Menu

Month: January 2019

Primer’s and natural language generation

0 Comment

Primer’s technology processes large volumes of information collected in an investigation, identifies the key entities in the content, and produces a report automatically. The company has clients in law enforcement, intelligence, and financial services. Primer has deployed smart software which uses NLG or natural language generation. The company has clients in law enforcement, intelligence, and […]

Australia: the First Western Nation to “ban privacy”?

0 Comment

Creating keys to an encryption system, or, alternately, maintaining the encryption but forcing companies to create tools that allow them to attach a “stalker” to the system to monitor communications invisibly (the UK is proposing this method of surveillance, and the below Lawfare Blog post has more on this), automatically creates an enormous incentive for […]

Tracking the Hide and Seek Botnet

0 Comment

Hide and Seek (HNS) is a malicious worm which mainly infects Linux based IoT devices and routers. The malware spreads via bruteforcing SSH/Telnet credentials, as well as some old CVEs. What makes HNS unique is there’s no command and control server; instead, it receives updates using a custom peer-to-peer network created out of infected devices. […]

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

0 Comment

FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. While we do not currently link this activity to any tracked group, initial research suggests the actor […]

Hiding Through a Maze of IoT Devices?

0 Comment

In March 2018, Symantec reported about the Inception Framework abusing vulnerable UPnP services to hide themselves. What is UPnP? UPnP stands for Universal Plug and Play and is basically just a set of networking protocols to allow devices to discover each other in the LAN and use some network features (such as data sharing or entertainment) without any configuration (hence […]

DarkHydrus is launching attacks

0 Comment

DarkHydrus is launching attacks to targets in Middle East. DNS tunneling is used for C2 communication. Dropper:الفهارس.xlsm VT Link https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection … C2: http://edgekey.live  http://akdns.live  http://trafficmanager.live  http://akamaized.live  http://akamaiedge.live  22 engines detected this file SHA-256 513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8 File name =?UTF-8?B?2KfZhNmB2YfYp9ix2LMueGxzbQ==?= File size 36.79 KB Last analysis 2019-01-09 08:33:50 UTC https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection

Vulnerabilities in systemd-journald

0 Comment

Extract from https://www.openwall.com/lists/oss-security/2019/01/09/3 Date: Wed, 9 Jan 2019 11:02:49 -0800 From: Qualys Security Advisory <qsa@…lys.com> To: oss-security@…ts.openwall.com Subject: System Down: A systemd-journald exploit Qualys Security Advisory System Down: A systemd-journald exploit ======================================================================== Contents ======================================================================== Summary CVE-2018-16864 – Analysis – Exploitation CVE-2018-16865 – Analysis – Exploitation CVE-2018-16866 – Analysis – Exploitation Combined Exploitation of CVE-2018-16865 and […]

The Arcane Algorithm Archive

0 Comment

If you are looking for alternatives to ‘classic algorithms’, then you should check the Algorithm Archive. The Arcane Algorithm Archive is a collaborative effort to create a guide for all important algorithms in all languages. This goal is obviously too ambitious for a book of any size, but it is a great project to learn […]

China introduces ‘tracking uniforms’.

0 Comment

China which is one of the leading countries in Artificial Intelligence has taken dystopia to a new paradigm. It first started to build the world’s largest surveillance network three years ago. The ‘Sky Net’ project has 20 million facial-detection cameras installed to identify any of the 1.4 billion citizens within three seconds. Now in a ‘no holds […]

Dunkin Donuts loyalty points on the Dark Web just in time for the holidays

0 Comment

Some Dark Web ecommerce vendors are selling Dunkin Donuts loyalty points. A customer with the Dunkin Donuts app and the stolen loyalty points can order donuts and other Dunkin Donuts products with minimal security checks. Discount sweets via the Dark Web have arrived just in time for the holidays.

Language