HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Ken Shirriff takes a dive into a military-grade chip to explore its gate array design and compares it with custom chips, outlining the costs and production differences. A cyber security fan uncovers how to hack into the Rebound box on HackTheBox with techniques that bump up privileges. Trail of Bits launches Ruzzy, a fuzzer to sniff out Ruby code bugs. "forensictools" toolkit makes a one-stop virtual spot for digital forensics, loaded with a bunch of analysis tools. An article unveils a hacking trick to mess with turnstiles using the Wiegand protocol. Lastly, C2 Tracker on GitHub keeps an eye on shady online dealings, nabbing IP addresses to spot malign servers.

# Tradecraft

[#] Ken Shirriff investigates a military-grade chip from the 7400 series, revealing a gate array design with many unused transistors, and discusses the trade-offs between gate array and custom chips in terms of design cost and manufacturing.
Read More @ righto.com
[#] A cyber security enthusiast demonstrates a step-by-step approach to exploit the Rebound box on HackTheBox, utilizing various techniques like cross-session relay and constrained delegation to escalate privileges and access restricted data.
Read More @ gitlab.io
[#] Trail of Bits has introduced Ruzzy, a new fuzzing tool designed to enhance the security of Ruby code by identifying bugs through dynamic testing and integrating with the libFuzzer ecosystem.
Read More @ trailofbits.com
[#] The "forensictools" toolkit assists in creating a virtual environment for digital forensics and provides tools for binary analysis, Chrome utilities, debugging, event log analysis, hashing, hex editing, mail forensics, memory forensics, packing, password cracking, registry analysis, utilities, and Windows artifact examination.
Read More @ securityonline.info
[#] The article details a hacking technique involving physical implant attacks on turnstiles using replay methods and an introduction to the Wiegand protocol, which is susceptible to interception and unauthorized access bypassing multi-layered security measures.
Read More @ com.br
[#] The C2 Tracker repository on GitHub offers a constantly updated IOC feed that tracks command and control servers, tools, botnets, and information-stealing malware by collecting IP addresses using Shodan searches.
Read More @ github.com

# News

[#] AT&T acknowledges the leak of data belonging to 73 million customers from a 2019 breach, including secure passcodes for 7.6 million accounts, and advises these customers to reset their account passcodes for protection.
Read More @ bleepingcomputer.com
[#] A sophisticated variant of Vultur banking malware imitates the McAfee Security app and increases risk with new remote control functions and evasion tactics, prompting the advice to download apps only from Google Play and scrutinize app permissions.
Read More @ bleepingcomputer.com
[#] Bruce Schneier's latest blog post highlights concerns about AI trustworthiness, commenting on the difficulty of setting limits on machine learning and the potential influences of input data on AI behavior.
Read More @ schneier.com
[#] A C2 Tracker tool provides a daily-updated list of command and control servers, botnets, and malware, utilizing Shodan to collect relevant IP addresses, which users can implement to enhance their cybersecurity defenses.
Read More @ securityonline.info
[#] Mac users are being targeted by stealer malware through deceptive ads and counterfeit websites, which require increased vigilance and security measures.
Read More @ thehackernews.com
[#] Red Hat has issued a critical security alert for a supply chain attack in certain XZ Utils versions, requiring users to downgrade to a safe release to avoid unauthorized remote access.
Read More @ thehackernews.com
[#] A security breach has been identified in the xz compression library's liblzma component, affecting Debian and potentially other Linux systems, with indications that the ssh server slowdown is linked to a backdoor; users are advised to upgrade their systems immediately to mitigate the risk.
Read More @ openwall.com
[#] The main branch of the CVE-2024-3094-checker on GitHub does not currently have the file cve-2024-3094-checker.sh, and users looking for it will encounter a 404 page error.
Read More @ github.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-31

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins