Posts
2584
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
@neurovagrant @cR0w @tychotithonus BLOOD FOR THE BLOOD GOD! (I actually think this is more fitting talking about vulns)
0
0
3
repeated

As you are preparing for your annual password change, I would like to remind you that our password policy clearly states that all characters are special.

2
4
0
#music #keepingtheravealive #NYE
Show content
0
0
0
repeated

John @tuckner sent me on an interesting wild goose chase. He is investigating the Cyberhaven extension compromise, trying to find out more. And he found something that he considered another campaign compromising browser extensions, related to the sclpfybn[.]com domain: https://secureannex.com/blog/cyberhaven-extension-compromise/#a-new-thread-to-pull-on

One of the extensions that used to contain the code in question was Visual Effects for Google Meet – which brought him to me because I recently covered that extension in my Karma Connection article: https://palant.info/2024/10/30/the-karma-connection-in-chrome-web-store/

I checked my data but couldn’t find sclpfybn[.]com domain mentioned in any extensions other than the ones @tuckner found already. I then looked for similar code and immediately found it in Urban VPN Proxy.

First thought: Urban VPN Proxy has the legitimate version of a library that was trojanized elsewhere. Taking a look at the communication of Urban VPN Proxy disproved that theory almost immediately – not only was it communicating in exactly the same way, but also to an unknown domain, namely ducunt[.]com. Yet the same endpoint existed on the official urban-vpn[.]com domain as well.

So not only did Urban VPN Proxy contain essentially the same code, it was likely added there by the developers themselves. Further investigation increased the suspicion that all these extensions haven’t been compromised, that this was rather some monetization SDK.

At which point @tuckner found the sales pitch for that SDK, detailing how it would add ad blocking functionality to the extension at the cost of exfiltrating very detailed browsing data (of course anonymized and aggregated before being sold to everyone asking for it, we know the drill). And explanations on how to make sure Google won’t object.

And that explains it all: before the Visual Effects for Google Meet developer sold their extension to Karma, they tried to monetize it with this “ad blocking library.” The sales pitch doesn’t mention who develops the library but everything points to Urban VPN.

According to Urban VPN privacy policy, they are selling the data they collect from their users via BIScience Ltd. Who are most likely the hidden owners of Urban Cyber Security Inc., a company registered to a virtual address in the USA.

0
7
0
repeated

Part 2 of my series on Hypervisor-Managed Linear Address Translation (HLAT) is here: https://www.asset-intertech.com/resources/blog/2024/12/vt-rp-hlat-and-my-aaeon-alder-lake-core-i7-1270pe-board-part-2/. I used SourcePoint to pinpoint where HLAT is enabled on the p-cores of my AAEON Alder Lake board. Many thanks to @yarden_shafir, @aall86 and @standa_t for inspiration.

0
2
0
repeated

fuck you, 2024. I made it through \o/

0
5
0
Multiple vulnerabilities in CTFd versions <= 3.7.4 (CVE-2024-11716, CVE-2024-11717)

https://seclists.org/fulldisclosure/2024/Dec/21

Do these count as Cursed CTF tactics?
1
2
6
[RSS] Security Bulletin: IBM PowerHA SystemMirror for #IBMi is vulnerable to multiple vulnerabilities in the PowerHA Web Interface [CVE-2024-55897, CVE-2024-55896]

https://www.ibm.com/support/pages/node/7180036?myns=swgother&mynp=OCSSPHQG&mynp=OCSWG60&mync=A&cm_sp=swgother-_-OCSSPHQG-OCSWG60-_-A
0
0
0
repeated

Waymo (aka Google) admits that it trains its robotaxis to break the law. When WaPo reporter finds robotaxis fail to stop for pedestrians in marked crosswalk 70% of the time, Waymo says it follows "social norms" rather than laws.
Expert explains: When robotaxis obey law, they don't go fast enough to compete successfully with Uber, so Google execs ordered engineers to ignore laws.
https://wapo.st/3ZZDifm

11
22
0
repeated

BeyondTrust SaaS hack announced just before Xmas was used to access US Treasury Department.

I understand it impacts other customers, too - the threat actor stole keys used to access customer workstations (even where they deployed the on prem server - the product is a reverse proxy effectively), which BeyondTrust has opted not to disclose to customers.

https://www.reuters.com/technology/cybersecurity/us-treasurys-workstations-hacked-cyberattack-by-china-afp-reports-2024-12-30/

1
4
0
repeated

This is, BTW, why I'm such a passionate enthusiast. Their technology is good, but their business plan -- subscriptions instead of advertisements, bootstrapped instead of VC-based -- matters way more. It means that they *have* to focus on what's good for their users, not what pleases the current whim of the stock market and the billionaires.

I dearly wish more companies would catch that clue…

1
3
0
@sue this doesn't change the fact that as the result of regulation UX on web got much worse. If the rules are good, they should be enforced. If they are imperfect, they should be refined. Waiting for thousands of adtech players to suddenly play nice is...unrealistic.
0
1
2
@cR0w @wdormann @screaminggoat @obivan Another point for the LLM's I guess?
1
0
3
repeated

to elaborate: i went without heating for the last 2 years of kitsune tails production. we have enough to run the heating now, but if you want to play gay fox girl SMB3 and help ensure the heating stays on, you can get it on sale now: https://store.steampowered.com/app/1325260/

or on itch: https://eniko.itch.io/kitsunetails

3
5
0
Show older