#techsafety — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #techsafety, aggregated by home.social.
-
AI Robot Snaps and Attacks Engineers on Camera
A shocking moment caught on video shows an experimental AI robot malfunctioning and attacking its own engineering team during a demo.
#AIRobotics #RobotFail #TechSafety #Engineering #BreakingNews #AI #tech #robots
https://www.technology-news-channel.com/ai-robot-snaps-mid-demo-and-attacks-engineers-on/
-
Don't tug on that, you never know what it might be attached to
https://blog.plover.com/2016/07/01/#tmpdir
#HackerNews #youNeverKnow #whatItMightBeAttachedTo #HackerNews #PloverBlog #TechSafety
-
🔒 Verify app authenticity effortlessly with AppVerifier! This powerful tool checks app signing certificate hashes to ensure your apps are genuine and secure. Perfect for Android users who value safety and trust. 💪🔐 #AppSecurity #Android #TechSafety #OpenSource
Explore more: https://github.com/soupslurpr/AppVerifier
-
via #Microsoft : Beware of double agents: How AI can fortify — or fracture — your cybersecurity
https://ift.tt/NTfsXA9
#AI #Cybersecurity #DoubleAgents #AgenticZeroTrust #DataPrivacy #Innovation #TechSafety #Microsoft #SecurityAwareness #FutureOfWork #CyberRisk #Containment #… -
🔧 Data recovery specialists warn of increased risk of defects in older Western Digital hard drives. Important reminder: back up your data regularly to avoid losses! 💾⚠️ Stay informed and protect your valuable files. More details at https://www.heise.de/en/news/Risk-of-Defect-Data-Recovery-Specialists-Advise-Backups-of-Older-WD-Hard-Drives-10800960.html #DataBackup #WDHardDrives #TechSafety
#newz -
Grab peace of mind with the Security Gadgets Detector with AI Chip—smartly scans your surroundings and detects hidden devices using advanced AI insights.
Place your order now:
#SecurityGadgetsDetector #AI #AIPoweredProducts #SmartSecurity #TechSafety #aimartz #aimartzdotcom
https://aimartz.com/product/security-gadgets-detector-with-ai-chip/
-
Researchers warn that making AI chatbots more agreeable to boost engagement can lead them to reinforce harmful ideas, including promoting drug use. Careful design is crucial for responsible AI. #AI #Chatbots #Ethics #TechSafety #AIResponsibility #ArtificialIntelligence #TechNews
-
That AirPlay/CarPlay security buzz? Apple patched its own devices fast. Risk is low: mainly outdated third-party gear on open Wi-Fi. Update everything, secure your network, and you're good. #AirPlay #AppleSecurity #TechSafety
-
Smart Home Security: AI-Driven Protection for Safer Living
https://rackenzik.com/smart-home-security-ai-driven-protection-for-safer-living/
#SmartHome #HomeAutomation #CyberSecurity #HomeSecurity #AI #PrivacyMatters #IoT #SmartDevices #AnomalyDetection #FaceRecognition #DigitalSecurity #TechSafety
-
Heads up tech fam. The FBI is flagging a rise in AI voice deepfakes impersonating officials to spread malware. These fakes are scarily good. Always verify before clicking or trusting a voice message. #AIThreats #DeepfakeScam #TechSafety
-
Cloudflare finds almost 7% of Internet traffic to be malicious
https://stackdiary.com/cloudflare-finds-almost-7-of-internet-traffic-to-be-malicious/
#Cybersecurity #InternetSafety #Cloudflare #MaliciousTraffic #OnlineSecurity #DDoS #BotTraffic #APISecurity #DataProtection #WebSafety #CyberThreats #DigitalSecurity #TechNews #InternetThreats #HackerDefense #NetSecurity #CyberDefense #SecurityReport #WebProtection #InternetRisks #SecureWeb #CyberAwareness #NetworkSecurity #ThreatAnalysis #WebApplicationSecurity #CyberProtection #TechSafety #OnlineThreats
-
Citrix patches critical NetScaler Console vulnerability
(improper auth: 9.4/10 on CVSS)
https://stackdiary.com/citrix-patches-critical-netscaler-console-vulnerability/
#Citrix #NetScaler #Security #Patch #Update #Vulnerability #Critical #Console #Fix #Cybersecurity #Protection #Software #Network #Tech #IT #SecurityUpdate #BugFix #Safety #Defense #Infrastructure #TechNews #SecurityPatch #CyberDefense #TechUpdate #SecurityAlert #Threat #Secure #Risk #ITSecurity #TechSafety #SystemUpdate #CVE
-
Linksys Velop routers send Wi-Fi passwords in plaintext to US servers
https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/
#Linksys #Velop #WiFi #Router #Security #DataBreach #Cybersecurity #Privacy #Encryption #Hackers #MeshNetwork #TechNews #ConsumerAlert #Testaankoop #Amazon #Plaintext #SSID #Password #Firmware #Vulnerability #CyberAttack #NetworkSecurity #DigitalPrivacy #TechSafety #UserData #WiFiSecurity #InternetSafety #HomeNetwork #ITsecurity #TechAlert #SecurityFlaw
-
Signal president Meredith Whittaker has addressed concerns about unencrypted encryption keys on Signal desktop and the ability to clone entire sessions undetected.
https://stackdiary.com/signal-under-fire-for-storing-encryption-keys-in-plaintext/
#Signal #Security #Encryption #Privacy #Cybersecurity #TechNews #DataProtection #EndToEnd #EncryptionKeys #SignalApp #DesktopSecurity #TechSafety #DigitalPrivacy #SecureMessaging #InfoSec #UserSafety #DataBreach #SecurityUpdate #OnlinePrivacy #SignalUpdate #TechAlert #PrivacyConcerns #DigitalSecurity
-
7-Zip quietly fixes a buffer overflow vulnerability
https://stackdiary.com/7-zip-quietly-fixes-a-buffer-overflow-vulnerability/
#CyberSecurity #InfoSec #DataBreach #Vulnerability #SoftwareUpdate #7Zip #TechNews #SecurityPatch #BufferOverflow #DataProtection #SecurityAlert #HackerNews #Malware #SecureSoftware #Privacy #CyberAttack #TechAlert #BugFix #SecurityBreach #DataSecurity #CyberSafety #InfosecNews #TechUpdates #SecurityFirst #Exploit #SecureTech #OnlineSecurity #SecureUpdate #SecurityMatters #TechSafety
-
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness