Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
  • Russian [Attackers] Exploited Windows Flaws in Attacks on European Firms

    Analysis of the infrastructure used by the [attackers] led to the discovery of an executable named comahawk.exe that incorporated two local privilege escalation exploits targeting Windows.

    The vulnerabilities, tracked as CVE-2019-1405 and CVE-2019-1322, were patched by Microsoft in November 2019 and October 2019, respectively. Microsoft’s advisories for both these flaws say “exploitation [is] less likely”

    In mid-November 2019, NCC Group, whose researchers reported the vulnerabilities to Microsoft, published a blog post describing the weaknesses. Shortly after, someone made public an exploit named COMahawk that weaponizes CVE-2019-1405 and CVE-2019-1322.

  • Global insurer Chubb hit by Maze ransomware: claim [iophk: Windows TCO]

    According to its own website, Chubb had more than US$177 billion (A$291 billion) in assets and reported US$40 billion of gross premiums in 2019. The company says it has offices in Zurich, New York, London, Paris and other locations, and has more than 30,000 employees.

    iTWire contacted Chubb's Australian office for comment. A spokesperson responded: "We are currently investigating a computer security incident that may involve unauthorised access to data held by a third-party service provider.

  • Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links

    A recently discovered watering hole attack has been targeting iOS users in Hong Kong. The campaign uses links posted on multiple forums that supposedly lead to various news stories. While these links lead users to the actual news sites, they also use a hidden iframe to load and execute malicious code. The malicious code contains exploits that target vulnerabilities present in iOS 12.1 and 12.2. Users that click on these links with at-risk devices will download a new iOS malware variant, which we have called lightSpy (detected as IOS_LightSpy.A).

More in Tux Machines

Python Programming

  • Add interactivity to your Python plots with Bokeh

    In this series of articles, I'm looking at the characteristics of different Python plotting libraries by making the same multi-bar plot in each one. This time I'm focusing on Bokeh (pronounced "BOE-kay"). Plotting in Bokeh is a little more complicated than in some of the other plotting libraries, but there's a payoff for the extra effort. Bokeh is designed both to allow you to create your own interactive plots on the web and to give you detailed control over how the interactivity works. I'll show this by adding a tooltip to the multi-bar plot I've been using in this series. It plots data from UK election results between 1966 and 2020.

  • Bruteforcing Emails Using a Simple Python Script

    Brute forcing is an essential part of hacking – it is the last resort, it offers hope and sometimes, it just works! Have you ever wanted to code a small script that would bruteforce email servers for you? It is imperative to remember that our brute forcing efforts are only as great as our password list, and as such, the list must be chosen with care. That said, first and foremost, we need to import the two modules we will need from Python.

  • Best Python Game Engines

    To write computer games (us oldies call them video games!), you may be wondering, “Where do I start?” To make a playable game in a decent timeframe while also learning how the program works, you will need a game framework. The framework creates many of the constructs that you will need for your games to function. You do not want to invent these yourself. These include how to draw anything to screen, how to detect a collision, and how to keep the score. Even making things move on the screen is complex without some underlying library. In this article, you will learn about which packages do what and how easy it is to get started on your game.

  • Week 1 Check-in

    During the community bonding period, i am working on the first step of my proposal. I have used shlex to split the shell script into tokens, and then find the seperator(&&|;) to concatenate the commands. After the review from my mentor, we find that we can improve the code. We do not need to split into tokens at first. Instead, we can directly find the seperator(&&|;) to seperate the commands. This will save a lot of time, since we are not going through every word in the shell script.

  • Backing up and restoring Zato Single Sign-On data

    This article presents a procedure for backing up all of Zato Single Sign-On (SSO) data and restoring it later on. A single Zato server with SQLite is used for simplicity reasons but the same principles hold regardless of the size of one's environment or the SQL database used.

  • Attrs, Dataclasses and Pydantic

    Attrs also adds a nice string representation, comparison methods, optional validation and lots of other stuff to your classes, if you want to. You can also opt out of everything; attrs is very flexible. Attrs became so popular, that since Python 3.7 we also have the dataclasses module in the standard library. It is predominantly inspired by attrs (the attrs team was involved in the design of data classes) but has a smaller feature set and will evolve a lot slower. But you can use it out-of-the box without adding a new requirement to your package.

Latest BlackArch Linux ISO Adds More Than 150 New Hacking Tools, Linux 5.6

Coming five months after the previous release, the BlackArch Linux 2020.06.01 ISOs are here packed with more than 150 new tools for all your penetration testing and ethical hacking needs. According to the team, this latest BlackArch Linux ISO a high-quality release, which means that all the included packages have been quality tested and numerous bugs were fixed, including missing dependencies. This is also the first BlackArch Linux release to ship with a newer kernel, namely Linux 5.6. The Linux kernel 5.6.14 is included in the ISO images for better hardware support. Read more

today's howtos

AMD EPYC 7F72 vs. Intel Xeon Gold 6258R - Latest EPYC Rome vs. Xeon Cascade Lake Benchmarks

Following the Xeon Gold 6250 vs. EPYC 7F32 benchmarks from earlier this month, here is a look at the latest x86_64 server CPUs we have our hands on with the EPYC 7F72 and Xeon Gold 6258R being benchmarked against a lineup of other competing AMD EPYC and Intel Xeon processors under the new Ubuntu 20.04 LTS. The EPYC 7F72 is the third and last product of the AMD EPYC 7Fx2 line-up to test for these high frequency SKUs. The EPYC 7F72 is a 24-core / 48-thread processor with a 3.2GHz boost and 3.7GHz boost frequency while having a 240 Watt TDP like the EPYC 7F52. While the EPYC 7F52 16-core CPU has a 256MB L3 cache, the EPYC 7F72 comes in at just 192MB. But this actually puts the EPYC 7F72 cheaper than the EPYC 7F52 at $2450 USD compared to $3100. Read more