🚨 New research alert!
Mandiant has observed a new espionage operation targeting #Ukraine. We suspect this activity is being conducted by the Russian #cyberespionage group, Turla Team. Read the blog to learn more. ⬇️
NYT's opinion page gets in under the wire in the competition for Worst Take of 2022: Signal is bad because the people who build it are morally committed to preserving the privacy of its users.
This talk covers the discovery of a CNVD that is not listed on the US NVD, and the larger picture behind the discovery and disclosure of vulns in China.
As the number of new #Azov#Ransomware-related samples is still growing and has already exceeded several thousands, we took a deep dive into its internal workings and technical features, revealing it not being a Skidsware but an advanced Polymorphic Wiper.
"Fortinet quietly fixed the bug on November 28th in FortiOS 7.2.3 (other versions released earlier) without releasing any information about it being exploited as a zero-day."
Some network IOCs from the official advisory: 188.34.130[.]40:444
103.131.189[.]143:30080,30081,30443,20443
192.36.119[.]61:8443,444
172.247.168[.]153:8033
Worried about the Xnspy stalkerware? Check your network logs for connections to xiz4me[.]com. Full set of indicators added to the mobiletrackers list on Github.
, Mauro Vignati and Vladimir Radunović for our latest webinar. They'll discuss:
✔️ Did the cyberwar take place - why or why not?
What key events in 2022 shall we as the international community study?
✔️ What can we expect in 2023?
More: https://kas.pr/m83f
I wrote an IDA plugin that queries #ChatGPT and explains decompiled functions. It's still very bleeding edge, but you can find the code here and try it out:
https://github.com/JusticeRage/Gepetto…
(Yes, the video was performed on a very basic case for simplicity's sake.)
Cyber operations are a reality of armed conflict and can cause real harm.
We are proposing a digital emblem that would signal protection for digital infrastructure of medical facilities and identify the Red Cross/Crescent Movement in cyberspace.
How would it work?
“hacked messages are also believed to have included highly sensitive discussions with senior international foreign ministers about the war in Ukraine.” Obvious question is why was she using personal phone for top-secret conversations?
If 41 lines of code can bypass the authentication process on the administrative interface of FortiGate firewalls, FortiProxy web proxies, and FortiSwitch Manager (FSWM) on-premise management instances, then something is very wrong.
This is not acceptable
Technical analysis of CVE-2022-40684 a critical authentication bypass vulnerability in Fortinet FortiOS (firewall) FortiProxy (web proxy), and FortiSwitch Manager products now available on