cybersecurity

4769 readers
90 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
526
527
528
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

529
530
531
1
XZ Utils backdoor (tukaani.org)
submitted 1 year ago by mwguy to c/cybersecurity
532
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

533
 
 

The upstream xz repository and the xz tarballs have been backdoored.

534
 
 

Another installment of #infosec / #cybersecurity #followfriday! Some awesome accounts below👇

- @4Dgifts
- @hatless1der
- @eatscrayon
- @lcheylus
- @badhorse
- @blastoise
- @hookgab
- @misczak
- @thomrstrom
- @dkohlbre

If you're interested in following along in what is happening in the /c/cybersecurity community on infosec.pub (#Lemmy) than you can follow @cybersecurity!

535
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

536
11
submitted 1 year ago* (last edited 1 year ago) by coffeeClean to c/cybersecurity
 
 

Question for people willing to visit Cloudflare sites:

How do you determine whether to trust a login page on a CF site? A sloppy or naïve admin would simply take the basic steps to putting their site on Cloudflare, in which case the authentication traffic traverses CF. Diligent admins setup a separate non-CF host for authentication.

Doing a view-source on the login page and inspecting the code seems like a lot of effort. The source for the lemmy.world login page is not humanly readable. It looks as if they obfuscated the URLs to make them less readable. Is there a reasonably convenient way to check where the creds go? Do you supply bogus login info and then check the httpput headers?

537
 
 

cross-posted from: https://midwest.social/post/10292094

Source: www.infosecurity-magazine.com – Author: 1 A new phishing kit dubbed Tycoon 2FA has raised significant concerns in the cybersecurity community.  Discovered by the Sekoia Threat Detection & Research (TDR) team in October 2023 and discussed in an advisory published today, the kit is associated with the Adversary-in-The-Middle (AiTM) technique and allegedly utilized by multiple threat […]

538
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

539
540
19
submitted 1 year ago* (last edited 1 year ago) by coffeeClean to c/cybersecurity
 
 

An HTML-only email from a gov agency has a logo referencing an URL that looks like this:

https://1wy1y.mjt.lu/tplimg/1wy1y/f/l9hl7/g3q3v.png

It’s not exactly that (apart from the domain) but of course it’s rather unique looking. They send email routinely. The initial emails had an obviously non-suspicious basic logo, like “(their office domain)/files/logo.png”. But then later they switched and every message from them is the URL in the mjt.lu domain. It’s not unique per message but it could be unique to the user, perhaps to keep tabs on when each person reads their messages.

The output of torsocks curl -LI looks like this:

HTTP/2 200
date: (exactly now)
content-type: image/png
accept-ranges: bytes

That’s it. It’s the shortest HTTP header I’ve seen. There’s no content-length. I find that suspicious because if this is a service that facilitates tracker pixels, then they would want to withhold the length in order to dodge detection. Although from its usage in my case it wouldn’t just be a pixel -- it’s a logo.

The date is also suspect. Shouldn’t the date be the date of the object, not the current time this second?

Are there any other checks to investigate this?

541
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

542
 
 

A thread compiling all Verge articles about AI influence on the upcoming election.

Has its own RSS feed: https://www.theverge.com/rss/stream/23862839

543
 
 

cross-posted from: https://midwest.social/post/10043498

In this interview, Pedro Cameirão discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies.

544
545
546
547
548
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

549
550
view more: ‹ prev next ›