#Firefox shippt #Brave-#AdBlock-Engine, Looksmaxxing und das Harz der Apokalypse

c't 4004 – der c't-3003-Podcast: #Meta zwingt zum #Keylogger | 22

- 17:32:

Take der Woche: Warum man sich von Meta fernhalten sollte

-1:22:32 News aus der #Krise: #PCB-Harz wird knapp

- 1:32:32:

Firefox shippt heimlich Brave Adblock Engine

Webseite der Episode:
https://ct-3003.podigee.io/23-new-episode

Mediendatei:
https://audio.podigee-cdn.net/2482245-m-c27baab9b05f1a15697574de167edcd2.mp3?source=feed

#Vorratsdatenspeicherung
#Facebook

@ct_3003
@keno3003

Meta zwingt zum Keylogger | #22

Keno ist wieder in Deutschland.

c't 4004 – der c't-3003-Podcast

𝘕𝘦𝘶𝘦𝘳 𝘉𝘭𝘰𝘨-𝘈𝘳𝘵𝘪𝘬𝘦𝘭: 𝗞𝗲𝘆𝗹𝗼𝗴𝗴𝗲𝗿 & 𝗕𝗮𝗱𝗨𝗦𝗕: 𝗔𝗶𝗿𝗗𝗿𝗶𝘃𝗲 𝗞𝗲𝘆𝗯𝗼𝗮𝗿𝗱 𝗪𝗶𝘇𝗮𝗿𝗱 𝗪𝗶𝗙𝗶 📖

➡️ Ich habe mir wieder eine neue Hardware besorgt: den AirDrive Keyboard Wizard WiFi. Diese kleine Hardware sieht aus wie ein USB-Tastaturadapter. Im Inneren befindet sich neben einem Hardware-Keylogger auch eine BadUSB-Funktion. Damit kann der Adapter eigenständig Tastatureingaben tätigen. Ich habe mir die Hacking-Hardware genauer angeschaut.

Zum Artikel: https://scheible.it/keylogger-badusb-airdrive-keyboard-wizard-wifi/

#HackingHardware #Innentäter #Keylogger #BadUSB

https://scheible.it/keylogger-badusb-airdrive-keyboard-wizard-wifi/

Keylogger & BadUSB: AirDrive Keyboard Wizard WiFi

Ich habe mir wieder eine neue Hardware besorgt: den AirDrive Keyboard Wizard WiFi. Diese kleine Hardware sieht aus wie ein USB-Tastaturadapter. Im Inneren befindet sich neben einem Hardware-Keylogger…

Tobias Scheible - Cybercrime Dozent & Live Hacking Speaker
Btw, I destroyed my laptop because I wanted to make a #keylogger . Since everything in #Linux has a file I decided to see what's up 😞.
Anyway the key on your #keyboard are assigned #eventkeys.
Btw I also learnt how to merge both #C and #assembly after hours for reading documents.
I'm going to write a #USB #stack in the future probably on Saturday after #university from scratch no dependencies.
What have you learnt today?!

Bon, microsoft le fait déjà depuis (très) longtemps.

⋅ Meta va enregistrer les frappes clavier et mouvements de souris de ses employés pour entraîner son IA

https://www.clubic.com/actualite-610084-meta-va-enregistrer-les-frappes-clavier-et-mouvements-de-souris-de-ses-employes-pour-entrainer-son-ia.html

##Keylogger

Meta va enregistrer les frappes clavier et mouvements de souris de ses employés pour entraîner son IA

Dans des mémos internes de Meta, on a découvert le déploiement d'un logiciel de surveillance sur les ordinateurs des employés américains. Clics, frappes clavier, mouvements de souris seront capturés pour nourrir les futurs agents d'IA du groupe.

clubic.com

Überwachung am Arbeitsplatz - #Meta zeichnet #Tastatureingaben der Angestellten auf

Mit dem #Keylogger werden Maus- und Tastatureingaben offenbar genutzt, um damit eine neue Art von KI zu trainieren.

Das wird bestimmt super, wenn dann die KI die Menschen und deren Arbeit optimiert *nicht* 🤨

https://www.golem.de/news/ueberwachung-am-arbeitsplatz-meta-zeichnet-tastatureingaben-der-angestellten-auf-2604-207862.html

Überwachung am Arbeitsplatz: Meta zeichnet Tastatureingaben der Angestellten auf - Golem.de

Mit dem Keylogger werden Maus- und Tastatureingaben offenbar genutzt, um damit eine neue Art von KI zu trainieren.

Golem.de
Windows 11 Privacy Settings you should change now

YouTube

Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger

Pulse ID: 69ddc274967bab83c0b8258b
Pulse Link: https://otx.alienvault.com/pulse/69ddc274967bab83c0b8258b
Pulse Author: Tr1sa111
Created: 2026-04-14 04:28:36

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #KeyLogger #OTX #OpenThreatExchange #PowerShell #VBS #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger

On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration. The infrastructure included 79+ domains across 5 C2 IPs spanning Korean VPS providers. The server responded with "Million OK !!!!" signature, matching previously documented Kimsuky infrastructure while showing upgraded Apache/PHP stack. The operation targeted Korean Naver users through credential phishing and tax authority impersonation, with infrastructure linked to previously documented Kimsuky campaigns via shared DAOU Technology subnets.

Pulse ID: 69dd07742196e34ee1615b73
Pulse Link: https://otx.alienvault.com/pulse/69dd07742196e34ee1615b73
Pulse Author: AlienVault
Created: 2026-04-13 15:10:44

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APAC #Apache #Clipboard #CyberSecurity #InfoSec #KeyLogger #Kimsuky #Korea #OTX #OpenThreatExchange #PHP #Phishing #PowerShell #RAT #RCE #UK #VBS #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

@wyatt @hatzka If I had to guess, these fundamental changes have happened since the XFree86 era:

1. Internationalization: Personal computer use has expanded out of the Americas and western Europe. Asia in particular brings a need for large glyph sets, contextual glyph shaping, diacritic stacking, bidirectional writing, top-to-bottom writing, and antialiasing to make small curves easier to distinguish. How well does X11's font paradigm handle these, as opposed to relying on "modern" toolkits to shove bitmaps around?

2. High density: People expect things to appear the same size on more than one display connected to one computer even if one has more pixels per millimeter than the other.

3. Privacy: Computer networks have become much less trusted over the past few decades. There was demand to deter publishers of proprietary applications from surreptitiously activating a keylogger or screen logger to exfiltrate your data in other applications.

#x11 #i18n #bidi #HighDPI #keylogger