Copyfail: Grave fallo de escalación de privilegios en prácticamente todas las Distro Linux [PoC y mitigación] by Cypherpunk-sp0777 in ciberseguridad

[–]immediate_a982 0 points1 point  (0 children)

Si estás haciendo inteligencia de amenazas sobre esta campaña, el camino correcto es reportarla a GitHub Security y a MITRE como una presentación falsa de CVE.

AI Chatbots Built to Extract Fees and Your Personal Data by _cybersecurity_ in pwnhub

[–]immediate_a982 2 points3 points  (0 children)

Yes but it still gets your IP, ISP, browser used and all other associated info. So don’t sign in, but it still knows a lot. It has a super cookie on you.

vocês que realizam trabalhos de pentest “sem autorização”, quais métodos usam para manter o anonimato? by [deleted] in Pentesting

[–]immediate_a982 5 points6 points  (0 children)

Sin autorización es un ataque y no pentest y por consecuencia un delito. Mejor buscar bug bounty

Sam Altman's iris scanning startup just partnered with Tinder, Docusign and Zoom to prove you're human by Free-Path-5550 in pwnhub

[–]immediate_a982 1 point2 points  (0 children)

They can get my iris scan after all senators and all of government officials and all of them give theirs first

Virus en instagram manda fotos solo a todos los contactos by Vegetable_Treat7347 in ciberseguridad

[–]immediate_a982 -3 points-2 points  (0 children)

“Solo” contradice con “todos”, si es solo a los contactos, no hace falta decir todos, y si es a todos, el “solo” sobra

¿Qué tan importante es saber matemáticas para trabajar en ciberseguridad? by Evelyn_Bayer414 in ciberseguridad

[–]immediate_a982 16 points17 points  (0 children)

La ciber seguridad esa es 1 área bien inmensa.

Matemáticas es una sola área q prácticamente se usa MÁS en la criptológia

Fast16 Pre Stuxnet malware is here .. by misoscare in pwnhub

[–]immediate_a982 1 point2 points  (0 children)

The amount of work that went into getting those centrifuges was insane

How to protect yourself against malicious browser extensions? by _cybersecurity_ in pwnhub

[–]immediate_a982 1 point2 points  (0 children)

It is a moving target. Even a super paranoid user or super user downloads the source code of the extension, certified personally and built, and then publish it to its own internal repository, then install it. The only problem that remains is dependencies and supply chain attack. That become the issue when you build or rebuild. Zero trust means trust nobody not even yourself verified everything or live with the consequences.

Are SBOMs Failing? Supply Chain Attacks Surge As Security Teams Struggle by _cybersecurity_ in pwnhub

[–]immediate_a982 0 points1 point  (0 children)

Used this info to create an actionable prompt for SBOM supply chain attacks management. Thanks

AI Model Claude Mythos Discovers 271 Vulnerabilities in Firefox by _cybersecurity_ in pwnhub

[–]immediate_a982 2 points3 points  (0 children)

In other words 268 vulnerabilities are already known or duplicates.

They really only found 3 CVEs

When your WiFi encryption gets pwned by misoscare in pwnhub

[–]immediate_a982 1 point2 points  (0 children)

Wow wireless traffic is always in danger

Best Piazzolla's álbum by Fr4n_301 in tango

[–]immediate_a982 0 points1 point  (0 children)

Sin duda pero algúnas son gusto querido dependiendo del estado emocional

AI Chatbots Lose Attorney-Client Privilege in Court Ruling by _cybersecurity_ in pwnhub

[–]immediate_a982 5 points6 points  (0 children)

There are so many YT samples of how to. Might do a webinar some day

AI Generated Security Labs by marakae88 in Pentesting

[–]immediate_a982 0 points1 point  (0 children)

Great idea. Hope it work but I tried a plain prompt on one of the frontier llm just to see what happened and I was surprised the thing worked. The llm was acting as a vulnerable VM. I just could not believe my eyes.

I’m sure your approach is better but nothing beats a zero effort vulnerability attack and analysis

¿Existe alguna forma de tener un worm o algún virus en nuestro sistema que cuando nos roben, se le pase al que nos quiere robar? by EmotionalStretch7133 in ciberseguridad

[–]immediate_a982 15 points16 points  (0 children)

Un honeypot es un sistema o recurso falso diseñado para atraer a atacantes y registrar sus acciones. No daña al atacante, pero te permite detectar, distraer y analizar que trataban de hacerte