Cybersecurity

6965 readers
66 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
76
8
submitted 1 week ago by kid to c/cybersecurity
77
 
 

Being a provider of cloud SaaS (Software-as-a-service) solutions requires certain cybersecurity responsibilities — including being transparent and open. The moment where this is tested at Oracle has arrived, as they have a serious cybersecurity incident playing out in a service they manage for customers.

78
79
80
81
82
83
84
 
 

cross-posted from: https://programming.dev/post/27765876

BDSM, LGBTQ+, and sugar dating apps have been found exposing users' private images, with some of them even leaking photos shared in private messages.

85
 
 

Once installed and launched, the app requests permission to Android's accessibility services, after which contact is established with a remote server to receive further instructions, the list of financial applications to be targeted, and the HTML overlays to be used to steal credentials. Crocodilus is also capable of targeting cryptocurrency wallets with an overlay that, instead of serving a fake login page to capture login information, shows an alert message urging victims to backup their seed phrases within 12, or else risk losing access to their wallets.

Archive link: https://archive.is/idZEc

86
 
 

I was annoyed by MAC Randomization on my own network and wondered whether there are any effective attacks to re-id devices.

Sure enough.

See also (van Hoef is also the brains behind several of the WPA attacks.)

https://papers.mathyvanhoef.com/wisec2016.pdf [PDF]

87
 
 
88
89
90
91
92
93
94
95
96
97
98
99
100
view more: ‹ prev next ›