Forwarded from UNDERCODE NEWS
It is confirmed that an investigation into Google's "Privacy Sandbox" initiative was undertaken by the British antitrust regulator.
#International
#International
Forwarded from UNDERCODE NEWS
We know this bug since long time, and now exposed to public ! Through Telegram, you can find out the location of a person.
#Vulnerabilities
#Vulnerabilities
Forwarded from DailyCVE
π΅OpenJPEG Multiple vulnerabilities in ubuntu:
https://dailycve.com/openjpeg-multiple-vulnerabilities-ubuntu
https://dailycve.com/openjpeg-multiple-vulnerabilities-ubuntu
Dailycve
OpenJPEG Multiple vulnerabilities in ubuntu | CVE
Details:
USN-4685-1: OpenJPEG vulnerabilities
07 January 2021
Several security issues were fixed in OpenJPEG.
Releases
-> Ubuntu 20.10
-> Ubuntu 20.04 LTS
Packages
-> ->penjpeg2 - JPEG 2000 image c->mpressi->n/dec->mpressi->n library
Details
USN-4685-1: OpenJPEG vulnerabilities
07 January 2021
Several security issues were fixed in OpenJPEG.
Releases
-> Ubuntu 20.10
-> Ubuntu 20.04 LTS
Packages
-> ->penjpeg2 - JPEG 2000 image c->mpressi->n/dec->mpressi->n library
Details
Forwarded from UNDERCODE NEWS
TikTok also excludes the inciting video of Trump claiming that disinformation is not tolerated.
#Ban
#Ban
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Some pdfs related to tracking
https://www.diva-portal.org/smash/get/diva2:678371/FULLTEXT01.pdf
https://www.oakton.edu/user/2/rjtaylor/cis101/Google%20Hacking%20101.pdf
https://higherlogicdownload.s3.amazonaws.com/ISACA/a085a583-e841-4dbe-a215-60cf6d98e036/UploadedImages/WOW-2019-Presentations/Chanel_Suggs.pdf
https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf
https://www.sans.org/security-resources/GoogleCheatSheet.pdf
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Some pdfs related to tracking
https://www.diva-portal.org/smash/get/diva2:678371/FULLTEXT01.pdf
https://www.oakton.edu/user/2/rjtaylor/cis101/Google%20Hacking%20101.pdf
https://higherlogicdownload.s3.amazonaws.com/ISACA/a085a583-e841-4dbe-a215-60cf6d98e036/UploadedImages/WOW-2019-Presentations/Chanel_Suggs.pdf
https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf
https://www.sans.org/security-resources/GoogleCheatSheet.pdf
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅The Vital Signs Monitor VC150 provided by Innokas YhtymΓ€ Oy contains multiple vulnerabilities:
https://dailycve.com/vital-signs-monitor-vc150-provided-innokas-yhtyma-oy-contains-multiple-vulnerabilities
https://dailycve.com/vital-signs-monitor-vc150-provided-innokas-yhtyma-oy-contains-multiple-vulnerabilities
Dailycve
The Vital Signs Monitor VC150 provided by Innokas YhtymΓ€ Oy contains multiple vulnerabilities. | CVE
Details:
The Vital Signs Monitor VC150 provided by Innokas YhtymΓ€ Oy contains multiple vulnerabilities.
Cross-site scripting ( CWE-79 ) --CVE-2020-27262
CVSS v3 CVSS: 3.0 / AV: N / AC: L / PR: L / UI: R / S: U / C: L / I: L / A: N Base value:β¦
Forwarded from UNDERCODE NEWS
Today, AMD officially announced that Dr. Su Zifeng, AMD President and CEO, will give a keynote speech at CES 2021.
#International
#International
Forwarded from UNDERCODE NEWS
Google AI researchers have demonstrated how to create an interpretable model of machine learning.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦importants hacking tools and easy to run :
>>Infoga - Email OSINT(https://github.com/m4ll0k/Infoga)
>>ReconDog(https://github.com/s0md3v/ReconDog)
>>Striker(https://github.com/s0md3v/Striker)
>>SecretFinder (like API & etc)(https://github.com/m4ll0k/SecretFinder)
>>Find Info Using Shodan(https://github.com/m4ll0k/Shodanfy.py)
>>Port Scanner - rang3r(https://github.com/floriankunushevci/rang3r)
>>Breacher(https://github.com/s0md3v/Breacher)
### Wordlist Generator
>>Cupp(https://github.com/Mebus/cupp.git)
>>WordlistCreator(https://github.com/Z4nzu/wlcreator)
>>Goblin WordGenerator(https://github.com/UndeadSec/GoblinWordGenerator.git)
>>Password list (1.4 Billion Clear Text Password)(https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
### Wireless attack tools
>>WiFi-Pumpkin(https://github.com/P0cL4bs/wifipumpkin3)
>>pixiewps(https://github.com/wiire/pixiewps)
>>Bluetooth Honeypot GUI Framework(https://github.com/andrewmichaelsmith/bluepot)
>>Fluxion(https://github.com/thehackingsage/Fluxion)
>>Wifiphisher(https://github.com/wifiphisher/wifiphisher)
>>Wifite(https://github.com/derv82/wifite2)
>>EvilTwin(https://github.com/Z4nzu/fakeap)
>>Fastssh(https://github.com/Z4nzu/fastssh)
Reference: git
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦importants hacking tools and easy to run :
>>Infoga - Email OSINT(https://github.com/m4ll0k/Infoga)
>>ReconDog(https://github.com/s0md3v/ReconDog)
>>Striker(https://github.com/s0md3v/Striker)
>>SecretFinder (like API & etc)(https://github.com/m4ll0k/SecretFinder)
>>Find Info Using Shodan(https://github.com/m4ll0k/Shodanfy.py)
>>Port Scanner - rang3r(https://github.com/floriankunushevci/rang3r)
>>Breacher(https://github.com/s0md3v/Breacher)
### Wordlist Generator
>>Cupp(https://github.com/Mebus/cupp.git)
>>WordlistCreator(https://github.com/Z4nzu/wlcreator)
>>Goblin WordGenerator(https://github.com/UndeadSec/GoblinWordGenerator.git)
>>Password list (1.4 Billion Clear Text Password)(https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
### Wireless attack tools
>>WiFi-Pumpkin(https://github.com/P0cL4bs/wifipumpkin3)
>>pixiewps(https://github.com/wiire/pixiewps)
>>Bluetooth Honeypot GUI Framework(https://github.com/andrewmichaelsmith/bluepot)
>>Fluxion(https://github.com/thehackingsage/Fluxion)
>>Wifiphisher(https://github.com/wifiphisher/wifiphisher)
>>Wifite(https://github.com/derv82/wifite2)
>>EvilTwin(https://github.com/Z4nzu/fakeap)
>>Fastssh(https://github.com/Z4nzu/fastssh)
Reference: git
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅CuteSoft Cute Editor cross-site scripting vulnerability:
https://dailycve.com/cutesoft-cute-editor-cross-site-scripting-vulnerability
https://dailycve.com/cutesoft-cute-editor-cross-site-scripting-vulnerability
Dailycve
CuteSoft Cute Editor cross-site scripting vulnerability | CVE
Details:
CuteSoft Cute Editor is an HTML editor made in the United States by CuteSoft that can be used for PHP and ASP editing. The Cute Editor for ASP.NET 6.4 has a cross-site scripting flaw that enables a remote attacker to run scripts on the victim'sβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Signs of a serious infection
Symptom 1: Infected with ransomware
This is the most obvious symptom. The ransomware developer needs to clearly tell the target user that they are infected with the ransomware, otherwise how can they make money? If you are unfortunate enough to become the target user, then your computer should pop up a Warning box and tell you that all your files have been encrypted and you need to pay a ransom for your data to an account before a certain deadline, otherwise you can say goodbye to your files directly.
Symptom 2: Browser redirection
When you use Google to search for the topic "My computer started to exhibit all kinds of strange behaviors", you clicked on a webpage that seemed to meet your search requirements, but the link opened another webpage. Your first reaction is of course to go back to the Google search results just now, and then try to access other links. But it didn't help much. What happened just now happened again. You find that every link you click is redirected to other websites. If this happens, then congratulations, you are infected with malware.
Symptom 3: The homepage is tampered with
For example, you set your favorite sports news website as the homepage, but don't know why, every time you open the browser, the homepage of Yahoo.com will always pop up. And you also find that there are many new widget icons in the browser window, and these icons can't be deleted. Then please be careful, you are probably infected with malware.
Symptom 4: Pop-up window full of screen
The so-called pop-up window full of screen means that after you close this window, another window pops up again. And when you are not connected to the Internet, your system will continue to pop up various notification windows. Of course, there are many websites that will pop up various advertisements. These websites will make you feel very disgusted. If all kinds of inexplicable pop-up messages always appear on your screen, then you may have been infected by malicious ads or spyware.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Signs of a serious infection
Symptom 1: Infected with ransomware
This is the most obvious symptom. The ransomware developer needs to clearly tell the target user that they are infected with the ransomware, otherwise how can they make money? If you are unfortunate enough to become the target user, then your computer should pop up a Warning box and tell you that all your files have been encrypted and you need to pay a ransom for your data to an account before a certain deadline, otherwise you can say goodbye to your files directly.
Symptom 2: Browser redirection
When you use Google to search for the topic "My computer started to exhibit all kinds of strange behaviors", you clicked on a webpage that seemed to meet your search requirements, but the link opened another webpage. Your first reaction is of course to go back to the Google search results just now, and then try to access other links. But it didn't help much. What happened just now happened again. You find that every link you click is redirected to other websites. If this happens, then congratulations, you are infected with malware.
Symptom 3: The homepage is tampered with
For example, you set your favorite sports news website as the homepage, but don't know why, every time you open the browser, the homepage of Yahoo.com will always pop up. And you also find that there are many new widget icons in the browser window, and these icons can't be deleted. Then please be careful, you are probably infected with malware.
Symptom 4: Pop-up window full of screen
The so-called pop-up window full of screen means that after you close this window, another window pops up again. And when you are not connected to the Internet, your system will continue to pop up various notification windows. Of course, there are many websites that will pop up various advertisements. These websites will make you feel very disgusted. If all kinds of inexplicable pop-up messages always appear on your screen, then you may have been infected by malicious ads or spyware.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Once again,after uploading a variety of tweets, Twitter permanently disabled the account of @TeamTrump.
#Ban
#Ban
Forwarded from UNDERCODE NEWS
New details for iPhone 13: Camera module thickness is raised by 0.26 mm and coated with sapphire glass.
#Technologies
#Technologies
Forwarded from DailyCVE
π΅libxstream-java CVE-2020-26258 CVE-2020-26259 :
https://dailycve.com/libxstream-java-cve-2020-26258-cve-2020-26259
https://dailycve.com/libxstream-java-cve-2020-26258-cve-2020-26259
Dailycve
libxstream-java CVE-2020-26258 CVE-2020-26259 | CVE
Details:
Liaogui Zhong discovered two security issues in XStream, a Java library
to serialise objects to XML and back again, which could result in the
deletion of files or server-side request forgery when unmarshalling.
For the stable distribution (buster)β¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
New release & undetected Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
β’Set your own MAIL and PASSWORD on "keylogger.py".
β’Run keylogger.py on Target Computer
β’Every 10 seconds,You Get the Data from the Target Computer
β’If Target finds the Code and Open the File for Want to Learn your MAIL and Password The Program DELETE itself.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download https://github.com/aydinnyunus/Keylogger
2) pip install pynput
3) use any tem mail from https://t.me/UnderCodeTesting/3307
β β β Uππ»βΊπ«Δπ¬πβ β β β
New release & undetected Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
β’Set your own MAIL and PASSWORD on "keylogger.py".
β’Run keylogger.py on Target Computer
β’Every 10 seconds,You Get the Data from the Target Computer
β’If Target finds the Code and Open the File for Want to Learn your MAIL and Password The Program DELETE itself.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download https://github.com/aydinnyunus/Keylogger
2) pip install pynput
3) use any tem mail from https://t.me/UnderCodeTesting/3307
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - aydinnyunus/Keylogger: Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail. - aydinnyunus/Keylogger