| protonmail | [email protected] |
| keyoxide | openpgp4fpr:48B47E8B01BDF32ECC0ABE639AC4459B4318B9666 |
| protonmail | [email protected] |
| keyoxide | openpgp4fpr:48B47E8B01BDF32ECC0ABE639AC4459B4318B9666 |
PUBLIC SERVICE ANNOUNCEMENT:
There is an increase of account takeovers due to insiders at telco firms simply giving control to people paying them/compromised support staff accounts. Do a check on systems where this single factor would permit an account compromise. And change the configuration. These are opportunistic trawling attacks. This is becoming more common as attackers replicate the success.
The attacker uses other channels (like people search websites) to enumerate and guess the phone number attached to an online account and then checks against the telco they have control over.
The insider only briefly temporarily forwards the victim number to a 3rd party then switches it back to normal once they’re in. This is how they stay quiet since most victims will not have leverage or telemetry to understand how they got hacked.
It was their cell phone provider.
Make it so account recovery systems require multiple factors and remove telephony-based recovery for VIP accounts entirely.
Go check your systems now. Go try to access all your stuff like you forgot your password.
I am very serious. This is based on private knowledge but is compelled by the compromise of the SEC. This is common now.
Greetz to all h4x0rs, stuff-breakers, InfoSec pros, g33k girls, international spies, and script kidz, CackalackyCon will occur on May 17-19 2024 in RTP, North Carolina (USA). We are now officially accepting speaker/paper/demo submissions for the event. If you are somewhat knowledgeable in any interesting field of hacking, technology, robotics, science, global thermonuclear war, lock circumvention, etc. (but mostly hacking), and you are interested in presenting at CackalackyCon, we cordially invite you to submit your proposal. First round will close on January 15, 2024 midnight EST (form submission timestamp). Some proposals will be accepted early. All submissions are due by February 16, 2024 midnight EST (form submission timestamp). Please review our “Tips For Getting Your CFP Submission Selected” before submitting. We value diversity so please don't hesitate to propose your ideas no matter how outlandish (following the Code of Conduct). If you are selected to present at the Con, you will receive: - Free CackalackyCon admission for you and one guest - Unlimited fist bumps from our staff - A reputation (not necessarily a good one) - Other swag Peace, The CackalackyCon Staff
I'll be copresenting another workshop with @threlfall at cactuscon.com
See you there.
[1/2] Almost six months ago the Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly, directed the Technical Advisory Council (TAC) of the Cybersecurity Advisory Council (CSAC) to answer six questions around Memory Safety to help the department understand the challenges and opportunities of Memory Safe Systems Languages such as Rust, Go, and Swift.
DL/DR: Memory Safe Systems Languages are becoming mature, hyper-scale companies are doing incremental rewrites, there are additional protections that should be used in non-memory safe languages such as c++, and you should start to develop your roadmap. Please read the report. 😎
Since the TAC started working, Memory Safety has become a hot topic, with the NSA joining CISA to release "The Case for Memory Safe Roadmaps"
Last week the TAC submitted our final report at the quarterly public meeting and I'm pleased to link it here:
https://www.cisa.gov/sites/default/files/2023-12/CSAC_TAC_Recommendations-Memory-Safety_Final_20231205_508.pdf
I don't live in Splunk, so its news to me, but I've taken extensive training in it in the past and I discovered something today that blew my mind.
Splunk as best as I can tell, does not have a native function for decoding base64 strings...WTF!!!
A U.S. senator revealed today that government agencies worldwide demand mobile push notification records from Apple and Google users to spy on their customers.