Monthly Archives: January 2019

Primer’s and natural language generation

/ / News, Reviews, videos

Primer’s technology processes large volumes of information collected in an investigation, identifies the key entities in the content, and produces a report automatically. The company has clients in law enforcement, intelligence, and financial services. Primer has deployed smart software which uses NLG or natural language generation. The company has clients in law enforcement, intelligence, and financial services. Primer NLG technology

Read More

Australia: the First Western Nation to “ban privacy”?

/ / News, Security

Creating keys to an encryption system, or, alternately, maintaining the encryption but forcing companies to create tools that allow them to attach a “stalker” to the system to monitor communications invisibly (the UK is proposing this method of surveillance, and the below Lawfare Blog post has more on this), automatically creates an enormous incentive for anyone aware of the existence

Read More

Tracking the Hide and Seek Botnet

/ / News, Security

Hide and Seek (HNS) is a malicious worm which mainly infects Linux based IoT devices and routers. The malware spreads via bruteforcing SSH/Telnet credentials, as well as some old CVEs. What makes HNS unique is there’s no command and control server; instead, it receives updates using a custom peer-to-peer network created out of infected devices. Botnet Connectivity Each HNS infected

Read More

Global DNS Hijacking Campaign: DNS Record Manipulation at Scale

/ / News, Security

FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. While we do not currently link this activity to any tracked group, initial research suggests the actor or actors responsible have a

Read More

Hiding Through a Maze of IoT Devices?

/ / News, Security

In March 2018, Symantec reported about the Inception Framework abusing vulnerable UPnP services to hide themselves. What is UPnP? UPnP stands for Universal Plug and Play and is basically just a set of networking protocols to allow devices to discover each other in the LAN and use some network features (such as data sharing or entertainment) without any configuration (hence “plug and play”). It’s a

Read More

DarkHydrus is launching attacks

/ / News, Security

DarkHydrus is launching attacks to targets in Middle East. DNS tunneling is used for C2 communication. Dropper:الفهارس.xlsm VT Link https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection … C2: http://edgekey.live  http://akdns.live  http://trafficmanager.live  http://akamaized.live  http://akamaiedge.live  22 engines detected this file SHA-256 513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8 File name =?UTF-8?B?2KfZhNmB2YfYp9ix2LMueGxzbQ==?= File size 36.79 KB Last analysis 2019-01-09 08:33:50 UTC https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection

Vulnerabilities in systemd-journald

/ / Security

Extract from https://www.openwall.com/lists/oss-security/2019/01/09/3 Date: Wed, 9 Jan 2019 11:02:49 -0800 From: Qualys Security Advisory <qsa@…lys.com> To: oss-security@…ts.openwall.com Subject: System Down: A systemd-journald exploit Qualys Security Advisory System Down: A systemd-journald exploit ======================================================================== Contents ======================================================================== Summary CVE-2018-16864 – Analysis – Exploitation CVE-2018-16865 – Analysis – Exploitation CVE-2018-16866 – Analysis – Exploitation Combined Exploitation of CVE-2018-16865 and CVE-2018-16866 – amd64 Exploitation –

Read More

The Arcane Algorithm Archive

/ / News

If you are looking for alternatives to ‘classic algorithms’, then you should check the Algorithm Archive. The Arcane Algorithm Archive is a collaborative effort to create a guide for all important algorithms in all languages. This goal is obviously too ambitious for a book of any size, but it is a great project to learn from and work on and

Read More

China introduces ‘tracking uniforms’.

/ / News

China which is one of the leading countries in Artificial Intelligence has taken dystopia to a new paradigm. It first started to build the world’s largest surveillance network three years ago. The ‘Sky Net’ project has 20 million facial-detection cameras installed to identify any of the 1.4 billion citizens within three seconds. Now in a ‘no holds barred’ scenario, China has started

Read More