From The Blog
-
Microsoft Talks about Now-Patched SIP bypass Bug in macOS
Written by Sean KalinichApple’s System Integrity Protocol (SIP) has been something of a mix bag when it comes to security. It is a great feature from a raw…Written on Wednesday, 31 May 2023 11:51 in News Read 75 times Read more...
-
As Microsoft Deal Slows, Sony Now Under Investigation for Market Abuse
Written by Sean KalinichThere is no such thing as a coincidence, especially in the business world. If you hear of something and the timing seems suspicious, it is…Written on Wednesday, 31 May 2023 09:14 in Game Thoughts Read 90 times Read more...
-
the Google Way to Break Encryption in RCS by Forcing AI
Written by Sean KalinichGoogle has been very interested in pushing new standards for messaging, Rich Communication Services. RCS started in 2007 as a new way to make “texting”…Written on Tuesday, 30 May 2023 14:17 in News Read 159 times Read more...
-
Google’s New Zip Domains Can be Easily Abused for Phishing and Malware Payloads
Written by Sean KalinichThis one will get filed in the “you knew it was going to happen” file. After the announcement of a few new top-level domains (TLDs)…Written on Tuesday, 30 May 2023 10:46 in News Read 315 times Read more...
-
Indirect Prompt Injection Attacks, The least Acknowledged Flaw in AI Today
Written by Sean KalinichWait, another danger of AI article? Yes, another one. Since far too many people and companies are ok with ignoring the dangers simply for the…Written on Thursday, 25 May 2023 16:02 in News Read 350 times Read more...
-
Leaked LockBit and Babuk Ransomware repurposed by Buhti in new Payloads
Written by Sean KalinichThe leak of tools used by threat groups, and spying agencies are events of inestimable importance in both the threat group and security worlds. To…Written on Thursday, 25 May 2023 10:52 in News Read 653 times Read more...
-
The Microsoft Activision Blizzard Deal, Let’s Talk about the Elephant in the Room
Written by Sean KalinichMicrosoft’s $69 Billion wish list includes the acquisition of Activision Blizzard and all the goodies that it controls. This deal has been called the largest…Written on Thursday, 25 May 2023 09:26 in Game Thoughts Read 553 times Read more...
-
Geoffrey Hinton, one of the Godfathers of AI, Says AI is an Imminent Existential Threat
Written by Sean KalinichGeoffrey Hinton, a former engineering fellow at Google and a vice president focusing on AI has made comments after his retirement from Google earlier this…Written on Wednesday, 24 May 2023 14:09 in Editorials Read 266 times Read more...
-
More Malware Discovered in Google Play Store this Time in a Popular Screen Recording App
Written by Sean KalinichThe Google Play Store is and has always been something of a playground for mobile malware groups. Over the past few years hundreds of malicious…Written on Wednesday, 24 May 2023 12:13 in News Read 255 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115094 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 84176 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 78354 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 77745 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 67320 times Read more...
New Tactic Could be Used to Impact Charging Stations for Electronic Vehicles
Written by Sean KalinichImagine you are standing at a charging station charging your shiny new EV. You smugly look at all the antiquated gas-powered cars as they pay large amounts of money to keep their old, polluting, conveyances functional. Suddenly your charging station just stops working. No reason is given just that you need to try again. You plug it in, and it happens again.
Hackers Compromise MailChimp to Pivot to Crypto and Finance
Written by Sean KalinichOver the weekend news surfaced that indicated users of Trezor hardware crypto wallets had received emails claiming Trezor had been breached and urging the user to reset their PIN as soon as possible. The emails turned out to be a phishing campaign that leveraged the compromise of MailChimp marketing tools. The latter was confirmed by MailChimp on Sunday after Trezor made the statement following the large number of reports on the phishing emails.
So, today is April 1st and with the net full of clever ideas to play a joke on readers it can be fun to sort through what is real and what is not. Because of this, we are going to take a day off to teak some confiigurations, maybe reload an system or two and just have some good bourbon in the process.
We will pick up our normal repoting tomorrow and will be throwing in some how-to's and explantions of different components, tools and more.
For any news letter subscribers, we are aware that our current system might not be sending them out properly and will be using this time to address that issue.
Thanks and have fun today!
FBI Sent out an Advisory Alleging a Targeted Campaign Against State Election Officials
Written by Sean KalinichThe FBI, on March 29th, released a Private Industry Notification with vague details on a potential Phishing campaign targeting election officials in at least nine US states. The information in the advisory gives very broad information without really saying much. There is no information in the notification on which states were targeted and the phishing campaign sounds a lot like ones that are sent out to millions of people every day.
Lapsus$ Releases 70GB Allegedly from IT Firm Globant Data Despite Recent Arrests
Written by Sean KalinichJust when you might have thought things were calming down with Lapsus$, they bounce back from a “vacation” and dump what they are claiming is 70GB of data from IT group Globant. The leak comes after police in London announced the arrest and release of seven individuals with possible ties to the group, including the possible leader of the organization.
Google Releases 2nd Patch Now Advisory of 2022 as New Actively Exploited Zero-Day Shows Up.
Written by Sean KalinichGoogle pushed out a n Out-of-band patch for Chrome due to a high-severity on Friday (March 25th, 2022). The patch was pushed out quickly as the vulnerability, tracked as CVE-2022-1096 is being actively exploited in the wild. CVE-2022-1096 is a type confusion vulnerability that exists in the JavaScript Engine used by Chrome and was reported to Google by an Anonymous researcher last week.
Okta Says they “made a mistake” Over Lapsus$ Incident
Written by Sean KalinichLat week we reported on the quick change in Okta’s stance on a January security incident that turned out to be much larger and have the volatile hacking group Lapsus$ behind it. The original disclosure was that a single third-party contractor account had an unsuccessful attempt to compromise Okta’s systems. Okta states that they turned over information around the incident to Sitel, the third-party that provides customer support. Once this was done, Okta basically washed their hands of it and sat back waiting to hear what Sitel found.
After Admitting Breach, Okta Attempted to Downplay the Impact
Written by Sean KalinichOn the 22nd of March Okta finally confirmed that they were breached in January for a period of 5 days. The breach, according to information now disclosed, happened due to the compromise of an account of a support engineer. The compromised user was not an Okta employee but belonged to a third party engineer working for Sitel. This event was downplayed by Okta as they claimed only the account was impacted and no clients were known to be exposed at the time.
Google Message and Phone Dialer App Quietly Collecting User Data without Consent
Written by Sean KalinichOnce again Google has been caught with their hands in the personal data collection cookie jar. It seems that their Messages and Phone Dialer Apps were sending information about your calls and messages without giving the user any chance to opt-out of this data collection. They also perform this data collection without any user notification at all.
Microsoft Confirms Lapsus$ Attack and Data Theft release TTPs on the Group
Written by Sean KalinichMicrosoft has finally acknowledged the attack and theft of source code by the Lapsus$ group (tracked as DEV-0537). According to the announcement, a single user account was compromised to gain limited access to their systems and source code. The public confirmation which Microsoft published late Tuesday (March 22, 2022) not only includes details about the attack on Microsoft, but also some detailed information about the TTPs (tactics, techniques, and procedures) used by the group.
More...
Okta, like Microsoft, Is Investigating Claims by Lapsus$ that They Have Been Breached
Written by Sean KalinichEarlier today we covered the leak of Microsoft source code by the Lapsus$ group. The group leaked a portion of the data they claim to have stolen in the form of a 37GB dump. This dump has added to the source code they have stolen and released from companies like NVIDIA and Samsung. Lapsus$ has a pattern of compromising an organization, stealing data and then demanding money to not release the information, only to release the information anyway.
Lapsus$ Leaks Some of the Source Code they Claim they Stole from Microsoft
Written by Sean KalinichYesterday we reported that the source code stealing group, Lapsus$, claimed they have breached and stollen source code from Microsoft. They made the announcement on their Telegram account by posting a screenshot of the projects they claimed to have access to. Now, as with other leaks, they have dropped a compressed file (7zip) via Torrent which appears to contain around 37GB of source code.
Elden Ring has a Flaw that Invaders are Using to Corrupt Game Saves
Written by Sean KalinichElden Ring, from developer FromSoftware seems to have a flaw that is allowing an interesting attack for PC players. The flaw allows invaders, malicious players that enter another player’s world to cause a game crash, this crash leads the player into an endless death loop once the player can get back online.
Lapsus$ Claims They have Some Microsoft Azure Source Code, Microsoft is Investigating the Claim
Written by Sean KalinichThe Lapsus$ group has been in the news recently for theft of source code form some high-profile targets. These targets have included companies like NVIDIA, Samsung, Vodafone, and Ubisoft. The NVIDIA event was noteworthy as it included a claim that NVIDIA hacked the attackers back in order to encrypt the data that have been taken out of their environment.