Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Hugging Face Transformers Users Beware: Remote Code Execution Vulnerability Exposed (#CVE-2024-11392)
https://undercodenews.com/hugging-face-transformers-users-beware-remote-code-execution-vulnerability-exposed-cve-2024-11392/
@Undercode_News
https://undercodenews.com/hugging-face-transformers-users-beware-remote-code-execution-vulnerability-exposed-cve-2024-11392/
@Undercode_News
UNDERCODE NEWS
Hugging Face Transformers Users Beware: Remote Code Execution Vulnerability Exposed (CVE-2024-11392) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Patch Applied: Critical #Linux Kernel Bug Fixed in Latest #Update
https://undercodenews.com/patch-applied-critical-linux-kernel-bug-fixed-in-latest-update/
@Undercode_News
https://undercodenews.com/patch-applied-critical-linux-kernel-bug-fixed-in-latest-update/
@Undercode_News
UNDERCODE NEWS
Patch Applied: Critical Linux Kernel Bug Fixed in Latest Update - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability (#CVE-2024-53042)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53042/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53042/
@Undercode_News
UNDERCODE NEWS
Patch Released for Linux Kernel Vulnerability (CVE-2024-53042) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 #Linux Kernel Vulnerability Resolved: #CVE-2024-50303 Could Cause System Crashes
https://undercodenews.com/linux-kernel-vulnerability-resolved-cve-2024-50303-could-cause-system-crashes/
@Undercode_News
https://undercodenews.com/linux-kernel-vulnerability-resolved-cve-2024-50303-could-cause-system-crashes/
@Undercode_News
UNDERCODE NEWS
Linux Kernel Vulnerability Resolved: CVE-2024-50303 Could Cause System Crashes - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability (#CVE-2024-53087)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53087/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53087/
@Undercode_News
UNDERCODE NEWS
Patch Released for Linux Kernel Vulnerability (CVE-2024-53087) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability Affecting Camera Functionality (#CVE-2024-50175)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-affecting-camera-functionality-cve-2024-50175/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-affecting-camera-functionality-cve-2024-50175/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 Streamlining Security Management on #GitHub: A New Flexibility
https://undercodenews.com/streamlining-security-management-on-github-a-new-flexibility/
@Undercode_News
https://undercodenews.com/streamlining-security-management-on-github-a-new-flexibility/
@Undercode_News
UNDERCODE NEWS
Streamlining Security Management on GitHub: A New Flexibility - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Emoji Footwear: A Quirky Fusion of Tech and Fashion
https://undercodenews.com/emoji-footwear-a-quirky-fusion-of-tech-and-fashion/
@Undercode_News
https://undercodenews.com/emoji-footwear-a-quirky-fusion-of-tech-and-fashion/
@Undercode_News
UNDERCODE NEWS
Emoji Footwear: A Quirky Fusion of Tech and Fashion - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Time-Traveling Feature: A Privacy-First Approach
https://undercodenews.com/apples-time-traveling-feature-a-privacy-first-approach/
@Undercode_News
https://undercodenews.com/apples-time-traveling-feature-a-privacy-first-approach/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Ted Lasso's Secret: A Wizard of Oz Homage
https://undercodenews.com/ted-lassos-secret-a-wizard-of-oz-homage/
@Undercode_News
https://undercodenews.com/ted-lassos-secret-a-wizard-of-oz-homage/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Spotify Wrapped: A Year in Review
https://undercodenews.com/spotify-wrapped-a-year-in-review/
@Undercode_News
https://undercodenews.com/spotify-wrapped-a-year-in-review/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Silicon Strength: A Surprising Twist with the iPad mini 7
https://undercodenews.com/apples-silicon-strength-a-surprising-twist-with-the-ipad-mini-7/
@Undercode_News
https://undercodenews.com/apples-silicon-strength-a-surprising-twist-with-the-ipad-mini-7/
@Undercode_News
UNDERCODE NEWS
Apple's Silicon Strength: A Surprising Twist with the iPad mini 7 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ #AI: A Double-Edged Sword for #Software Quality
https://undercodenews.com/ai-a-double-edged-sword-for-software-quality/
@Undercode_News
https://undercodenews.com/ai-a-double-edged-sword-for-software-quality/
@Undercode_News
Forwarded from UNDERCODE TESTING
Have you ever heard about BadUSB?
A BadUSB refers to a type of malicious attack that exploits the firmware of USB devices. This makes the attack particularly dangerous and stealthy because the BadUSB emulates a HID (Human Interface Device), which is inherently trusted by the operating system. Once connected, the attack begins as the BadUSB starts injecting commands, typing at a speed of up to 1000wpm, allowing it to execute malicious actions almost instantly.
Attack Scenario
In a busy office, an employee steps away from their desk, leaving their laptop unlocked.
The attack exploits the unlocked system's trust in peripherals, allowing the malicious USB to execute commands without the user’s awareness, compromising the company’s security within seconds.
Example of Actions
Backdoor Installation: The USB types out commands to open a PowerShell terminal and install a hidden backdoor, granting the attacker remote access to the system.
Credential Theft: It retrieves saved passwords or authentication tokens from the system and sends them to an external server.
Network Reconnaissance: It runs scripts to map the internal network, identifying key servers and vulnerable devices.
Data Exfiltration: Sensitive company files are quickly zipped and emailed or uploaded to a remote server.
Prevention Technique
To reduce the chances of success for a BadUSB attack, you can configure User Account Control to require a password for administrative actions. This limits the potential damage a malicious USB can cause.
Steps
1. Press the Windows Key, then type regedt in the search bar to open the Registry Editor.
2. Navigate to the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. Find the registry entry named ConsentPromptBehaviorAdmin.
4. By default, its value is set to “5” (prompt for consent without password). Change this value to “1”. This setting forces the system to prompt for the administrator's password every time a process or command requires elevated privileges.
From now on, any action that requires admin rights will trigger a password prompt, significantly reducing the success rate of a BadUSB attack.
Source: linkedin
A BadUSB refers to a type of malicious attack that exploits the firmware of USB devices. This makes the attack particularly dangerous and stealthy because the BadUSB emulates a HID (Human Interface Device), which is inherently trusted by the operating system. Once connected, the attack begins as the BadUSB starts injecting commands, typing at a speed of up to 1000wpm, allowing it to execute malicious actions almost instantly.
Attack Scenario
In a busy office, an employee steps away from their desk, leaving their laptop unlocked.
The attack exploits the unlocked system's trust in peripherals, allowing the malicious USB to execute commands without the user’s awareness, compromising the company’s security within seconds.
Example of Actions
Backdoor Installation: The USB types out commands to open a PowerShell terminal and install a hidden backdoor, granting the attacker remote access to the system.
Credential Theft: It retrieves saved passwords or authentication tokens from the system and sends them to an external server.
Network Reconnaissance: It runs scripts to map the internal network, identifying key servers and vulnerable devices.
Data Exfiltration: Sensitive company files are quickly zipped and emailed or uploaded to a remote server.
Prevention Technique
To reduce the chances of success for a BadUSB attack, you can configure User Account Control to require a password for administrative actions. This limits the potential damage a malicious USB can cause.
Steps
1. Press the Windows Key, then type regedt in the search bar to open the Registry Editor.
2. Navigate to the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. Find the registry entry named ConsentPromptBehaviorAdmin.
4. By default, its value is set to “5” (prompt for consent without password). Change this value to “1”. This setting forces the system to prompt for the administrator's password every time a process or command requires elevated privileges.
From now on, any action that requires admin rights will trigger a password prompt, significantly reducing the success rate of a BadUSB attack.
Source: linkedin
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Google Chat: A New Audio-Only Meetings
https://undercodenews.com/google-chat-a-new-audio-only-meetings/
@Undercode_News
https://undercodenews.com/google-chat-a-new-audio-only-meetings/
@Undercode_News
UNDERCODE NEWS
Google Chat: A New Audio-Only Meetings - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Android Auto's Unexpected Oh: A Bugging Issue
https://undercodenews.com/android-autos-unexpected-oh-a-bugging-issue/
@Undercode_News
https://undercodenews.com/android-autos-unexpected-oh-a-bugging-issue/
@Undercode_News
UNDERCODE NEWS
Android Auto's Unexpected Oh: A Bugging Issue - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛒 Big Holiday Deals: Your Ultimate Shopping Guide
https://undercodenews.com/big-holiday-deals-your-ultimate-shopping-guide/
@Undercode_News
https://undercodenews.com/big-holiday-deals-your-ultimate-shopping-guide/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #WhatsApp for #iOS 242477: A Closer Look at the Latest #Update
https://undercodenews.com/whatsapp-for-ios-242477-a-closer-look-at-the-latest-update/
@Undercode_News
https://undercodenews.com/whatsapp-for-ios-242477-a-closer-look-at-the-latest-update/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Holiday Movie Marathon: Your Guide to Festive Films
https://undercodenews.com/a-holiday-movie-marathon-your-guide-to-festive-films/
@Undercode_News
https://undercodenews.com/a-holiday-movie-marathon-your-guide-to-festive-films/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Samsung's One UI 70: A Sneak Peek at the Future of #Samsung Apps
https://undercodenews.com/samsungs-one-ui-70-a-sneak-peek-at-the-future-of-samsung-apps/
@Undercode_News
https://undercodenews.com/samsungs-one-ui-70-a-sneak-peek-at-the-future-of-samsung-apps/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 #T-Mobile Thwarts Cyberattack, No Customer Data Breached
https://undercodenews.com/t-mobile-thwarts-cyberattack-no-customer-data-breached/
@Undercode_News
https://undercodenews.com/t-mobile-thwarts-cyberattack-no-customer-data-breached/
@Undercode_News
UNDERCODE NEWS
T-Mobile Thwarts Cyberattack, No Customer Data Breached - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…