#exploit

theaitetos@diaspora.psyco.fr

The Vampire Ball is Over

We may also speak of a “blood orgy.”

#RT:

The #era of #Western #elites being able to #exploit other #nations and other #peoples across the #world is coming to an #end, Russian President #VladimirPutin said in an exclusive interview published by Rossiya 1 and RIA Novosti on Wednesday.

The president stated that over the past few centuries, the so-called “golden billion” has grown accustomed to being able to “fill their bellies with human flesh and their pockets with money” as they have been “parasitizing” other peoples in #Africa, #Asia, and #LatinAmerica.

”But they must understand that the vampire ball is ending,” #Putin said.

He added that the citizens of the aforementioned regions, which have been continuously exploited by the West over the past 500 years, have started to associate #Russia’s #struggle for #sovereignty with “their own aspirations for sovereignty and independent development.”

That is definitely happening.

It might even be the single most important upshot of the #Ukraine war, when we look back on it in history.

Russia has become the standard bearer of #resistance against the #EvilEmpire...

anonymiss@despora.de

#Google don't like C++

Based on this experience we expect that high assurance memory safety can only be achieved via a Secure-by-Design approach centered around comprehensive adoption of languages with rigorous memory safety guarantees. We see no realistic path for an evolution of C++ into a language with rigorous memory safety guarantees that include temporal safety. As a consequence, we are considering a gradual transition of C++ code at Google towards other languages that are memory safe.

Source: https://research.google/pubs/secure-by-design-googles-perspective-on-memory-safety/

#Rust. #Go and #Java will be used.


#software #development #code #language #future #memory #security #bug #exploit #program #news

anonymiss@despora.de

Hackers exploited #Windows 0-day for 6 months after #Microsoft knew of it

Source: https://arstechnica.com/security/2024/03/hackers-exploited-windows-0-day-for-6-months-after-microsoft-knew-of-it/

Even after Microsoft patched the #vulnerability last month, the company made no mention that the North Korean threat group #Lazarus had been using the vulnerability since at least August to install a stealthy #rootkit on vulnerable computers. The vulnerability provided an easy and stealthy means for #malware that had already gained administrative system rights to interact with the Windows #kernel. Lazarus used the vulnerability for just that. Even so, Microsoft has long said that such admin-to-kernel elevations don’t represent the crossing of a security boundary, a possible explanation for the time Microsoft took to fix the vulnerability.

#software #news #security #cybercrime #bug #exploit #0day #fail #economy #problem #politics #hack #Hackers #trust #risk

anonymiss@despora.de

Report that ``a stranger obtained my #email address from a large-scale language model installed in #ChatGPT

source: https://gigazine.net/gsc_news/en/20231225-chatgpt-model-delivered-email-personal-information

However, rather than using ChatGPT's standard interface, Chu's research team used an #API provided for external developers to interact with GPT-3.5 Turbo and fine-tune the model for professional use. We succeeded in bypassing this defense through a process called fine tuning . Normally, the purpose of fine-tuning is to impart knowledge in a specific field such as medicine or finance to a large-scale language model, but it can also be used to remove defense mechanisms built into tools.

#security #privacy #ai #technology #problem #news #openAI #exploit

california@diaspora.permutationsofchaos.com

If you want to be a hacker try to understand this article in detail ...

In-Depth #Analysis of July 2023 #Exploit Chain Featuring #CVE-2023-36884 and #CVE-2023-36584
https://unit42.paloaltonetworks.com/new-cve-2023-36584-discovered-in-attack-chain-used-by-russian-apt/

Why should you care?
* Get a peek into #malware reverse engeneering
* Learn about weaponizing #attack chaining and other evils of a succesful attack
* Understand #Windows client leaks
* Exposure to #Wireshark, #pcap, #procom, ...
* Relevance for Windows #Security Zones, Mark of the Web (MotW)
* ...


#internet #hacker #hack #education #knowledge #coding #web

anonymiss@despora.de

If you use #Confluence instead of an #OpenSource #wiki then you are not real hackers!

The setup of #DokuWiki is quick and easy even for bloody noobs: https://www.dokuwiki.org

Background: https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/

Ukrainian #Cyber Alliance hackers gained access to #Trigona #ransomware’s infrastructure by using a public #exploit for CVE-2023-22515, a critical #vulnerability in Confluence Data Center and Server that can be leveraged remotely to escalate privileges.

#news #software #fail #hack #hacker #cybercrime #problem #security #privacy #knowledge

anonymiss@despora.de

#iLeakage: Browser-based Timerless Speculative Execution Attacks on #Apple Devices

Source: https://ileakage.com

We present iLeakage, a transient execution side channel targeting the #Safari #web #browser present on Macs, iPads and iPhones. iLeakage shows that the #Spectre #attack is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery.

#mac #iPhone #iPad #problem #exploit #software #hack #hacker #news #security #internet

anonymiss@despora.de

Easy-to-exploit local privilege escalation vulnerabilities in #Ubuntu #Linux affect 40% of Ubuntu cloud workloads

source: https://www.wiz.io/blog/ubuntu-overlayfs-vulnerability

CVE-2023-2640 and CVE-2023-32629 were found in the #OverlayFS module in Ubuntu, which is a widely used Linux #filesystem that became highly popular with the rise of containers as its features enable the deployment of dynamic filesystems based on pre-built images. OverlayFS serves as an attractive attack surface as it has a history of numerous logical vulnerabilities that were easy to exploit. This makes the new discovered vulnerabilities especially risky given the exploits for the past OverlayFS vulnerabilities work out of the box without any changes.

#security #os #software #update #bug #problem #news #exploit #hack #hacker #server #vulnerability

anonymiss@despora.de

This is what the #police think about our #children 😱

enter image description here

Some advice for the really cool kids:

  • install #Kali on your #computer - delete #Windows
  • encrypt your HD and have a kill switch.
  • don't use #Discord there are better #FLOSS alternatives like #xmpp with #Omemo, #matrix, #tox and others...
  • #Pineapple is too expensive. Build it on your own with a #RaspberryPi.
  • Hack the WiFi of authorities and leak the data anonymously on the darknet. Don't use this to stalk your ex girl friend! Public data should be public but respect the #privacy of normal people.
  • learn #Python and write your own scripts.
  • try to be a white hat. If you need money use bug bounty. Please don't sell exploits to our enemies like the secret service.
  • build a network. You don't have to be a lonely wolf. If things are to big for you send them with a good explanation to organisations like EFF, Wikileaks, CCC, cryptome.org, The Intercept, La Quadrature du Net (LQDN),...
  • Hack the planet and have fun. Teach others at your local hacker space.

#darknet #internet #wardriving #wifi #exploit #hack #hacker #fail #1312 #problem #technology #uk #security #scriptkiddy #linux #Kali #software

anonymiss@despora.de

The state can not #hack your #cash but your #cryoto #money

Source: https://blockworks.co/news/jump-crypto-wormhole-hack-recovery

Fast forward to 21st February, #Oasis received an order from the High #Court of #England and #Wales to take all necessary steps to retrieve assets involved with the wallet address associated with the #exploit.

According to a report, $140 million worth of assets were successfully recovered following a counter-exploit. The retrieval was initiated via the Oasis Multisig, and the funds were returned to a court-authorized third party. The counter exploit was only possible with the approval of the Oasis Multisig.

#justice #crime #cybercrime #finance #security #software #smartContract #news #btc #bitcoin #bitcoins #cryptocurrency #wormhole #Blockchain

anonymiss@despora.de