Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #WhatsApp Beta #Update: Now You Can Add a Message to Any Forwarded Content
https://undercodenews.com/whatsapp-beta-update-now-you-can-add-a-message-to-any-forwarded-content/
@Undercode_News
https://undercodenews.com/whatsapp-beta-update-now-you-can-add-a-message-to-any-forwarded-content/
@Undercode_News
UNDERCODE NEWS
WhatsApp Beta Update: Now You Can Add a Message to Any Forwarded Content - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ #Samsung Knox Native Solution: A Game Changer for Secure Government and Enterprise Communications
https://undercodenews.com/samsung-knox-native-solution-a-game-changer-for-secure-government-and-enterprise-communications/
@Undercode_News
https://undercodenews.com/samsung-knox-native-solution-a-game-changer-for-secure-government-and-enterprise-communications/
@Undercode_News
UNDERCODE NEWS
Samsung Knox Native Solution: A Game Changer for Secure Government and Enterprise Communications - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
💾 #Samsung Reshuffles Leadership to Drive Semiconductor Growth
https://undercodenews.com/samsung-reshuffles-leadership-to-drive-semiconductor-growth/
@Undercode_News
https://undercodenews.com/samsung-reshuffles-leadership-to-drive-semiconductor-growth/
@Undercode_News
UNDERCODE NEWS
Samsung Reshuffles Leadership to Drive Semiconductor Growth - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patching a CPU Frequency Glitch: Understanding #CVE-2024-50178
https://undercodenews.com/patching-a-cpu-frequency-glitch-understanding-cve-2024-50178/
@Undercode_News
https://undercodenews.com/patching-a-cpu-frequency-glitch-understanding-cve-2024-50178/
@Undercode_News
UNDERCODE NEWS
Patching a CPU Frequency Glitch: Understanding CVE-2024-50178 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Urgent #Update: Unpatched Flaw in Hugging Face Transformers Library Exposes Users to Remote Code Execution
https://undercodenews.com/urgent-update-unpatched-flaw-in-hugging-face-transformers-library-exposes-users-to-remote-code-execution/
@Undercode_News
https://undercodenews.com/urgent-update-unpatched-flaw-in-hugging-face-transformers-library-exposes-users-to-remote-code-execution/
@Undercode_News
UNDERCODE NEWS
Urgent Update: Unpatched Flaw in Hugging Face Transformers Library Exposes Users to Remote Code Execution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patching Up a Power Delivery Problem: Understanding #CVE-2024-53083
https://undercodenews.com/patching-up-a-power-delivery-problem-understanding-cve-2024-53083/
@Undercode_News
https://undercodenews.com/patching-up-a-power-delivery-problem-understanding-cve-2024-53083/
@Undercode_News
UNDERCODE NEWS
Patching Up a Power Delivery Problem: Understanding CVE-2024-53083 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Hugging Face Transformers Users Beware: Remote Code Execution Vulnerability Exposed (#CVE-2024-11392)
https://undercodenews.com/hugging-face-transformers-users-beware-remote-code-execution-vulnerability-exposed-cve-2024-11392/
@Undercode_News
https://undercodenews.com/hugging-face-transformers-users-beware-remote-code-execution-vulnerability-exposed-cve-2024-11392/
@Undercode_News
UNDERCODE NEWS
Hugging Face Transformers Users Beware: Remote Code Execution Vulnerability Exposed (CVE-2024-11392) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Patch Applied: Critical #Linux Kernel Bug Fixed in Latest #Update
https://undercodenews.com/patch-applied-critical-linux-kernel-bug-fixed-in-latest-update/
@Undercode_News
https://undercodenews.com/patch-applied-critical-linux-kernel-bug-fixed-in-latest-update/
@Undercode_News
UNDERCODE NEWS
Patch Applied: Critical Linux Kernel Bug Fixed in Latest Update - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability (#CVE-2024-53042)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53042/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53042/
@Undercode_News
UNDERCODE NEWS
Patch Released for Linux Kernel Vulnerability (CVE-2024-53042) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 #Linux Kernel Vulnerability Resolved: #CVE-2024-50303 Could Cause System Crashes
https://undercodenews.com/linux-kernel-vulnerability-resolved-cve-2024-50303-could-cause-system-crashes/
@Undercode_News
https://undercodenews.com/linux-kernel-vulnerability-resolved-cve-2024-50303-could-cause-system-crashes/
@Undercode_News
UNDERCODE NEWS
Linux Kernel Vulnerability Resolved: CVE-2024-50303 Could Cause System Crashes - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability (#CVE-2024-53087)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53087/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-cve-2024-53087/
@Undercode_News
UNDERCODE NEWS
Patch Released for Linux Kernel Vulnerability (CVE-2024-53087) - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Patch Released for #Linux Kernel Vulnerability Affecting Camera Functionality (#CVE-2024-50175)
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-affecting-camera-functionality-cve-2024-50175/
@Undercode_News
https://undercodenews.com/patch-released-for-linux-kernel-vulnerability-affecting-camera-functionality-cve-2024-50175/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 Streamlining Security Management on #GitHub: A New Flexibility
https://undercodenews.com/streamlining-security-management-on-github-a-new-flexibility/
@Undercode_News
https://undercodenews.com/streamlining-security-management-on-github-a-new-flexibility/
@Undercode_News
UNDERCODE NEWS
Streamlining Security Management on GitHub: A New Flexibility - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Emoji Footwear: A Quirky Fusion of Tech and Fashion
https://undercodenews.com/emoji-footwear-a-quirky-fusion-of-tech-and-fashion/
@Undercode_News
https://undercodenews.com/emoji-footwear-a-quirky-fusion-of-tech-and-fashion/
@Undercode_News
UNDERCODE NEWS
Emoji Footwear: A Quirky Fusion of Tech and Fashion - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Time-Traveling Feature: A Privacy-First Approach
https://undercodenews.com/apples-time-traveling-feature-a-privacy-first-approach/
@Undercode_News
https://undercodenews.com/apples-time-traveling-feature-a-privacy-first-approach/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Ted Lasso's Secret: A Wizard of Oz Homage
https://undercodenews.com/ted-lassos-secret-a-wizard-of-oz-homage/
@Undercode_News
https://undercodenews.com/ted-lassos-secret-a-wizard-of-oz-homage/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Spotify Wrapped: A Year in Review
https://undercodenews.com/spotify-wrapped-a-year-in-review/
@Undercode_News
https://undercodenews.com/spotify-wrapped-a-year-in-review/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Silicon Strength: A Surprising Twist with the iPad mini 7
https://undercodenews.com/apples-silicon-strength-a-surprising-twist-with-the-ipad-mini-7/
@Undercode_News
https://undercodenews.com/apples-silicon-strength-a-surprising-twist-with-the-ipad-mini-7/
@Undercode_News
UNDERCODE NEWS
Apple's Silicon Strength: A Surprising Twist with the iPad mini 7 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ #AI: A Double-Edged Sword for #Software Quality
https://undercodenews.com/ai-a-double-edged-sword-for-software-quality/
@Undercode_News
https://undercodenews.com/ai-a-double-edged-sword-for-software-quality/
@Undercode_News
Forwarded from UNDERCODE TESTING
Have you ever heard about BadUSB?
A BadUSB refers to a type of malicious attack that exploits the firmware of USB devices. This makes the attack particularly dangerous and stealthy because the BadUSB emulates a HID (Human Interface Device), which is inherently trusted by the operating system. Once connected, the attack begins as the BadUSB starts injecting commands, typing at a speed of up to 1000wpm, allowing it to execute malicious actions almost instantly.
Attack Scenario
In a busy office, an employee steps away from their desk, leaving their laptop unlocked.
The attack exploits the unlocked system's trust in peripherals, allowing the malicious USB to execute commands without the user’s awareness, compromising the company’s security within seconds.
Example of Actions
Backdoor Installation: The USB types out commands to open a PowerShell terminal and install a hidden backdoor, granting the attacker remote access to the system.
Credential Theft: It retrieves saved passwords or authentication tokens from the system and sends them to an external server.
Network Reconnaissance: It runs scripts to map the internal network, identifying key servers and vulnerable devices.
Data Exfiltration: Sensitive company files are quickly zipped and emailed or uploaded to a remote server.
Prevention Technique
To reduce the chances of success for a BadUSB attack, you can configure User Account Control to require a password for administrative actions. This limits the potential damage a malicious USB can cause.
Steps
1. Press the Windows Key, then type regedt in the search bar to open the Registry Editor.
2. Navigate to the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. Find the registry entry named ConsentPromptBehaviorAdmin.
4. By default, its value is set to “5” (prompt for consent without password). Change this value to “1”. This setting forces the system to prompt for the administrator's password every time a process or command requires elevated privileges.
From now on, any action that requires admin rights will trigger a password prompt, significantly reducing the success rate of a BadUSB attack.
Source: linkedin
A BadUSB refers to a type of malicious attack that exploits the firmware of USB devices. This makes the attack particularly dangerous and stealthy because the BadUSB emulates a HID (Human Interface Device), which is inherently trusted by the operating system. Once connected, the attack begins as the BadUSB starts injecting commands, typing at a speed of up to 1000wpm, allowing it to execute malicious actions almost instantly.
Attack Scenario
In a busy office, an employee steps away from their desk, leaving their laptop unlocked.
The attack exploits the unlocked system's trust in peripherals, allowing the malicious USB to execute commands without the user’s awareness, compromising the company’s security within seconds.
Example of Actions
Backdoor Installation: The USB types out commands to open a PowerShell terminal and install a hidden backdoor, granting the attacker remote access to the system.
Credential Theft: It retrieves saved passwords or authentication tokens from the system and sends them to an external server.
Network Reconnaissance: It runs scripts to map the internal network, identifying key servers and vulnerable devices.
Data Exfiltration: Sensitive company files are quickly zipped and emailed or uploaded to a remote server.
Prevention Technique
To reduce the chances of success for a BadUSB attack, you can configure User Account Control to require a password for administrative actions. This limits the potential damage a malicious USB can cause.
Steps
1. Press the Windows Key, then type regedt in the search bar to open the Registry Editor.
2. Navigate to the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. Find the registry entry named ConsentPromptBehaviorAdmin.
4. By default, its value is set to “5” (prompt for consent without password). Change this value to “1”. This setting forces the system to prompt for the administrator's password every time a process or command requires elevated privileges.
From now on, any action that requires admin rights will trigger a password prompt, significantly reducing the success rate of a BadUSB attack.
Source: linkedin