Security Leftovers
-
University of Michigan ☛ Michigan Medicine email breach exposes patient health information
Michigan Medicine alerted 57,891 patients Sept. 26 of a potential breach of their health information as the result of a July 30 cyberattack. In a press release, Michigan Medicine explained that an employee fell victim to a fraudulent multifactor authentication prompt, granting the attacker access to the contents of their email.
-
Scoop News Group ☛ Agencies warn about Russian government hackers going after unpatched vulnerabilities
The SVR is conducting its targeting both specifically and broadly, the U.S. and U.K. cyber agencies said.
-
Bryan Lunduke ☛ Internet Archive Got Hacked... and Did Nothing When Told About It
All sufficiently popular, complex systems will get hacked.
-
Medevel ☛ The Internet Archive Under Attack, Again!!!
In recent months, the Internet Archive, a vital digital library and cultural preservation tool, has come under attack on two fronts: increased hacking attempts and legal challenges.
-
Medevel ☛ Passy: Your Reliable Offline Password Manager with Seamless Synchronization that Works on Android
A password manager is essential for securely storing and managing passwords, payment information, notes, and personal identities.
[...]
GPL-3.0
-
Forbes ☛ Microsoft Warns Millions Of backdoored Windows Users—Change Your Browser As New Attacks Underway
While there is a case for Edge over Chrome with regards to malware protection, it feels somewhat askew for a Microsoft product that competes with Chrome to be recommended in a security advisory for a CVE disclosed by Microsoft, now riding a wave of Chrome generated publicity.
-
Medevel ☛ Wifiphisher: Your Ultimate Tool for Wi-Fi Security Auditing and Phishing Simulation
Wifiphisher is an advanced Wi-Fi security tool that automates phishing attacks against Wi-Fi networks to obtain credentials or infect devices with malware. It works by performing man-in-the-middle attacks by creating rogue access points, allowing attackers to capture credentials or deploy malware without needing brute-force methods. [...] GPL-3.0 License
-
Scoop News Group ☛ Lawmakers press agencies, telecoms for more details on Salt Typhoon hacks
On Thursday, Republican and Democratic leaders on the House Energy and Commerce Committee wrote to the three telecommunication firms asking for more information on their response, calling the incident “extremely alarming for both economic and national security reasons.”
-
Scoop News Group ☛ CISA advisory committee approves four draft reports on critical infrastructure resilience
Each report includes recommendations for the cyber agency to tackle, with the overarching goal of combating threats from China.
-
Medevel ☛ Wifipumpkin3 is a Free Powerful Rogue Access Point Attack Framework for Pentesters
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
-
Medevel ☛ Pixiewps - Free App that Enables you to Test Your Wifi WPS PIN Security
Pixiewps is an open-source tool written in C designed to perform offline brute-force attacks on WPS (Wi-Fi Protected Setup) PINs by exploiting vulnerabilities in some software implementations.
-
Medevel ☛ Bluepot - A Free Bluetooth Honeypot for Pentesters and Security Researchers
Bluepot is free and open-source Bluetooth honeypot framework designed for security research and penetration testing. It creates multiple virtual Bluetooth devices, simulating vulnerable endpoints to attract attackers.
-
Medevel ☛ 22 Free Open-source Port Scanner for Pentesters and Cybersecurity Experts
A port scanner is a network tool used to identify open or accessible ports on a device, server, or network. It sends requests to a target’s various ports and analyzes the responses to determine which ports are open and what services are running on them.
-
Medevel ☛ 13 Network Vulnerability Scanners and Pentesting Tools for Pentesting, Test Your Wifi Network Now
Pentesters, security researchers, and business owners must ensure the security of their Wi-Fi networks to protect sensitive data and prevent unauthorized access. Testing your network helps identify vulnerabilities that could be exploited by attackers, ensuring your system remains secure.
-
Medevel ☛ All In One Hacking Tool May Be the Most Popular Pentesting and Hacking tools out there
HackingTool is one of the most popular pentesting and hacking toolkits available, widely used by hackers, pentesters, and security experts.
-
Medevel ☛ NetRadar is a free and open-source tool to Scan and Report about Your Network
NetRadar, developed by XDeadHackerX, is a powerful network discovery tool designed to make network reconnaissance and monitoring effortless. It provides a simple yet effective solution for identifying devices on a local network and gathering key information about them.
-
PCLOS Official ☛ PCLinuxOS: Today’s Update
thunderbird-128.3.1qt5pas-2.15.lazarus3.6wireshark-4.4.1clang-19.1.1-2qt-creator-14.0.2-2microsoft-edge-browser-129.0.2792.79-1opera-browser-114.0.5282.86-1firefox-131.0.2-1
-
Bruce Schneier ☛ IronNet Has Shut Down
After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time while still in the military. That always troubled me. Whatever ideas he had, they were developed on public time using public resources: he shouldn’t have been able to leave military service with them in his back pocket.
-
Diffoscope ☛ Reproducible Builds (diffoscope): diffoscope 280 released
The diffoscope maintainers are pleased to announce the release of diffoscope version
280
. This version includes the following changes:* Drop Depends on deprecated python3-pkg-resources. (Closes: #1083362)