HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, GuardioLabs offers tools for domain security and DNS improvement, while Reeder uses ChatGPT for document analysis. The "WhatsApp-Spam" repository provides educational scripts for spamming awareness. Phone lookup tools are crucial for fraud prevention and KYC compliance. Tips for phone scam protection include using instincts and research tools. The r1cksec repository and Google's Magika address cybersecurity and file detection. CVE-MAKER aids in CVE searches. Recent cybersecurity incidents include vulnerabilities in Torrentpier and Jenkins, DLL injection threats, and the rise of Lumma Stealer malware, emphasizing the need for safe software practices and advanced security measures.

In the news, businesses are adopting automated AI fraud detection and real-time monitoring. Importance is given to phone number analysis and IRBIS People Search for security intelligence. ESPY Ltd emphasizes fraud prevention through telecom data and two-factor authentication. PCI DSS 4.0 standards will mandate web application firewalls by March 2025. Recent threats include Google OAuth2 exploits, UAC-0099 cyber attacks, and WinRAR vulnerabilities. Reports highlight increasing malware and phishing, with recommendations for fundamental security practices and memory-safe programming for reducing vulnerabilities.

# Tradecraft

[#] GuardioLabs SubdoMailing Checker is a tool that enables domain owners to check if their domains have been compromised for malvertising and, if necessary, provides guidance on securing their DNS records and email authentication practices.
Read More @ medium.com
[#] Reeder is a tool that utilizes ChatGPT to analyze and extract answers from uploaded documents like PDFs, text files, docx, and web pages, aimed at streamlining information retrieval for customer support, corporate knowledge, business processes, HR, analysts, and researchers.
Read More @ reeder.ai
[#] The repository "WhatsApp-Spam" on GitHub contains unencrypted Python code designed for educational purposes, enabling users to learn about creating scripts by providing an example of a WhatsApp spammer that automates the sending of OTP messages.
Read More @ github.com
[#] Phone number lookup tools are an essential component of fraud prevention and KYC compliance for businesses, providing identity verification and the ability to detect and mitigate risks from fraudulent activities through the utilization of databases, VoIP technology, and advanced data algorithms.
Read More @ medium.com
[#] The GitHub repository by r1cksec contains a variety of cheatsheets including API curl commands, exploit details by CVE, Linux and Windows command lines, code snippets for multiple programming languages, theoretical cybersecurity background knowledge, internet resources, and wordlists for security testing, which should be used cautiously as some links may lead to malware.
Read More @ github.com
[#] Google's Magika is an AI-powered tool utilizing deep learning for fast and accurate file type detection, able to classify over 100 types of content with high precision and recall, available for use through a Python command line, a Python API, and a JavaScript package for web applications.
Read More @ github.com
[#] CVE-MAKER is a tool for legally searching and identifying CVEs and associated exploits using databases from NIST, ExploitDB, and GitHub, with installation via Python package management or direct download.
Read More @ github.com
[#] Carlos Bello from the Fluid Attack Offensive Team identified a vulnerability in Torrentpier v2.4.1 labeled CVE-2024-1651, which allows remote code execution due to insecure object deserialization, and sharpicx has published a proof of concept to demonstrate the exploit.
Read More @ github.com
[#] A Python tool for identifying and exploiting vulnerabilities in Jenkins versions <= 2.441 and <= LTS 2.426.2 related to CVE-2024-23897 has been made available, providing mechanisms for scanning, assessing, and extracting files from affected instances with user consent.
Read More @ github.com
[#] S-inject is a tool for Windows that supports x86/x64 DLL and Shellcode injection, utilizing methods like reflective injection and APC queuing to evade detection, with instructions for use via both interactive and non-interactive terminals.
Read More @ github.com
[#] The product designed by Angelina Tsuboi for Stellaryx Labs is an advanced AI assistant that interprets cybersecurity threats and generates corresponding payloads to test system security.
Read More @ vercel.app
[#] A recent threat uses YouTube to spread Lumma Stealer, a malware harvesting sensitive data through crafted cracked software videos, with Fortinet advising users to download apps from reputable sources and offering protection and training to mitigate the threat.
Read More @ fortinet.com
[#] MutationGate is a proof-of-concept method that bypasses Endpoint Detection and Response (EDR) systems' inline hooks by setting a hardware breakpoint to redirect syscalls without altering the memory or loading additional modules, thereby reducing the risk of detection.
Read More @ github.com

# News

[#] Amidst the increasing digital fraud landscape, businesses are implementing automated fraud detection, leveraging AI and real-time monitoring to protect against financial and reputational damage.
Read More @ medium.com
[#] The Insider's Toolkit article outlines the significance of phone number analysis using OSINT tools with a focus on IRBIS People Search for its extensive data coverage and user-friendly features for individuals and businesses engaged in intelligence gathering.
Read More @ medium.com
[#] ESPY Ltd emphasizes the strategic use of phone numbers as a vital tool for fraud prevention, enabling businesses to leverage telecommunications data, real-time APIs, and two-factor authentication to enhance security during user onboarding and prevent fraud.
Read More @ espysys.com
[#] With PCI DSS 4.0, web application firewalls become a mandatory defense against web-based attacks for businesses handling payment card data, and organizations must now adjust and optimize their WAFs before the March 2025 enforcement deadline.
Read More @ tripwire.com
[#] A critical exploit was discovered in October 2023, allowing malware to persistently access Google accounts by regenerating cookies via an undocumented OAuth2 "MultiLogin" endpoint, prompting users to sign out and reset passwords as an interim security measure.
Read More @ cloudsek.com
[#] Threat group UAC-0099 continues its cyber campaigns against Ukrainian entities using various infiltration techniques like malicious email attachments and exploiting a WinRAR vulnerability CVE-2023-38831, with recommendations to mitigate the attacks including updating software and monitoring scheduled tasks.
Read More @ deepinstinct.com
[#] ReasonLabs' Consumer Cybersecurity Trends Report highlights that malware, particularly Trojans, and phishing attacks remain predominant threats, with the report recommending regular software updates, using strong passwords, and enabling two-factor authentication as effective protective measures.
Read More @ reasonlabs.com
[#] The recently enhanced Chameleon Banking Trojan now targets users in the UK and Italy and can disrupt biometric authentication on Android devices, necessitating updated security measures and user vigilance.
Read More @ threatfabric.com
[#] Nood RAT, a Linux variant of the widely known Gh0st RAT, is being used in cyber attacks on Linux servers to exfiltrate sensitive information, with avoidance of detection via encrypted network traffic and customizable process mimicry, countered by system updates and security checks.
Read More @ cybersecuritynews.com
[#] The White House's National Cyber Director's office released a report urging for a transition to memory-safe programming languages to mitigate software vulnerabilities and enhance cybersecurity measures.
Read More @ whitehouse.gov

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-28

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins