11 Followers
160 Following
29 Posts
CTF Player | Security Researcher
Plan for today? Ride my bike. That's it. All day.

Within five minutes of requesting a new certificate from #letsencrypt, a total of 50 different IPs hit my zero-traffic-other-than-me web server.

Thanks to Certificate Transparency it's never been easier to get your honeypot discovered!

#cybersecurity #infosec

Try the Last Internet Kermit Server

$ grep kermit /etc/services kermit 1649/tcp What is this mysterious protocol? Who uses it and what is its story? This story is a winding one, beginning in 1981. Kermit is, to the best of my knowledโ€ฆ

The Changelog

Ransomware gangs continue to prioritize targeting VMware ESXi servers, with almost every active ransomware gang creating custom Linux encryptors for this purpose.

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-4th-2023-targeting-vmware-esxi/

The Week in Ransomware - August 4th 2023 - Targeting VMware ESXi

Ransomware gangs continue to prioritize targeting VMware ESXi servers, with almost every active ransomware gang creating custom Linux encryptors for this purpose.

BleepingComputer

๐ŸŒฉ๏ธ Unleash the Storm in the Cloud! Join us on our #DEFCON livestream with Matt Johansen, Andrew Martin, and Moses Frost for a captivating journey into #cloudhacking! ๐ŸŒฉ๏ธ

In this session, these experts will embark on a deep dive into the #cloud. From identifying misconfigurations to infiltrating cloud-based environments, our speakers will demonstrate cutting-edge techniques to explore the uncharted territories of #cloudsecurity. Get ready to conquer the cloud in this #BFLive session on Aug. 11! https://bfx.social/3rK2jxS

The Art of Hacking: Livestream from DefCon 31

Get perspectives from 20+ CISOs, industry authorities, cyber investors, & security founders on topics that are top of mind for todayโ€™s security leaders.

Bishop Fox
I played Minecraft for the first time. What a blockbuster. Truly a groundbreaking game.

The privacy-focused search engine Brave Search has finally introduced its own, independent image and video search capabilities, breaking free from relying on Bing and Google for media search.

https://www.bleepingcomputer.com/news/security/brave-search-adds-private-image-and-video-search-capability/

Brave Search adds private image and video search capability

The privacy-focused search engine Brave Search has finally introduced its own, independent image and video search capabilities, breaking free from relying on Bing and Google for media search.

BleepingComputer
Hacking group plans system to encrypt social media and other apps

The hacktivist group Cult of the Dead Cow will release details about the system at Def Con next week.

The Washington Post

"firefox only has a 3% market share"

bruh that's 150 million people

๐Ÿ”’ Technical Report: Hidden Dangers of .zip Domains ๐Ÿ”

#cybersecurity #phishing #malware #TLDs #onlinefraud

Introduction:
Google's introduction of new top-level domains, including ".zip," has lifted limitations on TLD registrations. However, cybercriminals have capitalized on this opportunity to deceive users and conduct phishing attacks.

Cybersecurity Risks with .zip Domains:
๐Ÿ‘‰ Cybercriminals misuse .zip domains, impersonating reputable IT firms, like Microsoft and Google, to trick users into downloading malware.
๐Ÿ‘‰ A "file archiver in the browser" phishing kit exploits .zip domains, luring users into executing malicious files and stealing credentials.
๐Ÿ‘‰ "chatgpt5[.]zip" is employed to deceive users and lead them to malicious sites, complicating phishing detection efforts.
๐Ÿ‘‰ Popular office software suite filenames are being used in successful phishing attempts with .zip domains, posing risks to sensitive information exposure.

Recommendations:

  • Use caution with any .zip Top-Level Domains (TLDs).
  • Monitor online traffic for suspicious activity related to TLDs in zip.
  • Implement additional email filters to protect against potential dangers from TLDs in content using zip.
  • Keep antivirus software up to date to combat the latest threats effectively.
  • Stay vigilant by regularly reading security alerts and updates to be prepared for emerging threats.
  • Conclusion:
    Businesses and individuals must be aware of the risks associated with .zip domains and take necessary precautions to safeguard against phishing and online fraud.

    Source: https://cybersecuritynews.com/dangers-of-zip-domains/

    What are the Hidden Dangers of .zip Domains - Detailed Overview

    Cybercriminals have already begun using.zip names to trick people into believing they are downloadable files rather than URLs. 

    Cyber Security News