[-] borari@sh.itjust.works 12 points 5 months ago

And leaded gasoline and leaded diesel and leaded aviation fuel and lead pipes in household plumbing. Probably lead in the cigarettes everyone smoked literally everywhere.

[-] borari@sh.itjust.works 17 points 5 months ago

Saying they banned VPNs isn’t completely, technically correct I’d guess. If I were another country then VPN’d in to my house, I would probably be fine. A pedantically correct statement would be that they banned known VPN IP ranges, so if you’re attempting to connect while your traffic is routed through one you get blocked.

[-] borari@sh.itjust.works 11 points 5 months ago

Oh damn. Yeah fuck that place, glad I left.

Semi-related, I was searching for some hyper specific job related technical cybersecurity stuff a few weeks ago and the first result with the verbatim error message was a reddit post, so i clicked. No dice, loads a reddit branded error page. My employer has their own ARIN number/ASN. As far as i could tell every connection from an IP in one of our blocks was being blocked by reddit. My employer isn’t a faang type tech company, they don’t work in ai, they don’t scrape content for datasets or anything else. I can’t figure out why kind of business would cut off entire swaths of customers from accessing their site during the workday, a prime “take a shit and dick around on the phone” audience. I’ve just made a point to search with stack exchange site dorks since then.

[-] borari@sh.itjust.works 15 points 5 months ago

I’m slightly less mad now that I know this has precedent. I’m still fucking furious that the only precedent I’ve heard about is corporations and Trump, since the law should be equally applied regardless of absolute amounts of money and I’m pretty sure that someone living in poverty isn’t going to get the same treatment for a $50k (or whatever is a proportional amount) judgement against them.

[-] borari@sh.itjust.works 12 points 5 months ago

That wasn’t what was at stake here. Trump was already found guilty, he wasn’t bonding out of pretrial detention he was having to post bond in order to appeal the ruling, which typically requires the person making the appeal to post a bind to make sure they don’t spend all their money fighting on appeal, just to lose the appeal and not have any money left to pay the original judgement.

So my expectation was that yes, he would have to follow the same court rules as everyone else and put up the bond in order to appeal. While I do think we should get rid of requiring pretrial detention bond, I don’t necessarily see an issue with requiring pre-appeal bond. I don’t know, you don’t want to create a situation where you’re means testing the right to appeal, but you don’t want people to indefinitely delay enforcement of judgement against them or to allow them to spend away their ability to pay the judgement on appeals. Maybe forcing either the entirety of the judgement to be paid into a more traditional escrow account, or a payment plan for the judgement to be accepted and that paid into escrow, before an appeal can be started?

Any way you cut it though, I can’t fault this chuckle fuck for playing the court game but I’m fucking incensed the court is enabling it.

[-] borari@sh.itjust.works 16 points 5 months ago

It is part of the deep web, just like Discord or any sites hosted on private companies intranets. Lemmy is not, you can just hit any instance with a web browser and view stuff.

To be completely clear, dark web/net and deep web are two different things. That wiki link you used is describing dark web stuff like tor etc.

[-] borari@sh.itjust.works 38 points 6 months ago

detailing that he had been promised 500,000 rubles ($5,418).

Fuck me, this really hammers home that first world privilege. More than that amount of USD hits my checking account each month in my direct wages. This guy knew what would happen to him when he was caught then decided that risking misery in Siberia before being executed was worth less than a month of my take home pay. I mean i get that some level of radicalization is involved here, but still what the fuck.

[-] borari@sh.itjust.works 10 points 6 months ago

That’s exactly what a bot would say… 🤨

[-] borari@sh.itjust.works 20 points 6 months ago

Imagine the uproar if China demanded that Google stopped being a US military contractor.

China is actively demanding that all Chinese companies excise American hardware and software from their technology stacks. They know that they can’t divorce a US tech company headquartered in the US from the US intelligence agencies, so it is the next best option. This is colloquially known in China as “Delete A” or “Delete America”. Who is being xenophobic again?

[-] borari@sh.itjust.works 31 points 6 months ago

Except that’s not my point, but you already knew that didn’t you? It’s pretty obvious you’re not actually here for a conversation.

[-] borari@sh.itjust.works 36 points 6 months ago

Who are they worried China is going to influence? Children, right? If it's adults, that's almost more insulting, they think we don't deserve to be able to see all sides of an argument and are too stupid to discern fact from fiction.

Yeah fam, you and me are definitely way too smart to ever be manipulated by military units whose sole job is to effectively manipulate large swaths of the population.

The answer is everyone. They’re worried about anyone and everyone, because they do it also.

https://youtu.be/VA4e0NqyYMw?si=u_d-eDOMYA-FetVn

[-] borari@sh.itjust.works 13 points 6 months ago

And if the jury really needs to know the contents of the files, I don’t see any issue with just swearing in a jury of already cleared TS SCI w/Poly Commissioned Officers, or just full send it and let Trump get prosecuted in a military court. I’d love to see a bunch of GWOT brass ream that dudes asshole.

1

Team Cymru published a report detailing infrastructure and configuration changes to the Vidar info-stealer malware that were made in an attempt to evade detection and anonymize activities.

1

ESET researchers identified an updated version of the Android GravityRAT spyware being distributed as the messaging apps BingeChat and Chatico.

1

It seems like attackers have discovered a way to leverage NPM packages to deliver malicious binaries without needing to make any changes to the NPM package itself.

1

This is an interesting report by Symantec about a Russian 'Cyber Campaign' against Ukraine, targeting security services, military, and government organizations.

It's crazy that we're witness to the first case in history of cyber warfare campaigns being waged alongside, and in support of, a hot war, in real time.

3

Looks like Mandiant has discovered active exploitation of CVE-2023-20867, which was given a CVSS score of 3.9 when it was assigned.

3
submitted 1 year ago* (last edited 1 year ago) by borari@sh.itjust.works to c/cybersecurity@sh.itjust.works

This new malware strain, written in Go, has been seen compromising systems across Europe, Southeast Asia, an the U.S. It's stealing sensitive information from Discord, web browsers, etc.

1

This won't apply to anyone here, because we're all reviewing any code we clone from GitHub prior to executing it on our system, right?

1
1
submitted 1 year ago* (last edited 1 year ago) by borari@sh.itjust.works to c/cybersecurity@sh.itjust.works

This new stealer has five stages, and shows a high level of sophistication, akin to APTs. Targeted victims have been seen in Europe, the USA, and Latin America.

Several pieces of Russian text were found in the malware.

The first part of the C2 URL is “Privetsvoyu” which is a misspelled transliteration of the Russian word for “Greetings.” Secondly, we found the string “salamvsembratyamyazadehayustutlokeretodlyagadovveubilinashusferu.” Despite the weird transliteration, it roughly translates to: “Greetings to all brothers, I’m suffocating here, locker is for bastards, you’ve messed up our area of interest.”

MD5 sum and C2 URL IOCs are included at the end of the report.

1

The researcher chained an insecure password reset API route to bypass authentication, then discovered an IDOR vulnerability could be leveraged to access sensitive customer data.

For everyone that says "The real world can't be as easy as training labs make it seem out to be!", sometime it really do be that ez.

1
submitted 1 year ago* (last edited 1 year ago) by borari@sh.itjust.works to c/cybersecurity@sh.itjust.works

I thought I'd take a break from posting stories that come across my RSS feed to let people know about an upcoming Hack-A-Thon/CTF event that OffSec is running next weekend.

I'm not really sure what the challenges will entail, since I'm not eligible for any of the prizes I haven't been paying much attention to info about it at all. I do know that in order to compete you will have to have an active PG Practice subscription, which is $19 USD/mo, more info is here. I don't really like that they're requiring people to already have a paid subscription to compete, but it's their ecosystem and their rules.

There are three different tiers you can compete in, a PEN-300 tier, an EXP-301 tier, and an PEN-200 tier. The 1st prize for each tier is a year long LearnOne subscription to the tier course, 2nd place is a 90 day course subscription to the tier course, and 3rd place is a 90 day subscription to the PG Practice environment.

While SANS is the king of wildly expensive courses, the OffSec subscriptions definitely aren't cheap either, especially if you're self-paying. I get the irony of making people pay for entry into a contest where they might win a subscription they otherwise couldn't afford, but it's better than nothing I guess.

1

Elastic Security Labs has discovered the SPECTRALVIPER malware targeting a national Vietnamese agribusiness.

view more: next ›

borari

joined 1 year ago