Forwarded from DailyCVE
🔴 #macOS - Privilege Escalation - #CVE-2024-23244 (Critical)
https://dailycve.com/macos-privilege-escalation-cve-2024-23244-critical/
@Daily_CVE
https://dailycve.com/macos-privilege-escalation-cve-2024-23244-critical/
@Daily_CVE
DailyCVE
macOS - Privilege Escalation - CVE-2024-23244 (Critical) - DailyCVE
2024-12-06 Platform: macOS Version: Sonoma 14.4, Monterey 12.7.4 (Unaffected versions not listed) Vulnerability: Privilege Escalation Severity: Critical Date: March 7, […]
Forwarded from DailyCVE
🔵 #macOS Sonoma - Permissions Issue - #CVE-2024-23253 (Low)
https://dailycve.com/macos-sonoma-permissions-issue-cve-2024-23253-low/
@Daily_CVE
https://dailycve.com/macos-sonoma-permissions-issue-cve-2024-23253-low/
@Daily_CVE
DailyCVE
macOS Sonoma - Permissions Issue - CVE-2024-23253 (Low) - DailyCVE
2024-12-06 : Apple addressed a permissions issue in macOS Sonoma versions before 14.4 that could allow an app to access […]
Forwarded from DailyCVE
🔴 #macOS Kerberos v5 PAM Module Vulnerability (#CVE-2024-23234) - Critical
https://dailycve.com/macos-kerberos-v5-pam-module-vulnerability-cve-2024-23234-critical/
@Daily_CVE
https://dailycve.com/macos-kerberos-v5-pam-module-vulnerability-cve-2024-23234-critical/
@Daily_CVE
DailyCVE
macOS Kerberos v5 PAM Module Vulnerability (CVE-2024-23234) - Critical - DailyCVE
2024-12-06 Platform: macOS Version: Not specified (all versions vulnerable before macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5) Vulnerability: […]
Forwarded from DailyCVE
🔴 #macOS Sonoma 144, #iOS 174, iPadOS 174, tvOS 174 - Information Leakage (#CVE-2024-23241 - High)
https://dailycve.com/macos-sonoma-144-ios-174-ipados-174-tvos-174-information-leakage-cve-2024-23241-high/
@Daily_CVE
https://dailycve.com/macos-sonoma-144-ios-174-ipados-174-tvos-174-information-leakage-cve-2024-23241-high/
@Daily_CVE
DailyCVE
macOS Sonoma 144, iOS 174, iPadOS 174, tvOS 174 - Information Leakage (CVE-2024-23241 - High) - DailyCVE
2024-12-06 : Apple patched a vulnerability (CVE-2024-23241) in macOS Sonoma 14.4, iOS 17.4, iPadOS 17.4, and tvOS 17.4. This vulnerability […]
Forwarded from DailyCVE
🔴 #macOS CoreCrypto Vulnerability (#CVE-2024-23247) - Critical
https://dailycve.com/macos-corecrypto-vulnerability-cve-2024-23247-critical/
@Daily_CVE
https://dailycve.com/macos-corecrypto-vulnerability-cve-2024-23247-critical/
@Daily_CVE
DailyCVE
macOS CoreCrypto Vulnerability (CVE-2024-23247) - Critical - DailyCVE
2024-12-06 Platform: macOS Version: Sonoma 14.4, Monterey 12.7.4, Ventura 13.6.5 (all prior versions are vulnerable) Vulnerability: Improper Memory Handling (Code […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ #Samsung EDGE 2023: A Platform for Young Innovators
https://undercodenews.com/samsung-edge-2023-a-platform-for-young-innovators/
@Undercode_News
https://undercodenews.com/samsung-edge-2023-a-platform-for-young-innovators/
@Undercode_News
UNDERCODE NEWS
Samsung EDGE 2023: A Platform for Young Innovators - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
The #Digital Age and the Paradox of Parenting: A Reflection by Bill Gates
https://undercodenews.com/the-digital-age-and-the-paradox-of-parenting-a-reflection-by-bill-gates/
@Undercode_News
https://undercodenews.com/the-digital-age-and-the-paradox-of-parenting-a-reflection-by-bill-gates/
@Undercode_News
UNDERCODE NEWS
The Digital Age and the Paradox of Parenting: A Reflection by Bill Gates - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Samsung Health Gets a Refresh with One UI 70
https://undercodenews.com/samsung-health-gets-a-refresh-with-one-ui-70/
@Undercode_News
https://undercodenews.com/samsung-health-gets-a-refresh-with-one-ui-70/
@Undercode_News
UNDERCODE NEWS
Samsung Health Gets a Refresh with One UI 70 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑 AI models and tools for cybersecurity and hacking research
1. Code Analysis and Security Tools
- CodeBERT: AI model for secure code analysis.
URL: [https://huggingface.co/microsoft/codebert-base](https://huggingface.co/microsoft/codebert-base)
- DeepCode by Snyk: Detects vulnerabilities in codebases.
URL: [https://www.deepcode.ai/](https://www.deepcode.ai/)
- Joern: Open-source code analysis tool designed for vulnerability discovery.
URL: [https://joern.io/](https://joern.io/)
2. Adversarial Models and Simulations
- DeepExploit: Automates penetration testing with AI-driven attacks.
URL: [https://github.com/13o-bbr-bbq/machine_learning_security](https://github.com/13o-bbr-bbq/machine_learning_security)
- TextAttack: Framework for generating adversarial text for NLP systems.
URL: [https://github.com/QData/TextAttack](https://github.com/QData/TextAttack)
- Foolbox: Test the robustness of AI models with adversarial inputs.
URL: [https://foolbox.readthedocs.io/](https://foolbox.readthedocs.io/)
3. Malware Detection and Threat Intelligence
- MalConv: Neural network for malware detection from raw binaries.
URL: [https://github.com/Endermanch/MalwareDatabase](https://github.com/Endermanch/MalwareDatabase)
- Cuckoo Sandbox AI: Analyze malware behavior with AI integration.
URL: [https://cuckoosandbox.org/](https://cuckoosandbox.org/)
- Viper Framework: Malware and binary analysis toolset.
URL: [https://github.com/viper-framework/viper](https://github.com/viper-framework/viper)
4. Image and Data Analysis Tools
- YOLO (You Only Look Once): Detect anomalies or objects in visual data.
URL: [https://github.com/ultralytics/yolov5](https://github.com/ultralytics/yolov5)
- AutoML Vision by Google: Train custom vision models for detecting tampering.
URL: [https://cloud.google.com/automl](https://cloud.google.com/automl)
5. Network and System Monitoring Tools
- SnortAI: Intrusion detection with machine learning enhancements.
URL: [https://www.snort.org/](https://www.snort.org/)
- Zeek AI (Bro): Network analysis framework extended with AI.
URL: [https://zeek.org/](https://zeek.org/)
- DeepPacket: AI-driven analysis of network packet data.
URL: [https://github.com/xiaokexiang/DeepPacket](https://github.com/xiaokexiang/DeepPacket)
6. General Security Tools with AI Features
- TriageML: Machine learning for automating malware triage.
URL: [https://github.com/fireeye/Triage](https://github.com/fireeye/Triage)
- AI-Hunter: AI-driven platform for detecting and investigating cyber threats.
URL: [https://www.criticalstart.com/ai-hunter/](https://www.criticalstart.com/ai-hunter/)
- ELK Stack with AI: Integrate AI plugins with the ELK Stack for advanced threat detection.
URL: [https://www.elastic.co/](https://www.elastic.co/)
1. Code Analysis and Security Tools
- CodeBERT: AI model for secure code analysis.
URL: [https://huggingface.co/microsoft/codebert-base](https://huggingface.co/microsoft/codebert-base)
- DeepCode by Snyk: Detects vulnerabilities in codebases.
URL: [https://www.deepcode.ai/](https://www.deepcode.ai/)
- Joern: Open-source code analysis tool designed for vulnerability discovery.
URL: [https://joern.io/](https://joern.io/)
2. Adversarial Models and Simulations
- DeepExploit: Automates penetration testing with AI-driven attacks.
URL: [https://github.com/13o-bbr-bbq/machine_learning_security](https://github.com/13o-bbr-bbq/machine_learning_security)
- TextAttack: Framework for generating adversarial text for NLP systems.
URL: [https://github.com/QData/TextAttack](https://github.com/QData/TextAttack)
- Foolbox: Test the robustness of AI models with adversarial inputs.
URL: [https://foolbox.readthedocs.io/](https://foolbox.readthedocs.io/)
3. Malware Detection and Threat Intelligence
- MalConv: Neural network for malware detection from raw binaries.
URL: [https://github.com/Endermanch/MalwareDatabase](https://github.com/Endermanch/MalwareDatabase)
- Cuckoo Sandbox AI: Analyze malware behavior with AI integration.
URL: [https://cuckoosandbox.org/](https://cuckoosandbox.org/)
- Viper Framework: Malware and binary analysis toolset.
URL: [https://github.com/viper-framework/viper](https://github.com/viper-framework/viper)
4. Image and Data Analysis Tools
- YOLO (You Only Look Once): Detect anomalies or objects in visual data.
URL: [https://github.com/ultralytics/yolov5](https://github.com/ultralytics/yolov5)
- AutoML Vision by Google: Train custom vision models for detecting tampering.
URL: [https://cloud.google.com/automl](https://cloud.google.com/automl)
5. Network and System Monitoring Tools
- SnortAI: Intrusion detection with machine learning enhancements.
URL: [https://www.snort.org/](https://www.snort.org/)
- Zeek AI (Bro): Network analysis framework extended with AI.
URL: [https://zeek.org/](https://zeek.org/)
- DeepPacket: AI-driven analysis of network packet data.
URL: [https://github.com/xiaokexiang/DeepPacket](https://github.com/xiaokexiang/DeepPacket)
6. General Security Tools with AI Features
- TriageML: Machine learning for automating malware triage.
URL: [https://github.com/fireeye/Triage](https://github.com/fireeye/Triage)
- AI-Hunter: AI-driven platform for detecting and investigating cyber threats.
URL: [https://www.criticalstart.com/ai-hunter/](https://www.criticalstart.com/ai-hunter/)
- ELK Stack with AI: Integrate AI plugins with the ELK Stack for advanced threat detection.
URL: [https://www.elastic.co/](https://www.elastic.co/)
huggingface.co
microsoft/codebert-base · Hugging Face
We’re on a journey to advance and democratize artificial intelligence through open source and open science.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#PlayStation Takes Over Delhi Comic Con 2024
https://undercodenews.com/playstation-takes-over-delhi-comic-con-2024/
@Undercode_News
https://undercodenews.com/playstation-takes-over-delhi-comic-con-2024/
@Undercode_News
UNDERCODE NEWS
PlayStation Takes Over Delhi Comic Con 2024 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #AI-Powered Identity Access Management: A New Cybersecurity
https://undercodenews.com/ai-powered-identity-access-management-a-new-cybersecurity/
@Undercode_News
https://undercodenews.com/ai-powered-identity-access-management-a-new-cybersecurity/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🌐 Gamaredon Leverages Cloudflare Tunnels to Conceal Malicious Activity
https://undercodenews.com/gamaredon-leverages-cloudflare-tunnels-to-conceal-malicious-activity/
@Undercode_News
https://undercodenews.com/gamaredon-leverages-cloudflare-tunnels-to-conceal-malicious-activity/
@Undercode_News
UNDERCODE NEWS
Gamaredon Leverages Cloudflare Tunnels to Conceal Malicious Activity - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚠️ More_Eggs #Malware Expands Toolkit with New Backdoor and Loader
https://undercodenews.com/moreeggs-malware-expands-toolkit-with-new-backdoor-and-loader/
@Undercode_News
https://undercodenews.com/moreeggs-malware-expands-toolkit-with-new-backdoor-and-loader/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ How to Craft a Robust Password Policy for Real-World Security
https://undercodenews.com/how-to-craft-a-robust-password-policy-for-real-world-security/
@Undercode_News
https://undercodenews.com/how-to-craft-a-robust-password-policy-for-real-world-security/
@Undercode_News
UNDERCODE NEWS
How to Craft a Robust Password Policy for Real-World Security - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Email Tracking:
### 🔍 About Zehef
Zehef specializes in:
- Locating public data associated with a specific email address.
- Providing insights into email breaches, pastes, and social media accounts.
---
### 🌠 Key Features
1. Breached Data Check:
- Identify if the email has appeared in any public data breaches using sources like Pastebin or others.
2. HudsonRock Integration:
- Leverage HudsonRock to analyze leaks and identify potential compromises.
3. Social Media Account Discovery:
- Check for linked accounts across platforms such as:
- Instagram
- Spotify
- Deezer
- Adobe
- 𝕏 (formerly Twitter), etc.
4. Email Combination Generation:
- Create possible variations of the target email for further testing or OSINT purposes.
---
### 📦 Installation
#### Prerequisites
- Python: Version 3.10 or later.
- Git: Installed and configured.
#### Steps:
1. Clone the Zehef repository:
2. Install the dependencies:
---
### 🎲 Usage
Run the tool with the following syntax:
#### Example:
#### Available Options:
-
-
---
### 💡 Notes
Zehef is an advanced tool for ethical OSINT practices and should only be used with proper authorization. Misuse could violate laws or terms of service on various platforms.
🔗 GitHub Repository: [Zehef on GitHub](https://github.com/N0rz3/Zehef)
### 🔍 About Zehef
Zehef specializes in:
- Locating public data associated with a specific email address.
- Providing insights into email breaches, pastes, and social media accounts.
---
### 🌠 Key Features
1. Breached Data Check:
- Identify if the email has appeared in any public data breaches using sources like Pastebin or others.
2. HudsonRock Integration:
- Leverage HudsonRock to analyze leaks and identify potential compromises.
3. Social Media Account Discovery:
- Check for linked accounts across platforms such as:
- Spotify
- Deezer
- Adobe
- 𝕏 (formerly Twitter), etc.
4. Email Combination Generation:
- Create possible variations of the target email for further testing or OSINT purposes.
---
### 📦 Installation
#### Prerequisites
- Python: Version 3.10 or later.
- Git: Installed and configured.
#### Steps:
1. Clone the Zehef repository:
git clone https://github.com/N0rz3/Zehef.git
cd Zehef
2. Install the dependencies:
pip3 install -r requirements.txt
---
### 🎲 Usage
Run the tool with the following syntax:
python3 zehef.py [email]
#### Example:
python3 zehef.py target@example.com
#### Available Options:
-
email: The email address for which you want to retrieve information.-
-h, --help: Displays help information.---
### 💡 Notes
Zehef is an advanced tool for ethical OSINT practices and should only be used with proper authorization. Misuse could violate laws or terms of service on various platforms.
🔗 GitHub Repository: [Zehef on GitHub](https://github.com/N0rz3/Zehef)
GitHub
GitHub - N0rz3/Zehef: Zehef is an osint tool to track emails
Zehef is an osint tool to track emails. Contribute to N0rz3/Zehef development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Windows 11: A New PC Power and Security
https://undercodenews.com/windows-11-a-new-pc-power-and-security/
@Undercode_News
https://undercodenews.com/windows-11-a-new-pc-power-and-security/
@Undercode_News
UNDERCODE NEWS
Windows 11: A New PC Power and Security - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📊 #Vodafone Idea Launches Super Hero Plan: Unlimited Morning Data for Data-Savvy Users
https://undercodenews.com/vodafone-idea-launches-super-hero-plan-unlimited-morning-data-for-data-savvy-users/
@Undercode_News
https://undercodenews.com/vodafone-idea-launches-super-hero-plan-unlimited-morning-data-for-data-savvy-users/
@Undercode_News
UNDERCODE NEWS
Vodafone Idea Launches Super Hero Plan: Unlimited Morning Data for Data-Savvy Users - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ Setting Up #Apple Devices for Kids: A Parent's Guide
https://undercodenews.com/setting-up-apple-devices-for-kids-a-parents-guide/
@Undercode_News
https://undercodenews.com/setting-up-apple-devices-for-kids-a-parents-guide/
@Undercode_News
UNDERCODE NEWS
Setting Up Apple Devices for Kids: A Parent's Guide - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…