Friday, June 5, 2020

Writing a Simple Polymorphic Engine

submitted by /u/0x5FC3

EFF IAmA – EARN IT Act Threatens Encryption

submitted by /u/y-oro

NEW Linux CTF priv-esc enumeration tool

submitted by /u/HackHut

How are people finding personal information from social media?

I have been seeing memes of people exposing addresses and phone numbers of terrible people and I wanted to know how this is possible? are they finding ip through social media? submitted...

Chrome stealer malware

So im coding a chrome creds stealer in c++ and i need to obtain a user profile username since the folder where the database for chrome is named after this username.I can take the name from something...

Business Services Provider Conduent Hit by Ransomware

Business process services provider Conduent has been the victim of a ransomware attack that appears to be the work of Maze operators. Formed in 2017 as a divestiture from Xerox and headquartered in New Jersey, the company offers digital platforms...
SC Magazine

Cisco security advisories address 47 flaws, three critical

Cisco Systems on Wednesday, June 3 released a series of security advisories addressing a total of 47 vulnerabilities, including three critical bugs that were found and fixed in IOS or IOS EX software. Among the most series flaws is a...

Electrolux, Others Conned Out of Big Money by BEC Scammer

Kenenty Hwan Kim has pleaded guilty to swindling the appliance giant and other companies in a set of elaborate schemes.
The Register

Kind of goes without saying, but fix your admin passwords or risk getting borged by this brute-forcing botnet

Publishing platforms, hosts being targeted by Stealthworker malware Servers are being targeted with a malware attack that uses its infected hosts to brute-force other machines.…

News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate

Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.