home.social

#attack-vector — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #attack-vector, aggregated by home.social.

fetched live
  1. I really like this kind of content that breaks down research papers for the rest of us. I had no idea that BGP hijacking was such a threat.

    I wonder if any security folks out there have more up-to-date information on the resilience of OVH, Hetzner, DigitalOcean and other major provider networks. Are Counter-RAPTOR guards, counter-fingerprinting measures, BGP monitoring and RPKI being deployed in the wild?

    youtu.be/XDsLDhKG8Cs

    #Security #BGP #Networking #Tor #AttackVector #Deanonymization

  2. @Snowshadow @anomnomnomaly

    There's an automated account that wanted to follow me today. I don't have any "follower protection" so I don't get these follow requests but this time I got it

    and it was only cause it was an automated account that wanted to follow me.

    They are now blocked...

    Anyway this is an attack vector! Imagine a bad actor fixing up 2000 accounts a day and then having them send follow requests to you.

    Imagine the spam!

    I could not block them all...

    #spam #AttackVector

  3. The Register: SafeBreach presented at the Black Hat Asia conference on Friday that flaws in Microsoft and Kaspersky security products could potentially allow the remote deletion of files. Microsoft Defender and Kaspersky's Endpoint Detection and Response (EDR) can be made to detect false positive indicators of malicious files – and then to delete them. The attack relies on the fact that Microsoft and Kaspersky use byte signatures – unique sequences of bytes in file headers – to detect malware. "Our goal was to confuse EDR by implanting malware signatures into legit files and make them think its malicious" 🔗 theregister.com/2024/04/22/edr

    #MicrosoftDefender #Kaspersky #attackvector #EDR

  4. Reminder: Every "free" web account that you create is an attack vector, an addition to your attack surface. Every additional set of login credentials that has anything to do with "you", every working email address you provide: each one of these is a digital point of weakness that you have voluntarily provided to your enemies and predators. Make sure each new one is worth it.
    #CyberSecurity #credentials #CyberAttack #OnlineSafety #AttackVector #AttackSurface

  5. This project is an Interesting one. #Meraki devices allow you to log in using the Serial Number. Need a lot more data to refine the key search to something feasible for an online attack.

    git.blackmarble.sh/init6/merak

    #passwords #attackVector