New Tool Exposes How Ads in Apps Use Network Data Tracking to Trace Your Location
#MobilePrivacy #AppSec #DataPrivacy #AdTech #Privacy #Cybersecurity #InfoSec #LocationTracking #DataBroker #Surveillance #Android #iOS #PrivacyTools #SecurityResearch
New Tool Exposes How Ads in Apps Use Network Data Tracking to Trace Your Location
#MobilePrivacy #AppSec #DataPrivacy #AdTech #Privacy #Cybersecurity #InfoSec #LocationTracking #DataBroker #Surveillance #Android #iOS #PrivacyTools #SecurityResearch
I am looking for good #RSS / #Atom feeds about #Selfhosting #Linux #BSD #SecurityResearch #UnplugTrump #OpenSource #FOSS #EUPol
#VMware #Fediverse
The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…
OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.
By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.
In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: https://www.pentestpartners.com/security-blog/ics-testing-best-results-hint-blend-your-approach/
What distro are people using as their daily driver for security research?
This all might improve with CNAs, but I am slightly frustrated with the #CVE process through #Mitre atm. I applied for a CVE number 1 1/2 months ago and got a reply after three weeks stating that the vulnerability did not qualify for a CVE.
I'm quite sure this was due to a misunderstanding since the application asks us to be brief rather than laying out a lot of details, so I replied with how I do believe it does (basically, they thought the attacker don't have physical access in the normal use case, which they do) and apologized for not having expanded in detail - and did.
That was two weeks ago. I get having a queue where it can take three weeks for the initial response, but if it's going to be three weeks for every reply in a back'n'forth then there will be no CVE allocated once the 90 day disclosure period is up.
The vendor? Yeah they acted immediately on the report. But this is a case where I think the vulnerable customers would gain from CVE communication.
Imagine you have a friend who’s worked in security for nearly a decade and they’re feeling burned out. The spark is still there, they care about the work, but they are tired
. Nothing feels exciting or interesting anymore.
Apart from taking some time off, they’ve asked for podcast or book recs—stories that will help them feel that twinge of excitement, that will remind them of how rewarding and fascinating this field can be.
What do you suggest?
While I may publish a more complete blog post about this later
I also sent this on twitter to make #Github aware of it quicker
However I felt that I should also publish it here.
I recently came upon this post on reddit: https://www.reddit.com/r/cybersecurity_help/comments/196qhup/how_do_i_remove_this_malware/
Which awakened my curiosity about this user who has quite a few repo's with multiple stars: github[.]com/AppsForDesktop
looking at their profile I noticed various repo's claiming to be desktop app for various popular websites and apps.
When I investigated these repo's in my sandboxes I discovered they installed the file: cnertucbrcaj[.]exe and performed various persistence techniques,
Adding several exclusions to defender
and uninstalling various windows security components such as MRT.
After which it of course connected to various Monero mining pools.
And we’re on Mastodon!
If you’re new to The Spamhaus Project, check out our bio above
Ultimately, we’re here to build a community. A community of like-minded individuals, who want to make the internet a safer place. On Mastodon, we’ll be sharing latest threat intelligence from our researchers and threat hunters, and we’d like to invite you to do the same….
Earlier this month, we launched our Threat Intel Community, giving anyone the ability to submit malicious domains, IPs, email source codes, or URLs to Spamhaus through our user-friendly portal.
If you’re curious to know more, read this blog:
https://www.spamhaus.org/news/article/821/want-to-submit-data-be-our-guest
Or visit the Threat Intel Community here:
https://submit.spamhaus.org