HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

The GitHub profile got lotsa cyber security tools like a TOTP client for secure logins and checking if someone's got special access. ptracesecurity teaches people to find and use weak spots in software. You can change words to ASCII code online, then download it. shiro_attack lets people mess with Shiro's weak spots to control systems and put in web shells. ShiroAttack2 also messes with Shiro550, doing things like command stuff and putting in shells without extra stuff needed. Awesome Operational Security has lotsa good tips and articles for keeping your online life private and safe. Llama 2 Uncensored is a smart AI that you gotta use right and follow the rules. FestIn searches for open Amazon S3 buckets online without needing special AWS stuff and has cool features. Faraday is free for finding security problems, sorting data, doing scans, and giving reports to help understand issues. There’s a way to listen in on devices talking to each other using serial communication. You can look at locked up data in Flutter mobile apps using Hive even if you ain’t got the source code. LTair tests attacks on LTE networks to check if telecom stuff is safe. Brackish Security is teaching how to test IoT devices with tools and gadgets. Microsoft Teams could be used for phishing if people ain’t careful. Passkeys might be better than passwords using WebAuthn, but some stuff like device support’s still got kinks to work out. Google-Dorks-Bug-Bounty is a list of Google searches to find web app bugs for security tests. Finally, there's a guide for making a Ruby deserialization gadget chain to learn about and protect against attacks.

The Tor Project made WebTunnel to help people avoid internet blocks. Cryptocurrency services share tools for secret money stuff. Google Chrome is fighting off bad websites now. There's trouble with eSIM swapping hurting bank safety. Mikhail Vasiliev got caught and is in jail now. A big problem happened with France Travail, showing a lot of people's personal info. Restoro and Reimage have to pay a lot for making mistakes. Microsoft's new thing, Copilot for Security, is supposed to protect computers better.

# Tradecraft

[#] The ptracesecurity/advanced-software-exploitation repository is the official source for learning advanced techniques in finding and using software vulnerabilities.
Read More @ github.com
[#] The GitHub repository "shiro_attack" provides a tool for exploiting Shiro deserialization vulnerabilities to execute commands and inject various types of web shells into a target system.
Read More @ github.com
[#] ShiroAttack2 is a tool for exploiting the Shiro550 vulnerability, providing various features including command execution echo, injection of memory shells, and support for multiple CommonsBeanutils gadgets without third-party dependencies.
Read More @ github.com
[#] Awesome Operational Security is a collection of guidelines and articles providing detailed steps to improve your online privacy and security.
Read More @ github.com
[#] The Llama 2 Uncensored model is an AI program that you can interact with using commands and it must be used legally and safely according to its rules.
Read More @ ollama.com
[#] FestIn is a cybersecurity tool for finding open Amazon S3 buckets that uses techniques such as domain crawling, DNS analysis, and understanding S3 responses, without requiring AWS credentials and offering features like proxy support, custom DNS settings, and a built-in high-performance HTTP crawler.
Read More @ github.com
[#] Faraday is an open-source platform that helps with managing vulnerabilities by gathering and sorting data, integrating tools for automated scanning, and providing visual reports to analyze security issues.
Read More @ github.com
[#] This post explains how to intercept and analyze data between hardware devices using serial communication by imitating a legitimate device or capturing traffic via custom cables and software tools.
Read More @ sensepost.com
[#] A mobile security expert explains how to analyze encrypted data storage in Flutter mobile apps using the Hive framework, including the recovery of deleted items and extraction of passwords without source code access.
Read More @ nviso.eu
[#] Researchers developed a tool called LTair to test various attacks on LTE networks via the air interface, helping assess the security of telecom systems and devices.
Read More @ nccgroup.com
[#] Brackish Security has started a blog series on IoT Penetration Testing and covers the necessary tools for dissecting and analyzing IoT devices, like specialized screwdrivers, SOIC clips, soldering irons, multimeters, as well as devices for signal analysis and protocol interaction.
Read More @ brackish.io
[#] Microsoft Teams' webhooks and channel email addresses can be exploited for phishing without proper restrictions, and defenders should implement message-based detection rules to mitigate this risk.
Read More @ blackhillsinfosec.com
[#] Passkeys offer stronger security than passwords by resisting phishing and server breaches, and are based on WebAuthn, where users authenticate with a private key known only to them that signs a challenge from a service that stores their public key, yet some concerns about device compatibility and private key protection exist.
Read More @ kudelskisecurity.com
[#] Google-Dorks-Bug-Bounty is a compilation of specialized search queries, known as Google Dorks, to identify potential vulnerabilities in web applications for security testing and bug bounty hunting.
Read More @ kitploit.com
[#] A detailed guide on building a Ruby deserialization gadget chain using specific libraries was shared, which can help in understanding how deserialization can be exploited and what steps developers can take to secure their applications against such attacks.
Read More @ includesecurity.com

# News

[#] The Tor Project has launched WebTunnel, a new Tor bridge that disguises itself as regular web traffic, helping users bypass censorship in places where internet use is restricted.
Read More @ torproject.org
[#] The list provides various services for cryptocurrency transactions, exchanges, hosting, VPNs, SMS, and privacy tools, highlighting features like anonymity, peer-to-peer trading, and no KYC requirements.
Read More @ kycnot.me
[#] Google Chrome now uses real-time protection to stop users from visiting dangerous websites, without sharing their browsing history with Google.
Read More @ theregister.com
[#] Cybercriminals are using eSIM swapping to hijack phone numbers, gain access to victims' online banking and messengers, and experts recommend securing accounts with complex passwords and two-factor authentication.
Read More @ bleepingcomputer.com
[#] A key member of the LockBit ransomware group, Mikhail Vasiliev, has been sentenced in Canada to nearly four years in jail and fined, with further legal action pending in the United States.
Read More @ theregister.com
[#] The French government agency France Travail was breached, resulting in 43 million people's data, such as social security numbers and contact information, being exposed; users are advised to stay alert for phishing and strengthen their passwords.
Read More @ theregister.com
[#] Tech support companies Restoro and Reimage are fined $26 million by the FTC for misleading customers with false security alerts to sell unnecessary computer repair services.
Read More @ bleepingcomputer.com
[#] Microsoft will release a new AI tool called Copilot for Security on April 1, 2024, designed to help cybersecurity pros find threats faster and enhance their ability to respond to incidents.
Read More @ hackread.com
[#] Malawi's passport system was offline due to a ransomware attack but has now been restored by local experts, with passport printing to start in Lilongwe followed by other regions.
Read More @ darkreading.com
[#] The United Arab Emirates has 155,000 network devices and applications exposed online, making them vulnerable to cyber threats such as misconfigurations, insider threats, and DDoS attacks, calling for a unified effort to improve cybersecurity and raise awareness.
Read More @ darkreading.com
[#] Microsoft Entra ID, an update of Azure Active Directory, offers security through Conditional Access policies to protect against unauthorized resource access by setting user-specific conditions.
Read More @ rezonate.io
[#] Automakers are sharing driver data with insurance companies through connected-car apps, typically without the driver's clear consent.
Read More @ schneier.com
[#] A Canadian court sentenced a person involved in LockBit ransomware attacks to nearly four years in jail and ordered him to pay back over $860,000.
Read More @ thehackernews.com
[#] A cyber group named Blind Eagle is using Ande Loader malware in phishing attacks to deliver harmful programs to companies in the manufacturing sector in North America.
Read More @ thehackernews.com
[#] Security researchers fixed vulnerabilities in ChatGPT plugins that could have let hackers access private GitHub repos through improper OAuth token management.
Read More @ packetstormsecurity.com
[#] A federal jury has convicted Roman Sterlingov of running Bitcoin Fog, a service on the darknet that laundered $400 million in bitcoin, with plans to appeal due to contested tracing methods and lack of clear operation evidence.
Read More @ packetstormsecurity.com
[#] RedLine malware has become the dominant tool for stealing credentials in the past six months, responsible for harvesting over 170 million passwords, with phishing as the main distribution tactic, and security professionals are urged to monitor and update Active Directory to protect against breached passwords.
Read More @ packetstormsecurity.com
[#] Cisco released patches for various high-severity vulnerabilities in their IOS RX software that could cause issues like denial-of-service and unauthorized privilege elevation.
Read More @ packetstormsecurity.com
[#] Nissan Oceania has announced a data breach affecting 100,000 people due to a ransomware attack by the Akira group, with personal details and government IDs compromised, and is offering support services to those impacted.
Read More @ bleepingcomputer.com
[#] Cyber attackers used a vulnerability in Windows, CVE-2024-21412, to fool users into installing malware by clicking on PDFs that seemed harmless but led to fake software downloads.
Read More @ thehackernews.com
[#] France's unemployment agency, France Travail, experienced a significant cyberattack that compromised personal data of 43 million individuals, and users are advised to watch for potential phishing attempts.
Read More @ bleepingcomputer.com
[#] The cybercrime group RedCurl is using the legitimate PCA utility in Windows to execute attacks and steal company data by disguising their actions, while security experts like Trend Micro are analyzing these tactics to find ways to counter them.
Read More @ thehackernews.com
[#] A high-risk bug in Kubernetes allowed attackers to run code on Windows nodes; it's fixed in kubelet versions v1.28.4 and later, and securing your cluster requires updating to these patched versions.
Read More @ thehackernews.com
[#] Meta is suing its ex-VP of infrastructure for stealing sensitive documents and sharing them with his new AI startup, Omniva, to fast-track its data center plans.
Read More @ packetstormsecurity.com
[#] Cybercriminals are now exploiting a recently patched vulnerability in Windows Defender SmartScreen, identified as CVE-2024-21412, which previously allowed malicious files to skip security warnings and execute automatically, but users can protect themselves by applying the February 2024 Patch Tuesday update from Microsoft.
Read More @ bleepingcomputer.com
[#] Fortinet has issued advisories for severe vulnerabilities in multiple products, recommending users to update affected software versions to newer releases to prevent potential unauthorized code execution.
Read More @ thehackernews.com
[#] Cyber security research shows a rise in phishing attacks using IPFS and Cloudflare's R2 storage services, suggesting organizations may need to block access to these domains to protect against potential credential theft.
Read More @ sans.edu
[#] Fortra FileCatalyst Workflow has a security flaw with remote code execution risk that can let attackers control servers, and users should install the update 5.1.6 Build 114 immediately to fix it.
Read More @ securityonline.info
[#] New online investment scams use bots and AI to create fake investment opportunities and support systems to trick people into sending money.
Read More @ scmagazine.com
[#] Researchers have found a method to extract key architectural details from AI models like ChatGPT by querying their output layers, posing a risk of theft or copying of proprietary AI systems.
Read More @ darkreading.com
[#] A critical security flaw in Argo CD (CVE-2024-28175, CVSS 9.0) lets hackers insert harmful scripts, and users must update to patched versions like v2.10.3, v2.9.8, or v2.8.12 to protect their Kubernetes.
Read More @ securityonline.info
[#] The U.S. Department of Health and Human Services is examining if protected health data was taken when the Change Healthcare platform was hit by a ransomware attack tied to the BlackCat group at the end of February.
Read More @ bleepingcomputer.com
[#] MarineMax, a boat retailer, reported a cybersecurity incident to the SEC after unauthorized access was found in their systems, but operations and sensitive data were not significantly affected, and they are investigating with law enforcement.
Read More @ darkreading.com
[#] INTERPOL reports a surge in global cybercrime fueled by AI scams and human trafficking, while a massive French data breach compromises 43 million workers and Nissan confirms a breach affecting 100,000, as Microsoft opens an AI security tool to the public and a LockBit ransomware affiliate faces 4 years in prison with potential extradition to the US.
Read More @ hackread.com
[#] Researchers at Salt Labs identified critical security flaws in ChatGPT plugins, which required quick fixes to prevent unauthorized access to private GitHub repositories and sensitive data through OAuth token exploits.
Read More @ scmagazine.com
[#] Malware disguised as popular Chinese text editors Notepad++ and VNote is infecting computers, so users should download software only from official sources and keep their security tools updated.
Read More @ securityonline.info
[#] Nissan Oceania was attacked by the Akira ransomware group, resulting in the theft of personal data from 100,000 individuals which includes government IDs, and affected customers are being offered free credit monitoring services and identity theft support.
Read More @ theregister.com
[#] Security experts found two flaws in Apache Tomcat that can cause service disruption and recommend immediate updating to the latest version for protection.
Read More @ securityonline.info
[#] A new malware named DarkGate, utilising a 0-day flaw in Windows SmartScreen (CVE-2024-21412), is distributed through fake PDF ads and installs itself with disguised software installers, making patching systems and awareness crucial for protection.
Read More @ securityonline.info
[#] The US House of Representatives passed a bill that could force TikTok to sell its US operations or be banned due to concerns over foreign surveillance and data privacy.
Read More @ theregister.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-15

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins