Forwarded from DailyCVE
🔴 #macOS, #iOS, iPadOS - Privacy Issue - #CVE-2024-23283 (Critical)
https://dailycve.com/macos-ios-ipados-privacy-issue-cve-2024-23283-critical/
@Daily_CVE
https://dailycve.com/macos-ios-ipados-privacy-issue-cve-2024-23283-critical/
@Daily_CVE
DailyCVE
macOS, iOS, iPadOS - Privacy Issue - CVE-2024-23283 (Critical) - DailyCVE
2024-12-09 : Apple patched a critical privacy vulnerability (CVE-2024-23283) in iOS, iPadOS, and macOS. This vulnerability allowed apps to potentially […]
Forwarded from DailyCVE
🔴 #macOS Kernel Vulnerability: #CVE-2024-23265 (Critical)
https://dailycve.com/macos-kernel-vulnerability-cve-2024-23265-critical/
@Daily_CVE
https://dailycve.com/macos-kernel-vulnerability-cve-2024-23265-critical/
@Daily_CVE
DailyCVE
macOS Kernel Vulnerability: CVE-2024-23265 (Critical) - DailyCVE
2024-12-09 : A critical vulnerability (CVE-2024-23265) in the macOS kernel allowed an attacker with arbitrary kernel read and write capabilities […]
Forwarded from DailyCVE
🔴 #Apple Lock Screen Bypass via Siri (#CVE-2024-23289) - Critical
https://dailycve.com/apple-lock-screen-bypass-via-siri-cve-2024-23289-critical/
@Daily_CVE
https://dailycve.com/apple-lock-screen-bypass-via-siri-cve-2024-23289-critical/
@Daily_CVE
DailyCVE
Apple Lock Screen Bypass via Siri (CVE-2024-23289) - Critical - DailyCVE
2024-12-09 : This article describes a critical vulnerability (CVE-2024-23289) in Apple devices that allowed someone with physical access to bypass […]
Forwarded from DailyCVE
🔴 #Apple #iOS System Notification Spoofing Vulnerability (#CVE-2024-23262) - Critical
https://dailycve.com/apple-ios-system-notification-spoofing-vulnerability-cve-2024-23262-critical/
@Daily_CVE
https://dailycve.com/apple-ios-system-notification-spoofing-vulnerability-cve-2024-23262-critical/
@Daily_CVE
DailyCVE
Apple iOS System Notification Spoofing Vulnerability (CVE-2024-23262) - Critical - DailyCVE
2024-12-09 Vulnerability : This critical vulnerability (CVE-2024-23262) in Apple iOS versions before 16.7.6 and 17.4 allows malicious applications to spoof […]
Forwarded from DailyCVE
🔵 #Apple WebKit Remote Code Execution Vulnerability (#CVE-2024-10118)
https://dailycve.com/apple-webkit-remote-code-execution-vulnerability-cve-2024-10118/
@Daily_CVE
https://dailycve.com/apple-webkit-remote-code-execution-vulnerability-cve-2024-10118/
@Daily_CVE
DailyCVE
Apple WebKit Remote Code Execution Vulnerability (CVE-2024-10118) - DailyCVE
2024-12-09 : This article describes a remote code execution (RCE) vulnerability in Apple WebKit. Unauthenticated attackers can exploit this vulnerability […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Reddit's New #AI-Powered Search: #Reddit Answers
https://undercodenews.com/reddits-new-ai-powered-search-reddit-answers/
@Undercode_News
https://undercodenews.com/reddits-new-ai-powered-search-reddit-answers/
@Undercode_News
UNDERCODE NEWS
Reddit's New AI-Powered Search: Reddit Answers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Mark Zuckerberg's Meteoric Rise: A Closer Look
https://undercodenews.com/mark-zuckerbergs-meteoric-rise-a-closer-look/
@Undercode_News
https://undercodenews.com/mark-zuckerbergs-meteoric-rise-a-closer-look/
@Undercode_News
UNDERCODE NEWS
Mark Zuckerberg's Meteoric Rise: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
⭕1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
⭕2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
⭕3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
⭕4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Source: Linkedin
Start Your Cybersecurity Career with these in demand courses!
⭕1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
⭕2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
⭕3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
⭕4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Source: Linkedin
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Tesla Prepares for Growth with the Arrival of the Affordable Model Q!
https://undercodenews.com/tesla-prepares-for-growth-with-the-arrival-of-the-affordable-model-q/
@Undercode_News
https://undercodenews.com/tesla-prepares-for-growth-with-the-arrival-of-the-affordable-model-q/
@Undercode_News
UNDERCODE NEWS
Tesla Prepares for Growth with the Arrival of the Affordable Model Q! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Critical RCE Vulnerability in #Apple WebKit: #Update Now!
https://undercodenews.com/critical-rce-vulnerability-in-apple-webkit-update-now/
@Undercode_News
https://undercodenews.com/critical-rce-vulnerability-in-apple-webkit-update-now/
@Undercode_News
UNDERCODE NEWS
Critical RCE Vulnerability in Apple WebKit: Update Now! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑Reverse Engineering iOS Applications:
> Here's a streamlined approach to obtain the required tools and set up your environment for iOS reverse engineering, as described. The provided GitHub repository is an excellent resource for guidance.
### Key Tools and Instructions
1. iTunnel
- Download: Allows SSH over USB.
- Usage:
2. Cydia Impactor
- Download: Lets you sideload iOS apps using a developer certificate.
3. Hopper
- Download: Reverse engineering tool for disassembly, decompilation, and debugging.
- Trial version is sufficient.
4. Cycript
- Download: Enables runtime modification of app behavior via a console.
5. Frida
- Install:
- Purpose: Scripting to change app behavior at runtime.
6. Bettercap
- Download: Perform MITM (Man-in-the-Middle) attacks.
7. class-dump-z
- Download: Dumps ObjC classes (for ObjC apps).
8. momdec
- Download: Decompiles CoreData models.
9. Ghidra
- Download: Alternative reverse engineering tool.
---
### iOS-Specific Tools
#### iOS 10.x
- Clutch
- Use for decrypting iOS applications.
#### iOS 11.x+
- bfinject
- Extract apps using Cycript and Clutch.
- Install dependencies:
#### iOS 12.x
- frida-ios-dump
- Decrypt apps and auto-transfer to your computer.
---
### Device Setup
1. On iOS < 11.0
- Jailbreak and install via Cydia:
- Cycript
- Apple File Conduit "2"
- Frida (Source:
- Test SSH:
2. On iOS > 11.0
- Create required directories:
- Transfer and extract
3. On iOS 12.x
- Install Frida via Cydia (Source:
For more details and resources, check the GitHub repository: [RE-iOS-Apps](https://github.com/ivRodriguezCA/RE-iOS-Apps).
> Here's a streamlined approach to obtain the required tools and set up your environment for iOS reverse engineering, as described. The provided GitHub repository is an excellent resource for guidance.
### Key Tools and Instructions
1. iTunnel
- Download: Allows SSH over USB.
- Usage:
itnl --lport 2222 --iport 22
ssh -p 2222 root@localhost
2. Cydia Impactor
- Download: Lets you sideload iOS apps using a developer certificate.
3. Hopper
- Download: Reverse engineering tool for disassembly, decompilation, and debugging.
- Trial version is sufficient.
4. Cycript
- Download: Enables runtime modification of app behavior via a console.
5. Frida
- Install:
sudo pip install frida-tools
- Purpose: Scripting to change app behavior at runtime.
6. Bettercap
- Download: Perform MITM (Man-in-the-Middle) attacks.
7. class-dump-z
- Download: Dumps ObjC classes (for ObjC apps).
8. momdec
- Download: Decompiles CoreData models.
9. Ghidra
- Download: Alternative reverse engineering tool.
---
### iOS-Specific Tools
#### iOS 10.x
- Clutch
- Use for decrypting iOS applications.
#### iOS 11.x+
- bfinject
- Extract apps using Cycript and Clutch.
- Install dependencies:
sudo pip install -r requirements.txt --upgrade
#### iOS 12.x
- frida-ios-dump
- Decrypt apps and auto-transfer to your computer.
---
### Device Setup
1. On iOS < 11.0
- Jailbreak and install via Cydia:
- Cycript
- Apple File Conduit "2"
- Frida (Source:
https://build.frida.re)- Test SSH:
itnl --lport 2222 --iport 22
ssh -p 2222 root@localhost
2. On iOS > 11.0
- Create required directories:
cd / && mkdir jb
mkdir /jb/bfinject && cd /jb/bfinject
- Transfer and extract
bfinject:
scp -P 2222 ~/Downloads/bfinject.tar root@localhost:/jb/bfinject
tar xvf bfinject.tar
3. On iOS 12.x
- Install Frida via Cydia (Source:
https://build.frida.re).For more details and resources, check the GitHub repository: [RE-iOS-Apps](https://github.com/ivRodriguezCA/RE-iOS-Apps).
GitHub
GitHub - ivRodriguezCA/RE-iOS-Apps: A completely free, open source and online course about Reverse Engineering iOS Applications.
A completely free, open source and online course about Reverse Engineering iOS Applications. - ivRodriguezCA/RE-iOS-Apps
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#GTA 6's Massive Map: A Fan-Made Recreation Reveals Its Scale
https://undercodenews.com/gta-6s-massive-map-a-fan-made-recreation-reveals-its-scale/
@Undercode_News
https://undercodenews.com/gta-6s-massive-map-a-fan-made-recreation-reveals-its-scale/
@Undercode_News
UNDERCODE NEWS
GTA 6's Massive Map: A Fan-Made Recreation Reveals Its Scale - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛠️ Improved Quantum Leap in Computing: #Google's Breakthrough in Error Correction
https://undercodenews.com/improved-quantum-leap-in-computing-googles-breakthrough-in-error-correction/
@Undercode_News
https://undercodenews.com/improved-quantum-leap-in-computing-googles-breakthrough-in-error-correction/
@Undercode_News
UNDERCODE NEWS
Improved Quantum Leap in Computing: Google's Breakthrough in Error Correction - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ Unlocking the Power of Embeddings: Building a Custom Retrieval System with Motoko and Nodejs
https://undercodenews.com/unlocking-the-power-of-embeddings-building-a-custom-retrieval-system-with-motoko-and-nodejs/
@Undercode_News
https://undercodenews.com/unlocking-the-power-of-embeddings-building-a-custom-retrieval-system-with-motoko-and-nodejs/
@Undercode_News
UNDERCODE NEWS
Unlocking the Power of Embeddings: Building a Custom Retrieval System with Motoko and Nodejs - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 #Samsung's Next XR Headset: A 2025 Release?
https://undercodenews.com/samsungs-next-xr-headset-a-2025-release/
@Undercode_News
https://undercodenews.com/samsungs-next-xr-headset-a-2025-release/
@Undercode_News
UNDERCODE NEWS
Samsung's Next XR Headset: A 2025 Release? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from DailyCVE
🔴 Rockwell Automation Arena Simulation #Software Vulnerability (#CVE-2024-21913) - HIGH
https://dailycve.com/rockwell-automation-arena-simulation-software-vulnerability-cve-2024-21913-high/
@DailyCVE
https://dailycve.com/rockwell-automation-arena-simulation-software-vulnerability-cve-2024-21913-high/
@DailyCVE
DailyCVE
Rockwell Automation Arena Simulation Software Vulnerability (CVE-2024-21913) - HIGH - DailyCVE
2024-12-09 Platform: Rockwell Automation Arena Simulation Software Version: Not specified Vulnerability: Heap-based memory buffer overflow Severity: HIGH (CVSS v3 score: […]
Forwarded from DailyCVE
🔴 Rockwell Automation Arena Simulation Memory Corruption Vulnerability (#CVE-2024-21918) - Critical
https://dailycve.com/rockwell-automation-arena-simulation-memory-corruption-vulnerability-cve-2024-21918-critical/
@Daily_CVE
https://dailycve.com/rockwell-automation-arena-simulation-memory-corruption-vulnerability-cve-2024-21918-critical/
@Daily_CVE
DailyCVE
Rockwell Automation Arena Simulation Memory Corruption Vulnerability (CVE-2024-21918) - Critical - DailyCVE
2024-12-09 Platform: Rockwell Automation Arena Simulation software Version: Not specified Vulnerability: Memory buffer overflow Severity: Critical (CVSS v3 score: 7.8, […]
Forwarded from DailyCVE
🟠 Rockwell Automation Arena Simulation Memory Buffer Vulnerability (#CVE-2024-21920 - Medium)
https://dailycve.com/rockwell-automation-arena-simulation-memory-buffer-vulnerability-cve-2024-21920-medium/
@Daily_CVE
https://dailycve.com/rockwell-automation-arena-simulation-memory-buffer-vulnerability-cve-2024-21920-medium/
@Daily_CVE
DailyCVE
Rockwell Automation Arena Simulation Memory Buffer Vulnerability (CVE-2024-21920 - Medium) - DailyCVE
2024-12-09 Platform: Rockwell Automation Arena Simulation Version: All Versions (not specified) Vulnerability: Memory Buffer Overflow Severity: Medium (CVSS v3 score: […]
Forwarded from DailyCVE
🟠 PAN-#OS: Reflected Cross-Site Scripting (XSS) Vulnerability (#CVE-2024-0011) - MEDIUM
https://dailycve.com/pan-os-reflected-cross-site-scripting-xss-vulnerability-cve-2024-0011-medium/
@Daily_CVE
https://dailycve.com/pan-os-reflected-cross-site-scripting-xss-vulnerability-cve-2024-0011-medium/
@Daily_CVE
DailyCVE
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability (CVE-2024-0011) - MEDIUM - DailyCVE
2024-12-09 : A security vulnerability in Palo Alto Networks PAN-OS software allows attackers to inject malicious scripts into Captive Portal […]
Forwarded from DailyCVE
🔵 Checkmk Multiple Vulnerabilities (#CVE-2023-46365, #CVE-2023-46366, #CVE-2023-46367)
https://dailycve.com/checkmk-multiple-vulnerabilities-cve-2023-46365-cve-2023-46366-cve-2023-46367/
@Daily_CVE
https://dailycve.com/checkmk-multiple-vulnerabilities-cve-2023-46365-cve-2023-46366-cve-2023-46367/
@Daily_CVE
DailyCVE
Checkmk Multiple Vulnerabilities (CVE-2023-46365, CVE-2023-46366, CVE-2023-46367) - DailyCVE
2024-12-09 : Checkmk versions 2.0.0 to 2.1.0 are affected by multiple vulnerabilities. These vulnerabilities could allow an attacker to execute […]