cKure Red
2.36K subscribers
70 photos
33 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world ๐ŸŒŽ

Main Channel: @cKure

โ˜•๏ธ or queries email us
๐Ÿ“จ i@ckure.org
Download Telegram
cKure Red pinned ยซ๐ŸŠConfusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server. https://blog.orange.tw/posts/2024-08-confusion-attacks-en/ยป
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ’Ž Stealth Shell: A Fully Virtualized Attack Toolchain.

https://phrack.org/issues/71/14.html
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
๐Ÿ•ฏ WhenFS turns your Google Calendar into a FUSE filesystem. It whimsically supports the following features:

โžก๏ธCreate a filesystem out of existing Google Calendars, or create a new one from scratch
โžก๏ธRead and write files and directories.
โžก๏ธMount your friends' WhenFS calendar file systems to share files in the silliest way possible

https://github.com/lvkv/whenfs
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ’ฌ GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices.

https://sites.google.com/view/Gazeploit/

PDF: https://arxiv.org/pdf/2409.08122
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ˜Zero-Day: Israel ๐Ÿ‡ฎ๐Ÿ‡ฑ conducted a kinetic cyberattack using power surge to target handheld pager systems used by Lebabnon's resistance members (aka Hizbollah) in Beirut's southern suburbs leading to dozens of injuries in Lebanon ๐Ÿ‡ฑ๐Ÿ‡ง

The attack was executed in civilian areas of a sovereign nation.

Around 1K cases have been reported.
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
1
cKure Red pinned a video
๐ŸคWorking zero-day exploits for all apple mobile phones (aka iPhones) and all Samsung phones (android ones) are available with major phone hacking companies from Israel ๐Ÿ‡ฎ๐Ÿ‡ฑ in their hotยน state. In a cold state, access may be hindered based on device type and model.

ยน Unlike cold state where the phone is unlocked or recently locked where keys ๐Ÿ”‘ are in memory.


Characteristics:
๐Ÿฅ‡The exploit(s) does allow full device access (Kernel) in both smartphone brands.

๐ŸฅˆThe exploit(s) requires physical access to the device.

๐Ÿฅ‰The exploit may work on future device models without chance.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
๐Ÿง  ByteDance recently terminated an intern for sabotaging an AI model training project within its commercial technology team. The intern was accused of malicious interference, leading to their dismissal in August 2024. Despite reports suggesting significant financial damage, ByteDance clarified that the sabotage did not impact formal commercial projects or their broader AI operations. The company has informed the intern's university and relevant industry bodies. This incident highlights growing concerns around AI security and insider threats in the tech industry.
Please open Telegram to view this post
VIEW IN TELEGRAM