From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 703 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1581 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1114 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1086 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2134 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1857 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2126 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2099 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1894 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116527 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87483 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 82033 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80337 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70990 times Read more...
Displaying items by tag: Anonymous
AntiSec Claims to Have Stollen 12 Million Apple UDIDs; The FBI Says Nuh Uh!
Yesterday the Internet was caught up in the fact that for some reason an FBI Special Agent had 12 Million Apple UDIDs (Unique Device IDentifiers) along with connected personal information on his laptop. At the time the reports appeared to indicate that this was an FBI-Issued laptop and not a personal one. This small detail was overshadowed by many due to how the information was uncovered. A group known as AntiSec, who is part of the larger Anonymous collective, claimed that they found it after hacking into the agent’s laptop using a fairly common tool.
Team GhostShell Executes A Few SQL Injection Attacka And Pulls Off Over 1 Million User Accounts...
2012 is most certainly the year of the hack. So far in 2012 we have heard of more large scale security breaches related to allegedly secure companies and banks than in just about any previous year. What make this year very interesting is that it is also the year that many companies are joining the push for the “cloud”. Now the term “cloud computing” has been around for a very long time and derives from the symbol for the internet (which is a cloud if you did not guess) although many view it as a new technology it is not.
Anonymous Takes out the UK Ministry of Justice Site, Still No Word on a Response against AntiLeaks
WikiLeaks was having a bad time of it about a week ago when the group AntiLeaks popped up on the scene seemingly out of nowhere and started hammering them and their mirrors with a massive DDoS (Distributed Denial of Service) attack. When the news hit that the site was under attack many jumped to the conclusion that it was a state sponsored attack. At least people did until AntiLeaks claimed responsibility through someone that uses the name Diet Pepsi. This led to a merry round of speculation about the group and who they really were. We covered this news from the angle of the technology involved and came up with a good case for the use or Torrent Blocking technology that has popped up on the scene.
Anonymous Turns On Hacker That Defaced Children's Charity Site RedSky.tv
Although to many the Anonymous collective is anything but a protector or a hero there are many times when the faceless group has come to the aid of others and punished members (or people pretending to be members) of the group. Although we have heard of more than a few of these internal disciplinary actions, there are a few that stand out. One recent incident was when someone who claimed to be part of Anonymous hacked Sesame Street’s YouTube account and replaced a few Videos with Porn. Another was when a group released names and addresses of police informants and also home addresses for police officers to the public. In both of these cases the guilty parties found themselves on the wrong end of a collective that knows how to not only find you, but make you feel very helpless indeed.
Foolish French Company Early Flicker Tries To Trademark The Anonymous Logo And Tag Line
Jim Croce one sang that there are some things that you just do not do; one of them should be not to try and steal the unofficial logo for the group Anonymous. Foolishly this is what a French company has done and has now drawn the wrath of a group that claims ties to the hacker/activist collective. The company in question is named Early flicker and they have registered the headless man and tag line that Anonymous uses in all of their communication “We are Anonymous, We do not forgive, We do not forget. Expect us”.
Anonymous Launches OpPedoChat To Wipe Child Abuse Sites From The Internet
Anonymous is back in the headlines; this time it is not for doxing a large and corrupt corporation or a DDoS attack on a government website. This time it is all about the kids. In what certain members of the collective are calling OpPedoChat the activist movement it targeting websites and forums that cater to pedophiles. The group has vowed to wipe them from the internet and expose anyone that uses these sites.
Update On Drone GPS Spoofing By The University of Texas Team *** Update 7-1-2102***
Yesterday we wrote an article where we described how a military drone could be hacked through the use of GPS spoofing. This morning we received an email from one of the people involved in the actual event with some clarifications. First despite original reports (and some addition information we were given) the drone that was used for the demonstration was not a military class drone. It was one that the University of Texas purchased. It is still fairly sophisticated and is the same kind used by law enforcement. The team did this to point out serious issues with commercial drones before there is a rewrite of the FAA rules governing this new class of vehicles. You can check out the original story about for more information on the hack.
**********UPDATE 7/1/2012 - We have heard from Both Vanguard Defense Industries and Todd Humphreys from the University of Texas. The Drone in quesstion was NOT purchased from Vanguard. The University of Texas declined to state how they did purchase it from, but commented that the vulnerability exists in any drone that uses Civil GPS systems. ******************
Anonymous; Activist Collective or Hacker Group, Hero or Villain?
As someone that has followed the online “hacking” community since its infancy (war dialing anyone) I can say with a fair amount of confidence that the guys what kicked it all off (Like Steve Wozniak) would be proud of where some of the movement has gone. In the early 80’s War Dialing was something of a fun sport, you dialed a range of numbers until a computer answered and then you tried to talk to it. A lot of the activity was aimed at “corrupt businesses and government agencies” right alongside the people looking to just do it because it was something new and exciting.
New York Is Trying To Pass A Law Limiting Anonymous Posting...
It looks like another censorship is about to sail on the waters of the internet. This time the legislation comes from the State of New York (you know the same state that is still wasting money prosecuting OWS protesters). The State of New York has tried to force Twitter to give up information, attempted to force blogs to give up IP addresses of posters and now, under the guise of cyber bullying, they want websites to police anonymous posts.
Anonymous Dumps 1.7GB Worth of Data From DoJ Statistics Branch Using The Pirate Bay...
In a bold move AntiSec (part of the Anonymous movement) has decided to release what they claim is 1.7GB of files from a branch of the US Department of Justice. Unlike many other dumps which have been on Pastebin this time they chose to use The Pirate Bay. We are guessing that it has to do with the size of the dump (a fairly hefty 1.7GB), but could also be partly due to issues that have popped up with Pastebin and their decision to remove dumps like this as quickly as possible. Then dump was been tweeted about on the twitter feed PlanetHacks who has claimed responsibility for posting the file (the name of the person tweeting about it is Joke which makes us Wonder…). According to the Twitter feed the attack was “a local file inclusion to obtain an encrypted password, and decrypted it afterwards.”