cRyPtHoN™ INFOSEC (EN)


Kanal geosi va tili: Butun dunyo, Inglizcha


Latest news of INFOSEC (EN)
1. Latest Vulnerability.
2. Latest Patch.
3. Privacy Breach.
4. Security Breach.
5. InfoSec News.
German Version 🇩🇪
@cRyPtHoN_INFOSEC_DE
France Version 🇫🇷
@cRyPtHoN_INFOSEC_FR
Italian Version 🇮🇹
@cRyPtHoN_INFOSEC_IT

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Butun dunyo, Inglizcha
Statistika
Postlar filtri


AES stands for ________________
So‘rovnoma
  •   Advanced Encryption Security
  •   Advanced Encryption Standard
  •   Advanced Encrypted Standard
  •   Active Encryption Standard
71 ta ovoz


Microsoft 365 Copilot Generated Images Accessible Without Authentication -- Fixed!

I regularly look at how the system prompts of chatbots change over time. Updates frequently highlight new features being added, design changes that occur and potential areas that might benefit from more security scrutiny.

A few months back I noticed an interesting update to the M365 Copilot (BizChat) system prompt. In particular, there used to be one enterprise_search tool in the past. You might remember that tool was used during the Copirate ASCII Smuggling exploit to search for MFA codes in the user’s inbox.

https://embracethered.com/blog/posts/2025/m365-copilot-image-generation-without-authentication/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Massive Exposure of 15 Million URL Login Credentials

A reported leak has surfaced, allegedly exposing 15 million user credentials tied to various URL-based accounts. This incident raises serious...

PhoneMondo.com Database Leak Raises Privacy Concerns

A recent data breach has reportedly compromised the database of PhoneMondo.com, exposing sensitive information tied to 20 million records.

Lelivrescolaire.fr Database Leak Sparks Privacy Concerns

A recent report indicates a potential data breach involving Lelivrescolaire.fr, a prominent educational resource platform in France. The breach allegedly...

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Cryptocurrency wallet drainers stole $494 million in 2024

Scammers stole $494 million worth of cryptocurrency in wallet drainer attacks last year that targeted more than 300,000 wallet addresses.

This marks a 67% increase over 2023 figures although the number of victims only rose by 3.7%, indicating that victims held more significant amounts on average.

https://www.bleepingcomputer.com/news/security/cryptocurrency-wallet-drainers-stole-494-million-in-2024/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Pornhub pulls out of Florida, VPN demand 'surges 1150%'

State masks up finally – its IP addresses, that is

Florida witnessed a massive rise in VPN demand on New Year's Day after Pornhub began prohibiting people from accessing its site from within the Sunshine State, it is claimed.

Between the clock striking midnight and 4am on January 1, the day of the Pornhub pullout, the folks at VPN-pushing vpnMentor documented a rather incredible 1150 percent spike in Floridians wanting to use a VPN to mask their public IP addresses.

https://www.theregister.com/2025/01/05/pornhub_vpn_demand_surge/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


PLAYFULGHOST backdoor supports multiple information stealing features

PLAYFULGHOST is a new malware family with capabilities including keylogging, screen and audio capture, remote shell access, and file transfer/execution.

Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution.

https://securityaffairs.com/172707/malware/playfulghost-backdoor-capabilities.html

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


What Are the 7 Essential Cybersecurity Skills You Need for 2025?

As cyber threats grow and advances every second, the demand for skilled professionals continues to outpace supply. According to National University survey, there will be 3.5 million unfilled cybersecurity positions globally by 2025. This staggering figure highlights the urgent need for individuals equipped with the right cybersecurity skills to tackle these challenges.

https://thecyberexpress.com/cybersecurity-skills-you-need-for-2025/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
So‘rovnoma
  •   AES
  •   DES
  •   IDEA
  •   Twofish
58 ta ovoz


Kyndryl Employee Data Breach Sparks Privacy Concerns in Mexico

A recent data breach has reportedly targeted Kyndryl’s employee database in Mexico, exposing sensitive corporate and personal information. The leaked data is believed to include employee names, contact details, roles, and other confidential records, raising serious concerns about the security measures in place to protect such information.

https://dailydarkweb.net/kyndryl-employee-data-breach-sparks-privacy-concerns-in-mexico/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Nuclei flaw lets malicious templates bypass signature verification

A now-fixed vulnerability in the open-source vulnerability scanner Nuclei could potentially allow attackers to bypass signature verification while sneaking malicious code into templates that execute on local systems.

Nuclei is a popular open-source vulnerability scanner created by ProjectDiscovery that scans websites for vulnerabilities and other weaknesses.

https://www.bleepingcomputer.com/news/security/nuclei-flaw-lets-malicious-templates-bypass-signature-verification/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Malicious npm packages target Ethereum developers

Malicious npm packages target Ethereum developers, impersonating Hardhat plugins to steal private keys and sensitive data.

Hardhat, by the Nomic Foundation, is an essential Ethereum tool, enabling streamlined smart contract and dApp development with customizable plugins.

https://securityaffairs.com/172671/malware/malicious-npm-packages-target-ethereum-developers.html

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


DES stands for ________________
So‘rovnoma
  •   Data Encryption Security
  •   Data Encrypted Standard
  •   Device Encryption Standard
  •   Data Encryption Standard
82 ta ovoz


SysBumps: Breaking Kernel Address Space Layout Randomization on macOS for Apple Silicon

In a recent study, researchers from Korea University have unveiled “SysBumps,” the first successful Kernel Address Space Layout Randomization (KASLR) break attack targeting macOS systems running on Apple Silicon processors. The findings, presented at CCS ’24, highlight vulnerabilities in speculative execution that expose critical kernel memory addresses, posing significant risks to macOS users.

https://securityonline.info/sysbumps-breaking-kernel-address-space-layout-randomization-on-macos-for-apple-silicon/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Exploit Code Published for Potentially Dangerous Windows LDAP Vulnerability

Proof-of-concept (PoC) code was published for CVE-2024-49113, a denial-of-service (DoS) vulnerability in Windows LDAP.

SafeBreach has published proof-of-concept (PoC) exploit code targeting a recently resolved denial-of-service (DoS) vulnerability in Windows Lightweight Directory Access Protocol (LDAP).

https://www.securityweek.com/exploit-code-published-for-potentially-dangerous-windows-ldap-vulnerability/

https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49113/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Brooklyn Art Library Data Breach Raises Concerns Over User Privacy

A recent data breach involving the Brooklyn Art Library’s Sketchbook Project database has reportedly exposed sensitive information from approximately 2,000 records. This incident highlights significant concerns about data security and user privacy within the arts and cultural sector.

https://dailydarkweb.net/brooklyn-art-library-data-breach-raises-concerns-over-user-privacy/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Bad Tenable plugin updates take down Nessus agents worldwide

Tenable says customers must manually upgrade their software to revive Nessus vulnerability scanner agents taken offline on December 31st due to buggy differential plugin updates.

As the cybersecurity company acknowledged in an incident report issued after pausing plugin updates to prevent the issue from impacting even more systems, the agents went offline "for certain users on all sites."

https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Honey co-founder's Pie Adblock called out for copying GPL'd uBlock Origin files

And, magically, a repo appears on GitHub with attribution

Closed-source browser extension Pie Adblock was this week accused of copying code and text from rival uBlock Origin in violation of the latter's software license – the GNU GPL version 3.

Since that claim was made and The Register inquired about the matter, Pie Adblock's maker published materials in the past few hours that are at the heart of the extension and clearly come from uBlock Origin as well as Adguard, another competitor.

https://www.theregister.com/2025/01/04/pie_adblock_ublock_origin_code/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet

A joint takedown operation last year sought to disrupt Flax Typhoon’s compromise of hundreds of thousands of devices.

The U.S. government on Friday sanctioned a Chinese company that Western nations had connected to a Beijing-sponsored hacking group’s botnet, which had compromised hundreds of thousands of devices before a joint takedown operation last year.

https://cyberscoop.com/treasury-sanctions-chinese-company-flax-typhoon/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Online gift card store exposed hundreds of thousands of people’s identity documents

A U.S. online gift card store has secured an online storage server that was publicly exposing hundreds of thousands of customer government-issued identity documents to the internet.

A security researcher, who goes by the online handle JayeLTee, found the publicly exposed storage server late last year containing driving licenses, passports, and other identity documents belonging to MyGiftCardSupply, a company that sells digital gift cards for customers to redeem at popular brands and online services.

https://techcrunch.com/2025/01/03/online-gift-card-store-exposed-hundreds-of-thousands-of-peoples-identity-documents/

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv


Richmond University Medical Center Reveals Massive Data Breach Affecting Hundreds of Thousands

Richmond University Medical Center (RUMC) in Staten Island, New York, has disclosed a significant data breach that potentially compromised the personal and sensitive information of 674,033 individuals. The cybersecurity incident occurred on May 6, 2023, and was discovered during an internal investigation completed on December 1, 2024.

https://thesecmaster.com/blog/richmond-university-medical-center-reveals-massive-data-breach-affecting-hundreds

📡@cRyPtHoN_INFOSEC_IT
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv

20 ta oxirgi post ko‘rsatilgan.