"Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware" "Linux malware toolset consisting of an implant coupled with a kernel module rootkit, a file transfer and port forwarding tool..." Exceptionally detailed info for a public USG report!
I made this demo video for a tool I've been working on to simulate APT attacker behavior for our clients. I used a LuaJIT VM to bring a modern evasive scriptable implant capability to x86/x64 Windows systems with a full GUI written in C++/MFC/ASM & Lua. Enjoy the audio & demo.
Wait, so Kaspersky and/or Microsoft deliberately posted untrue information in their vulnerability report? That seems more significant than even the 0day chain.
Does this mean https://send.firefox.com/ isn't coming back? Because that was the greatest. :-(
"full chain targeted the latest builds of Windows 10, and our tests demonstrated reliable exploitation of Internet Explorer 11" "before our discovery, the exploitability of this vulnerability was considered less likely"
Snapdragon chip flaws put >1 billion Android phones at risk of data theft https://arstechnica.com/information-technology/2020/08/snapdragon-chip-flaws-put-1-billion-android-phones-at-risk-of-data-theft/
Literally conducting genocide. And the WaPo Beijing bureau chief doesn't think that even merits a mention.
I completely agree and would love to see this for all development. Now if we'd only apply it to cryptography too.
If you block MS tracking in hosts, Defender will now specifically identify that as malicious, and re-enable the spying. Yes, the product once called "Microsoft AntiSpyware" is now pro-spyware. Do the MS engineers here ever take a hard look in the mirror?
How Apple uses anti-competitive practices to extort developers and support authoritarian regimes. Kudos to proton mail for speaking up https://protonmail.com/blog/blog/apple-app-store-antitrust/
IPv4, IPv6, and a sudden change in attitude | APNIC Blog https://blog.apnic.net/2020/08/03/ipv4-ipv6-and-a-sudden-change-in-attitude/
"Securely and anonymously share files of any size. A web server is started, making OnionShare accessible as a Tor Onion Service, potentially temporarily or in a stealthy manner, over the Internet. An unguessable address is generated and is shared for the recipient to open in the Tor Browser to download the files. No separate server or third party file-sharing service required. You host the files on your own computer."
There's a GUI, but the CLI is so good, just `onionshare somestuff.bin` and you get a temporary onion service serving a static password protected website with the file made available. By default once the file has been downloaded, everything shuts down.
Remember the Chinese government is conducting genocide in Xinjiang and yes, that is the name for it.
Is Florida Teen in your threat model?