Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ The Surveillance Industry: A Threat to Freedom
https://undercodenews.com/the-surveillance-industry-a-threat-to-freedom/
@Undercode_News
https://undercodenews.com/the-surveillance-industry-a-threat-to-freedom/
@Undercode_News
UNDERCODE NEWS
The Surveillance Industry: A Threat to Freedom - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โ ๏ธ Bitter Group Targets Turkish Defense with Novel MiyaRAT #Malware
https://undercodenews.com/bitter-group-targets-turkish-defense-with-novel-miyarat-malware/
@Undercode_News
https://undercodenews.com/bitter-group-targets-turkish-defense-with-novel-miyarat-malware/
@Undercode_News
UNDERCODE NEWS
Bitter Group Targets Turkish Defense with Novel MiyaRAT Malware - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆ๐๐๐ญ๐ฐ๐จ๐ซ๐ค ๐๐ญ๐ญ๐๐๐ค๐ฌ ๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง๐๐
๐น ๐๐๐๐ (๐๐๐ง-๐ข๐ง-๐ญ๐ก๐-๐๐ข๐๐๐ฅ๐) ๐๐ญ๐ญ๐๐๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).
๐น๐๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).
๐น ๐๐จ๐ญ๐ง๐๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).
๐น๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).
๐น ๐๐๐จ๐ (๐๐ข๐ฌ๐ญ๐ซ๐ข๐๐ฎ๐ญ๐๐ ๐๐๐ง๐ข๐๐ฅ ๐จ๐ ๐๐๐ซ๐ฏ๐ข๐๐): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).
๐น๐๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐น ๐๐๐๐ (๐๐๐ง-๐ข๐ง-๐ญ๐ก๐-๐๐ข๐๐๐ฅ๐) ๐๐ญ๐ญ๐๐๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).
๐น๐๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).
๐น ๐๐จ๐ญ๐ง๐๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).
๐น๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).
๐น ๐๐๐จ๐ (๐๐ข๐ฌ๐ญ๐ซ๐ข๐๐ฎ๐ญ๐๐ ๐๐๐ง๐ข๐๐ฅ ๐จ๐ ๐๐๐ซ๐ฏ๐ข๐๐): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).
๐น๐๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ #AI Goes Business-Friendly: Waldai Launches Contextual Data Loss Protection for Secure Workflows
https://undercodenews.com/ai-goes-business-friendly-waldai-launches-contextual-data-loss-protection-for-secure-workflows/
@Undercode_News
https://undercodenews.com/ai-goes-business-friendly-waldai-launches-contextual-data-loss-protection-for-secure-workflows/
@Undercode_News
UNDERCODE NEWS
AI Goes Business-Friendly: Waldai Launches Contextual Data Loss Protection for Secure Workflows - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Enhancing #GitHub Actions Security with Code Scanning
https://undercodenews.com/enhancing-github-actions-security-with-code-scanning/
@Undercode_News
https://undercodenews.com/enhancing-github-actions-security-with-code-scanning/
@Undercode_News
UNDERCODE NEWS
Enhancing GitHub Actions Security with Code Scanning - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆYou've probably heard of JWT - Json Web Tokens.
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).
I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.
It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.
What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.
Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)
Ref: Adam Kahlon
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).
I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.
It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.
What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.
Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)
Ref: Adam Kahlon
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฑ Music Legend Paul McCartney Warns of #AI Takeover, Calls for Balanced Approach
https://undercodenews.com/music-legend-paul-mccartney-warns-of-ai-takeover-calls-for-balanced-approach/
@Undercode_News
https://undercodenews.com/music-legend-paul-mccartney-warns-of-ai-takeover-calls-for-balanced-approach/
@Undercode_News
UNDERCODE NEWS
Music Legend Paul McCartney Warns of AI Takeover, Calls for Balanced Approach - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆAWS Cloud #tips : The Backbone of Modern Technology!๐
๐ What is AWS (Amazon Web Services)?
AWS is the worldโs most comprehensive and widely adopted cloud platform, offering 200+ fully featured services across compute, storage, databases, networking, AI, IoT, and more. Trusted by millions, AWS enables businesses of all sizes to innovate faster and scale effortlessly.
๐ Why AWS Stands Out:
1๏ธโฃ Global Infrastructure:
โข Operates across 31 geographic regions and 99 Availability Zones, ensuring low latency, reliability, and scalability.
โข Plans for 15 more regions are underway, making AWS one of the largest global networks.
2๏ธโฃ Cost Optimization:
โข AWS follows a pay-as-you-go model, meaning you only pay for what you use.
โข Tools like AWS Cost Explorer and Savings Plans help optimize your cloud spend.
3๏ธโฃ Unmatched Security:
โข Industry-leading security protocols, compliance with over 140 global standards, and data encryption ensure peace of mind.
โข AWS also provides IAM (Identity and Access Management) for granular security control.
4๏ธโฃ Innovation-Driven:
โข AWS offers cutting-edge tools for AI/ML (SageMaker), Big Data (EMR), and Serverless Computing (Lambda).
โข Pioneering advancements in Edge Computing with services like AWS Outposts and Wavelength.
5๏ธโฃ Ease of Use for Developers:
โข A user-friendly console, SDKs, APIs, and CLI make building and managing applications seamless.
โข Offers templates via CloudFormation for infrastructure automation.
๐ป Most Popular AWS Services
โข EC2: Scalable compute power for running applications.
โข S3: Highly durable object storage for backups, data lakes, and archives.
โข RDS & DynamoDB: Managed relational and NoSQL databases.
โข CloudFront: Fast and secure content delivery network.
โข Lambda: Event-driven serverless computing without infrastructure management.
๐ AWS Certification Pathway
AWS certifications validate your skills and open doors to career opportunities. Popular certifications include:
โข AWS Certified Solutions Architect (Associate)
โข AWS Certified Cloud Practitioner
โข AWS Certified DevOps Engineer
๐ Who Uses AWS?
โข Startups: Accelerate development with low upfront costs.
โข Enterprises: Achieve agility and scale globally.
โข Developers & IT Professionals: Innovate and build cutting-edge solutions.
๐ Getting Started:
โข Try AWS Free Tier to explore its services risk-free.
โข Explore AWS tutorials, documentation, and online courses to boost your skills.
Ref: Mahesh GirheMahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ What is AWS (Amazon Web Services)?
AWS is the worldโs most comprehensive and widely adopted cloud platform, offering 200+ fully featured services across compute, storage, databases, networking, AI, IoT, and more. Trusted by millions, AWS enables businesses of all sizes to innovate faster and scale effortlessly.
๐ Why AWS Stands Out:
1๏ธโฃ Global Infrastructure:
โข Operates across 31 geographic regions and 99 Availability Zones, ensuring low latency, reliability, and scalability.
โข Plans for 15 more regions are underway, making AWS one of the largest global networks.
2๏ธโฃ Cost Optimization:
โข AWS follows a pay-as-you-go model, meaning you only pay for what you use.
โข Tools like AWS Cost Explorer and Savings Plans help optimize your cloud spend.
3๏ธโฃ Unmatched Security:
โข Industry-leading security protocols, compliance with over 140 global standards, and data encryption ensure peace of mind.
โข AWS also provides IAM (Identity and Access Management) for granular security control.
4๏ธโฃ Innovation-Driven:
โข AWS offers cutting-edge tools for AI/ML (SageMaker), Big Data (EMR), and Serverless Computing (Lambda).
โข Pioneering advancements in Edge Computing with services like AWS Outposts and Wavelength.
5๏ธโฃ Ease of Use for Developers:
โข A user-friendly console, SDKs, APIs, and CLI make building and managing applications seamless.
โข Offers templates via CloudFormation for infrastructure automation.
๐ป Most Popular AWS Services
โข EC2: Scalable compute power for running applications.
โข S3: Highly durable object storage for backups, data lakes, and archives.
โข RDS & DynamoDB: Managed relational and NoSQL databases.
โข CloudFront: Fast and secure content delivery network.
โข Lambda: Event-driven serverless computing without infrastructure management.
๐ AWS Certification Pathway
AWS certifications validate your skills and open doors to career opportunities. Popular certifications include:
โข AWS Certified Solutions Architect (Associate)
โข AWS Certified Cloud Practitioner
โข AWS Certified DevOps Engineer
๐ Who Uses AWS?
โข Startups: Accelerate development with low upfront costs.
โข Enterprises: Achieve agility and scale globally.
โข Developers & IT Professionals: Innovate and build cutting-edge solutions.
๐ Getting Started:
โข Try AWS Free Tier to explore its services risk-free.
โข Explore AWS tutorials, documentation, and online courses to boost your skills.
Ref: Mahesh GirheMahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Tesla's Cybercab: A Golden Ride to the Future of Transportation
https://undercodenews.com/teslas-cybercab-a-golden-ride-to-the-future-of-transportation/
@Undercode_News
https://undercodenews.com/teslas-cybercab-a-golden-ride-to-the-future-of-transportation/
@Undercode_News
UNDERCODE NEWS
Tesla's Cybercab: A Golden Ride to the Future of Transportation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
1734278140921.pdf
15.6 MB
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆProtect Your Inbox Like a Pro! ๐
Your email is a goldmine for cybercriminals, containing personal, professional, and financial information. But fear notโhereโs how to safeguard it effectively:
๐ก๏ธ Top Email Security Tips:
1๏ธโฃ Enable Multi-Factor Authentication (MFA): A strong password isnโt enough. MFA adds an extra layer of security.
2๏ธโฃ Beware of Phishing Emails: Donโt click on suspicious links or attachments. Verify the sender before taking action.
3๏ธโฃ Use Strong Passwords: Avoid predictable passwords like โpassword123.โ Use a combination of upper/lowercase letters, numbers, and symbols.
4๏ธโฃ Encrypt Your Emails: Protect sensitive information by using email encryption tools.
5๏ธโฃ Keep Software Updated: Ensure your email client and antivirus software are always up-to-date.
6๏ธโฃ Educate Yourself and Your Team: Awareness is your first line of defense. Share best practices with colleagues.
๐จ Common Email Security Threats:
๐ธ Phishing: Fake emails designed to steal your information.
๐ธ Spoofing: Attackers pretending to be trusted contacts.
๐ธ Ransomware: Malicious attachments locking you out of your data.
๐ธ BEC (Business Email Compromise): Fraudulent emails targeting businesses.
๐ Remember: A secure inbox equals a secure life. Take action now to protect your data and privacy!
Ref: Mahech Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Your email is a goldmine for cybercriminals, containing personal, professional, and financial information. But fear notโhereโs how to safeguard it effectively:
๐ก๏ธ Top Email Security Tips:
1๏ธโฃ Enable Multi-Factor Authentication (MFA): A strong password isnโt enough. MFA adds an extra layer of security.
2๏ธโฃ Beware of Phishing Emails: Donโt click on suspicious links or attachments. Verify the sender before taking action.
3๏ธโฃ Use Strong Passwords: Avoid predictable passwords like โpassword123.โ Use a combination of upper/lowercase letters, numbers, and symbols.
4๏ธโฃ Encrypt Your Emails: Protect sensitive information by using email encryption tools.
5๏ธโฃ Keep Software Updated: Ensure your email client and antivirus software are always up-to-date.
6๏ธโฃ Educate Yourself and Your Team: Awareness is your first line of defense. Share best practices with colleagues.
๐จ Common Email Security Threats:
๐ธ Phishing: Fake emails designed to steal your information.
๐ธ Spoofing: Attackers pretending to be trusted contacts.
๐ธ Ransomware: Malicious attachments locking you out of your data.
๐ธ BEC (Business Email Compromise): Fraudulent emails targeting businesses.
๐ Remember: A secure inbox equals a secure life. Take action now to protect your data and privacy!
Ref: Mahech Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค The Rise of Intelligent Robots: How #AI is Revolutionizing Industrial Automation
https://undercodenews.com/the-rise-of-intelligent-robots-how-ai-is-revolutionizing-industrial-automation/
@Undercode_News
https://undercodenews.com/the-rise-of-intelligent-robots-how-ai-is-revolutionizing-industrial-automation/
@Undercode_News
UNDERCODE NEWS
The Rise of Intelligent Robots: How AI is Revolutionizing Industrial Automation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค The Rise of #AI Agents: Automation and Anxiety
https://undercodenews.com/the-rise-of-ai-agents-automation-and-anxiety/
@Undercode_News
https://undercodenews.com/the-rise-of-ai-agents-automation-and-anxiety/
@Undercode_News
UNDERCODE NEWS
The Rise of AI Agents: Automation and Anxiety - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค Sierra Leverages #AI Supervisors to Tame Unruly #Chatbots
https://undercodenews.com/sierra-leverages-ai-supervisors-to-tame-unruly-chatbots/
@Undercode_News
https://undercodenews.com/sierra-leverages-ai-supervisors-to-tame-unruly-chatbots/
@Undercode_News
UNDERCODE NEWS
Sierra Leverages AI Supervisors to Tame Unruly Chatbots - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ง Infosys HackWithInfy 2024: IIT Dhanbad Team Wins with Geospatial #AI Solution
https://undercodenews.com/infosys-hackwithinfy-2024-iit-dhanbad-team-wins-with-geospatial-ai-solution/
@Undercode_News
https://undercodenews.com/infosys-hackwithinfy-2024-iit-dhanbad-team-wins-with-geospatial-ai-solution/
@Undercode_News
UNDERCODE NEWS
Infosys HackWithInfy 2024: IIT Dhanbad Team Wins with Geospatial AI Solution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Bridging the #Digital Divide: Nagaland Embraces #Technology
https://undercodenews.com/bridging-the-digital-divide-nagaland-embraces-technology/
@Undercode_News
https://undercodenews.com/bridging-the-digital-divide-nagaland-embraces-technology/
@Undercode_News
UNDERCODE NEWS
Bridging the Digital Divide: Nagaland Embraces Technology - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ US Boosts Domestic EV Battery Production with 6 Billion Loan to Ford and SK On
https://undercodenews.com/us-boosts-domestic-ev-battery-production-with-6-billion-loan-to-ford-and-sk-on/
@Undercode_News
https://undercodenews.com/us-boosts-domestic-ev-battery-production-with-6-billion-loan-to-ford-and-sk-on/
@Undercode_News
UNDERCODE NEWS
US Boosts Domestic EV Battery Production with 6 Billion Loan to Ford and SK On - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Thai Police Targeted by Yokai Backdoor: A Blend of Sophistication and Sloppiness
https://undercodenews.com/thai-police-targeted-by-yokai-backdoor-a-blend-of-sophistication-and-sloppiness/
@Undercode_News
https://undercodenews.com/thai-police-targeted-by-yokai-backdoor-a-blend-of-sophistication-and-sloppiness/
@Undercode_News