Tag: network

  • The Register: Why the long name? Okta discloses auth bypass bug affecting 52-character usernames

    Source URL: https://www.theregister.com/2024/11/04/why_the_long_name_okta/ Source: The Register Title: Why the long name? Okta discloses auth bypass bug affecting 52-character usernames Feedly Summary: Mondays are for checking months of logs, apparently, if MFA’s not enabled In potentially bad news for those with long names and/or employers with verbose domain names, Okta spotted a security hole that could…

  • Wired: Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies

    Source URL: https://www.wired.com/story/inside-the-massive-crime-industry-thats-hacking-billion-dollar-companies/ Source: Wired Title: Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies Feedly Summary: When you download a piece of pirated software, you might also be getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that’s fueling some of the biggest breaches on the planet. AI Summary and…

  • Slashdot: Millions of U.S. cellphone users could be vulnera

    Source URL: https://news.slashdot.org/story/24/11/03/1924236/millions-of-us-cellphone-users-could-be-vulnera?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Millions of U.S. cellphone users could be vulnera Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant breach affecting U.S. telecommunications networks, allegedly linked to Chinese hackers. This situation poses a critical threat to national security and highlights vulnerabilities in lawful-access systems used for surveillance…

  • Hacker News: Coordinated Community Response Mitigates Fediverse Spam Attack

    Source URL: https://about.iftas.org/2024/10/21/coordinated-community-response-mitigates-fediverse-spam-attack/ Source: Hacker News Title: Coordinated Community Response Mitigates Fediverse Spam Attack Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details a recent incident of spam attacks on the Fediverse, particularly affecting platforms like Misskey and Mastodon. The community’s rapid response technology efficacy and collaboration highlight the importance of proactive…

  • The Register: 6 IT contractors arrested for defrauding Uncle Sam out of millions

    Source URL: https://www.theregister.com/2024/11/03/6_it_contractors_arrested_for/ Source: The Register Title: 6 IT contractors arrested for defrauding Uncle Sam out of millions Feedly Summary: Also, ecommerce fraud ring disrupted, another Operation Power Off victory, Sino SOHO botnet spotted, and more in brief The US Department of Justice has charged six people with two separate schemes to defraud Uncle Sam…

  • Hacker News: Speed, scale and reliability: 25 years of Google datacenter networking evolution

    Source URL: https://cloud.google.com/blog/products/networking/speed-scale-reliability-25-years-of-data-center-networking Source: Hacker News Title: Speed, scale and reliability: 25 years of Google datacenter networking evolution Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text outlines Google’s networking advancements over the past years, specifically focused on the evolution of its Jupiter data center network. It highlights key principles guiding the…

  • Hacker News: Prisma Postgres – Runs on bare metal and unikernels

    Source URL: https://www.prisma.io/blog/announcing-prisma-postgres-early-access Source: Hacker News Title: Prisma Postgres – Runs on bare metal and unikernels Feedly Summary: Comments AI Summary and Description: Yes **Summary:** Prisma has launched Prisma Postgres, a managed PostgreSQL service designed to provide developers with an always-on database experience featuring a pay-as-you-go pricing model and no cold starts. This service utilizes…

  • Hacker News: The performance of hashing for similar function detection

    Source URL: https://edmcman.github.io/blog/2024-01-11–fuzzy-hashing-for-code-comparisons/ Source: Hacker News Title: The performance of hashing for similar function detection Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves deeply into malware reverse engineering and explores advanced hashing techniques like PIC hashing and fuzzy hashing. It highlights the significant challenges faced in identifying equivalent functions across different…

  • Hacker News: How to inspect TLS encrypted traffic

    Source URL: https://blog.apnic.net/2024/10/14/how-to-inspect-tls-encrypted-traffic/ Source: Hacker News Title: How to inspect TLS encrypted traffic Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses various methods for decrypting TLS traffic to inspect potentially malicious communications, focusing on the strengths and limitations of each method. It is particularly relevant for professionals in cybersecurity, networking, and…

  • Microsoft Security Blog: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/ Source: Microsoft Security Blog Title: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files Feedly Summary: Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is…