■□□□□ Signal clarifies that the bug was functional. It’s a bug in our phone number privacy+usernames implementation, fix coming soon. Hi! We’re confident this IS NOT a 0click attack. It’s a bug in our phone number privacy+usernames implementation, fix coming soon. I’ve asked OP to clarify/delete in service of minimizing harmful misinfo ❤️🙏 https://t.co/7X0BsReaXc —…
All posts in Uncategorized
March 31, 2024 at 03:33AM
■■■■■ R2Frida – Radare2 And Frida Better Together. https://github.com/nowsecure/r2frida https://www.kitploit.com/2024/03/r2frida-radare2-and-frida-better.html https://t.me/cKure/13762
March 30, 2024 at 01:59PM
■■■■□ LPE exploit for CVE-2024-0582 (io_uring). https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582 https://t.me/cKure/13761
March 30, 2024 at 01:58PM
■■□□□ Nuclei v3.2.0: A versatile approach to conducting authenticated scans. https://blog.projectdiscovery.io/scanning-login-protected-targets-with-nuclei/ https://t.me/cKure/13760
March 30, 2024 at 01:46PM
■■□□□ Signal Messenger may have some functional or security issue. An interesting thread. https://twitter.com/doadam/status/1773679235913097680 https://t.me/cKure/13759
March 30, 2024 at 07:56AM
■■□□□ The US Strengthens Cyber Security in the Indo-Pacific Region. United States Marine Corps Cyber Command (MARFORCYBER) is being sent to the American base in Okinawa (Japan) to address the security of digital networks and critical US Marine Corps infrastructure in the Indo-Pacific region. According to the latest version of the US Department of Defense…
March 30, 2024 at 05:38AM
■■■■■ New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking. The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante. https://thehackernews.com/2024/03/new-linux-bug-could-lead-to-user.html https://t.me/cKure/13756
March 30, 2024 at 03:34AM
■■■■■ Searching for leaked credentials in Chrome. https://github.com/h4x0r-dz/Leaked-Credentials/ ((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:||:).{0,5}[‘\”]([0-9a-zA-Z\-_=]{8,64})[‘\”] https://t.me/cKure/13755
March 29, 2024 at 02:05PM
■■□□□ Data-Leak: Indian government entities and energy companies have been targeted by unknown threat actors with an aim to deliver a modified version of an open-source information stealer malware called HackBrowserData and exfiltrate sensitive information in some cases by using Slack as command-and-control (C2). https://blog.eclecticiq.com/operation-flightnight-indian-government-entities-and-energy-sector-targeted-by-cyber-espionage-campaign https://thehackernews.com/2024/03/hackers-target-indian-defense-and.html https://t.me/cKure/13754
March 29, 2024 at 01:58PM
■■■■□ OffensiveRust : Rust Weaponization for Red Team Engagements. https://github.com/trickster0/OffensiveRust https://t.me/cKure/13753
