jacquesdus.bsky.social
@jacquesdus.bsky.social
This is definitely a new approach of introducing malware to Computer and Notebooks. It is not theoretical but actually happened.

According to Malwarebytes, a  Spencer’s Sexology Vibrator was infected.

www.malwarebytes.com/blog/news/20...

#Cybersecurity #SpencerSexology #Malware #Malwarebytes
[updated] Vibrator virus steals your personal information | Malwarebytes
One of our customers found their vibrator was buzzing with a hint of malware.
www.malwarebytes.com
February 28, 2024 at 6:28 PM
The latest 2024 state of the Malware Report from Malwarebytes has a chapter dedicated to Mac Malware (Chapter 8, Page 25ff)

try.threatdown.com/2024-state-o...

Of course the report also covers other Malware including Windows and Android.

#Cybersecurity #Malware #Malwarebytes #Apple #MacOS
2024 State of Malware | ThreatDown, powered by Malwarebytes
The 2024 State of Malware report is a comprehensive analysis of six pressing cyberthreats— including CL0P, Living Off The Land (LOTL) attacks, malvertising, and Big Game ransomware— and outlines the proactive measures IT and security teams can take to safeguard their organizations.
try.threatdown.com
February 8, 2024 at 9:19 AM
Security researcher Stacksmashing shows in the video below how he extracts the Bitlocker enycryption key from a Windows PC in 43 seconds using a $4 Raspberry Pi Pico and another $6 in equipment:

youtu.be/wTl4vEednkQ?...

#Cybersecurity #Bitlocker #Windows #TPM
Breaking Bitlocker - Bypassing the Windows Disk Encryption
In this video we will use a hardware attack to bypass TPM-based Bitlocker encryption as used on most Microsoft Windows devices. Errata: - PIN can also be enabled using manage-bde, not just using group policies Questions: - Does this work on TPM2.0? Yes, at least on some: https://pulsesecurity.co.nz/articles/TPM-sniffing Links: - https://hextree.io/ - Pascal Gujer: https://twitter.com/pascal_gujer / https://hands-on-security.com - Enabling Bitlocker PIN: https://www.howtogeek.com/262720/how-to-enable-a-pre-boot-bitlocker-pin-on-windows/ - Hardware & source-code: https://github.com/stacksmashing/pico-tpmsniffer - LPC Clockless Analyzer for Saleae: https://github.com/stacksmashing/LPCClocklessAnalyzer Me: - Twitter: https://twitter.com/ghidraninja - Patreon: https://patreon.com/stacksmashing Posts about sniffing bitlocker: - https://labs.withsecure.com/publications/sniff-there-leaks-my-bitlocker-key - https://www.secura.com/blog/tpm-sniffing-attacks-against-non-bitlocker-targets - https://blog.scrt.ch/2021/11/15/tpm-sniffing/ - https://pulsesecurity.co.nz/articles/TPM-sniffing
youtu.be
February 8, 2024 at 8:58 AM
Yesterday CISA warned that a patched kernel security flaw affecting Apple iPhones, Macs, TVs, and watches is now being actively exploited in attacks.

CISA ordered U.S. federal agencies to patch the bug by February 21st.

www.cisa.gov/news-events/...

#Cybersecurity #CISA #Apple
CISA Adds One Known Exploited Vulnerability to Catalog | CISA
www.cisa.gov
February 1, 2024 at 9:39 AM
Ars Technica has just warned about a never before seen obfuscation malware campaign that used it's own webpage in conjunction with a benign picture of a Pizza uploaded elsewhere and video-sharing site Vimeo.

arstechnica.com/security/202...

#Cybersecurity #Malware #ArsTechnica #Base64 #Vimeo #Pizza
Ars Technica used in malware campaign with never-before-seen obfuscation
Vimeo also used by legitimate user who posted booby-trapped content.
arstechnica.com
January 31, 2024 at 1:13 PM
A lot of the information may be old but given how lazy people are in changing their passwords and reusing the same ones for multiple sites, the danger is still great given 12 Terabytes of leaked data:

cybernews.com/security/bil...

#Cybersecurity #Passwordleak
Mother of All Breaches: ​a Historic Data Leak Reveals 26 Billion Records | Cybernews
The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records. The leak is almost certainl...
cybernews.com
January 25, 2024 at 9:10 AM
Google Assistant is loosing 17 different features due to the lay-offs at the Parent company.

Of course Google is trying to sell the cuts through claiming it offers users a "more consistent experience"

support.google.com/assistant/an...

#Google #SmartAssistants #SmartHome
Changes we’re making to Google Assistant - Google Assistant Help
Over the years, we’ve made it even easier to accomplish your tasks with Assistant — thanks, in large part, to your feedback. And in order to keep improving your experience, we’re making a few ch...
support.google.com
January 16, 2024 at 9:55 AM
Leider wundert mich das bei unserer Innenministerin und aktuellen Politikern nicht.

Aber nachher laut schreien wenn unsere Unternehmen gehackt werden.

Liebe Hacker und Geheimdienste, Willkommen zu unseren Daten:

netzpolitik.org/2024/schwach...

#Cybersecurity #Deutschland #BSI
Schwachstellen: Ampel diskutiert Bruch des Koalitionsvertrags – netzpolitik.org
Innenministerin Faeser will Polizei und Geheimdiensten erlauben, IT-Sicherheitslücken offenzuhalten und auszunutzen. Das geht aus Dokumenten einer Ampel-Arbeitsgruppe hervor, die wir veröffentlichen...
netzpolitik.org
January 15, 2024 at 12:34 PM
A new MacOS backdoor allowing hackers originating in North Korean and called Spectral Blur was recently discovered:

www.securityweek.com/new-spectral...

It seems to be able to evade detection from AntiVirus software.

#Cybersecurity #MacOS #NorthKorea
New ‘SpectralBlur’ macOS Backdoor Linked to North Korea
SpectralBlur is a new macOS backdoor that shows similarities with North Korean hacking group’s KandyKorn malware.
www.securityweek.com
January 8, 2024 at 9:11 AM
Why would anyone do this and am I the only worried by this development?

www.extremetech.com/extreme/rese...

#ArtificialIntelligence
Researchers Create Chatbot that Can Jailbreak Other Chatbots
The Masterkey bot was able to make ChatGPT and Bard turn evil.
www.extremetech.com
December 29, 2023 at 9:22 AM
Details on the ‘Most sophisticated’ iPhone attack chain ‘ever seen’ used four 0-days to create a 0-click exploit

9to5mac.com/2023/12/27/m...

#Cybersecurity #Apple #iOS #ZeroDayAttack
'Most sophisticated' iPhone attack chain 'ever seen' used four 0-days to create a 0-click exploit - ...
Between 2019 and December 2022, an extremely advanced iMessage vulnerability was in the wild that was eventually named “Operation Triangulation”...
9to5mac.com
December 28, 2023 at 12:09 PM
A new man-in-the-middle attack called Terrapin can affect SSH connections if they are secured by either "ChaCha20-Poly1305" or "CBC with Encrypt-then-MAC" which covers around 77% of connections (preferred choice for 57% of connections)

arstechnica.com/security/202...

#Cybersecurity #SSH #Terrapin
SSH protects the world’s most sensitive networks. It just got a lot weaker
Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.
arstechnica.com
December 20, 2023 at 9:51 AM
Many use VPNs to secure their Web-traffic not knowing the Apple devices have a vulnerability first discovered in 2020 and having gotten worse this year.

Apple is also making no efforts to fix it:

protonvpn.com/blog/apple-i...

#Cybersecurity #Apple #iOS #iPhone #VPN #Proton
Apple iOS vulnerability causes connections to bypass VPN
We discovered a security vulnerability in Apple’s iOS that causes connections to remain unencrypted even after connecting to VPN.
protonvpn.com
December 11, 2023 at 12:01 PM
A new iPhone Security warning affecting all iPhone users using a malicious Lockdown Mode trick has been revealed.

Hackers can exploit trust in Lockdown Mode to create a facade of protection while, they can enjoy stealthy access to a successfully targeted iPhones.

www.jamf.com/blog/fake-lo...
Jamf Threat Labs: Fake Lockdown Mode proof of concept
JTL security researchers discover how Lockdown Mode on iOS can be manipulated by a threat actor on compromised or jailbroken iPhones to trick users into believing that their device is protected by Loc...
www.jamf.com
December 7, 2023 at 9:32 AM
It seems that Apple, which wants you to believe that it gives your security priority, has been ignoring an ongoing security problem since 2020 which has been getting worse.

But then again it only affects corporate customers.

blog.appicaptor.com/2023/11/30/n...

#Cybersecurity #Apple #FraunhoferSIT
No Patch, no Trust: Consequences of iOS Data Flow Restriction Bypasses for Enterprises - Appicaptor ...
The number of ways to bypass iOS data flow restrictions meanwhile has further increased, but Apple still does not bother to fix them. So, the question is: How trustworthy are iOS MDM restrictions if e...
blog.appicaptor.com
December 1, 2023 at 11:30 PM
A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server.

thehackernews.com/2023/11/expe...

#Cybersecurity
Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections
The study highlights a vulnerability in SSH servers that allows passive attackers to obtain private RSA host keys.
thehackernews.com
November 28, 2023 at 10:05 AM