👀5🍌4👍2
Forwarded from Privacy & Security Goys
Cyberopticon? More like the biggest treasure chest ever for hackers.
https://www.tomshardware.com/tech-industry/artificial-intelligence/openai-was-hacked-revealing-internal-secrets-and-raising-national-security-concerns-year-old-breach-wasnt-reported-to-the-public
https://www.tomshardware.com/tech-industry/artificial-intelligence/openai-was-hacked-revealing-internal-secrets-and-raising-national-security-concerns-year-old-breach-wasnt-reported-to-the-public
Tom's Hardware
OpenAI was hacked, revealing internal secrets and raising national security concerns — year-old breach wasn't reported to the public
Hackers have hacked away any perception of security around the latest AI code.
🤣59❤8🔥4🏆3👍2🥴2⚡1🍌1
Forwarded from Privacy & Security Goys
https://torrentfreak.com/z-library-admins-escape-house-arrest-after-judge-approves-u-s-extradition-240708/
https://torrentfreak.com/annas-archive-faces-millions-in-damages-and-a-permanent-injunction-240708/
https://torrentfreak.com/annas-archive-faces-millions-in-damages-and-a-permanent-injunction-240708/
Torrentfreak
Z-Library Admins "Escape House Arrest" After Judge Approves U.S. Extradition * TorrentFreak
After a judge in Argentina approved their extradition to the U.S., two alleged Z-Library operators escaped from house arrest and disappeared.
👍54❤27🎉21🍾7🤣3😢2🍌1🗿1
Forwarded from Privacy & Security Goys
Europol-Position-paper-on-Home-routing.pdf
4.4 MB
Europol Seeks to Break Mobile Roaming Encryption
EU’s law enforcement agency Europol is another major entity that is setting its sights on breaking encryption.
This time, it’s about home routing and mobile encryption, and the justification is a well-known one: encryption supposedly stands in the way of the ability of law enforcement to investigate.
Europol’s recent paper treats home routing not as a useful security feature, but, as “a serious challenge for lawful interception.” Home routing works by encrypting data from a phone through the home network while roaming.
EU’s law enforcement agency Europol is another major entity that is setting its sights on breaking encryption.
This time, it’s about home routing and mobile encryption, and the justification is a well-known one: encryption supposedly stands in the way of the ability of law enforcement to investigate.
Europol’s recent paper treats home routing not as a useful security feature, but, as “a serious challenge for lawful interception.” Home routing works by encrypting data from a phone through the home network while roaming.
✍41🥰4🤣2🍾2❤1🎉1🍌1
Forwarded from BlackBox (Security) Archiv
Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel.
This API is not exposed to other sites - only to *.google.com.
https://x.com/lcasdev/status/1810696257137959018
#google #chrome #extension #privacy
📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
This API is not exposed to other sites - only to *.google.com.
https://x.com/lcasdev/status/1810696257137959018
#google #chrome #extension #privacy
📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
X (formerly Twitter)
Luca Casonato 🏳️🌈 (@lcasdev) on X
So, Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel.
This API is not exposed to other sites - only to…
This API is not exposed to other sites - only to…
🤯31🤡13🍌3💅2❤1👍1💯1
Forwarded from Disclose.tv
JUST IN - "Nearly all" of AT&T's over 110 million customers' call and text interactions exposed in "hack."
https://www.disclose.tv/id/5qz9pot666/
@disclosetv
https://www.disclose.tv/id/5qz9pot666/
@disclosetv
🥴37🗿5🔥3🌭1💯1🍌1
Forwarded from Privacy & Security Goys
Media is too big
VIEW IN TELEGRAM
Trump's assassination attempt from earlier tonight.
🤣33😨18🔥6🤡5😁4🥴2🍌2🖕1
Forwarded from Privacy & Security Goys
This dysgenic freak is the shooter
💅72😁20❤3🎉3🤣3🍌2🤨1
Forwarded from Privacy & Security Goys
Last post I'll share on this, as we are living through yet another major historic event.
New York Post reports it's some 20 year old named Thomas Matthew Crooks.
https://nypost.com/2024/07/13/us-news/thomas-matthew-crooks-idd-as-gunman-who-shot-trump-during-pa-rally/
It bears repeating: Trump is not on our side. He's a zionist elitist who married off all of his children to jews.
Regardless, after the heroic optics immediately following this shooting, Trump has secured his place as the next Chief Shabbos Goy.
New York Post reports it's some 20 year old named Thomas Matthew Crooks.
https://nypost.com/2024/07/13/us-news/thomas-matthew-crooks-idd-as-gunman-who-shot-trump-during-pa-rally/
It bears repeating: Trump is not on our side. He's a zionist elitist who married off all of his children to jews.
Regardless, after the heroic optics immediately following this shooting, Trump has secured his place as the next Chief Shabbos Goy.
New York Post
Exclusive | Thomas Matthew Crooks ID'd as gunman who shot Trump during Pa. rally
The gunman who attempted to assassinate former President Donald Trump Saturday was identified as 20-year-old Thomas Matthew Crooks, sources told The Post.
💯75👍18👎6🖕4😭4🤔3🥱3🍌2⚡1
Forwarded from Surviving Weimerika
This media is not supported in your browser
VIEW IN TELEGRAM
I present to you J.D. Vance
😁45🤣24😭7🖕6💯4🥴3🌚3🥱2🍌2🌭1😡1
Forwarded from Privacy & Security Goys
Look at this nonsense: "encrypted overseas accounts." Are they talking about crypto wallets?
Boomers and other tech illiterates are going to use the Trump shooter to go after encryption and push for a national firewall, as usual.
https://fxtwitter.com/Breaking911/status/1814097332238946776
Boomers and other tech illiterates are going to use the Trump shooter to go after encryption and push for a national firewall, as usual.
https://fxtwitter.com/Breaking911/status/1814097332238946776
FxTwitter / FixupX
Breaking911 (@Breaking911)
BREAKING: Trump shooter Thomas Crooks had “3 encrypted overseas accounts” — Rep. Michael Waltz (R–FL)
💯54🤬12🍌4🖕4👍3🤣2👎1
Forwarded from Privacy & Security Goys
Major internet outage involving CrowdStrike.
Probably easily the biggest ever: airports and airlines, trains, banks, tv networks, Disneyland, etc down.
Black swan? Or the inevitable result of chicken bones and human feces entering the Windows kernel update?
https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/
Probably easily the biggest ever: airports and airlines, trains, banks, tv networks, Disneyland, etc down.
Black swan? Or the inevitable result of chicken bones and human feces entering the Windows kernel update?
https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/
WIRED
Huge Microsoft Outage Caused by CrowdStrike Takes Down Computers Around the World
A software update from cybersecurity company CrowdStrike appears to have inadvertently disrupted IT systems globally.
🎉49⚡4🥰4🤔3👍1🔥1😁1🍾1
Forwarded from Privacy & Security Goys
In honor of Shut the Fuck Up Friday, I'd like to remind those who treat public Telegram chats like their own personal diary that people are constantly backing it up.
Archivist group "the-eye" downloaded some 3.8TB of content from 184 "anti-social" Telegram chat rooms and channels, including news reporters like @intelslava, @CIG_telegram, and @BellumActaNews, as well as @censormedaddy, @EsotericHitlerism, and @NordicFrontierChat.
https://the-eye.eu/tasra/
Archivist group "the-eye" downloaded some 3.8TB of content from 184 "anti-social" Telegram chat rooms and channels, including news reporters like @intelslava, @CIG_telegram, and @BellumActaNews, as well as @censormedaddy, @EsotericHitlerism, and @NordicFrontierChat.
looking at the collection a little closer it became very evident just how much data people are spewing into Telegram all day every day. Conversations, announcements, video/image and document sharing- Telegram is used for all of this and more
We have collected and presented the data exactly as it appeared in the publicly open and accessible channels. Usernames of anyone taking part in any of the chat-based channels have been left intact. We believe in the preservation of historical context as it happened. There is no expectation of privacy in a public forum.
https://the-eye.eu/tasra/
👍64👀25😐6🙈5❤4🤣2⚡1🤡1
Forwarded from Privacy & Security Goys
Media is too big
VIEW IN TELEGRAM
It was not preached to the crowd
It was not taught by the state
No man spoke it aloud
When the weeb began to hate
It was not taught by the state
No man spoke it aloud
When the weeb began to hate
🔥63🤣37🤡7😢3👍2👎2
Forwarded from Privacy & Security Goys
A follower posed a theoretical situation to us:
Firstly, Feds will have installed rootkits and keyloggers on these seized devices. If there are files that haven't been backed up, you could create an image of the disk. After you have copied files from both devices, wipe and discard them.
As far as Bitlocker's encryption is concerned, the key backup is stored on the cloud, so law enforcement should always be able to unlock it. Inexperienced small town sheriff departments may not know any better, but any professional agency need only ask Microsoft for what they need – no warrant required.
Let's suppose that my devices are confiscated by FBI.
My computer has bitlocker on and my old Samsung phone has a password of 8 characters .
It has been 4 months and still they couldn't open it, if they give up and give back my devices, should it be safe to type my password?
Firstly, Feds will have installed rootkits and keyloggers on these seized devices. If there are files that haven't been backed up, you could create an image of the disk. After you have copied files from both devices, wipe and discard them.
As far as Bitlocker's encryption is concerned, the key backup is stored on the cloud, so law enforcement should always be able to unlock it. Inexperienced small town sheriff departments may not know any better, but any professional agency need only ask Microsoft for what they need – no warrant required.
✍88👍12💯10👏3👨💻3❤1