begasus, to random
@begasus@mastodon.social avatar

Finaly got setup again (thanks to ) on 32bit , now is on par again with latest release 1.212.0.1 for both 32bit and 64bit.

Releases should be in the depot for install later, meanwhile you can grab them from:

https://github.com/Begasus/CudaText-Haikuports/releases/tag/1.212.0.1

image/png

begasus, to random
@begasus@mastodon.social avatar

And it's live! :) 3.2 for 64bit can now be installed through our packagemanagers. Enjoy!

Prebuild binaries are also online at: https://codeberg.org/Begasus/Lazarus_Haiku (there is also a buildscript there that can build your local copy, you will need to have the and packages installed though. running "make LCL_PLATFORM=qt6" in the sourcetree for lazarus also works (you can change that to Qt5 also).

begasus, to random
@begasus@mastodon.social avatar

OK, while 32bit probably will have to be done through to get up and running, on 64bit switched build to and packaged it for , checking up with latest release still good! :D

SciPasTips, to random
@SciPasTips@fosstodon.org avatar
governa, to windows
@governa@fosstodon.org avatar

Hackers Exploited Kernel Flaw as Zero-Day in Recent Attacks

https://thehackernews.com/2024/02/lazarus-hackers-exploited-windows.html

SciPasTips, to random
@SciPasTips@fosstodon.org avatar

Issue /11 of Blaise Pascal Magazine: Machine-learning in with a convoluted neural network, stepping with the debugger, using Lazarus with and Visual Studio etc. https://blaisepascalmagazine.eu

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

North Korea’s Group is once again exploiting the notorious two-year-old Log4j vulnerability in a recently discovered global campaign using three previously unknown malware strains.
https://www.scmagazine.com/news/lazarus-group-uses-novel-malware-in-latest-log4j-campaign

securityaffairs, to hacking Italian
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Group's new campaign, Operation Blacksmith, utilizes Log4j exploits to deploy Remote Access Trojans (RATs), including NineRAT and DLRAT.

https://thehackernews.com/2023/12/lazarus-group-using-log4j-exploits-to.html

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

$10 million up for grabs in fight against North Korean hackers.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/10-million-up-for-grabs-in-fight-against-north-korean-hackers/

AlexandraB, to Cybersecurity Dutch
@AlexandraB@mastodon.social avatar
YourAnonRiots, to macos Japanese
@YourAnonRiots@mstdn.social avatar

Group's evolving cyber tactics target systems by combining elements from multiple campaigns (like RustBucket and KANDYKORN) for better effectiveness and to avoid detection.

https://thehackernews.com/2023/11/n-korean-hackers-mixing-and-matching.html

thenewoil, to Cybersecurity
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Group's sub-cluster, Sapphire Sleet, is now impersonating skills assessment portals in social engineering campaigns targeting IT job seekers.

https://thehackernews.com/2023/11/microsoft-warns-of-fake-skills.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 ALERT: BlueNoroff, linked to North Korea's Group, launches macOS called ObjCShellz. Learn about its use in RustBucket and how to protect your systems.

https://thehackernews.com/2023/11/n-korean-bluenoroff-blamed-for-hacking.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Watch out crypto investors and blockchain engineers: North Korea's hacker group is using new macOS malware for crypto and data theft.

https://hackread.com/lazarus-kandykorn-macos-malware-crypto/

jbzfn, to random
@jbzfn@mastodon.social avatar

⏳ Modern Pascal is Still in the Race
➥ Synopse Open Source
https://blog.synopse.info/?post/2022/11/26/Modern-Pascal-is-Still-in-the-Race

premartinpatrick, to random French
@premartinpatrick@mastouille.fr avatar

En exclu et uniquement pour aujourd'hui, mon fond d'écran Halloween... Ceux qui savent, savent !

Et toi, tu Pascal case ?

En téléchargement sur https://www.dropbox.com/scl/fi/bnhif2c2sqo1rjpo0frwq/RADStudio-PascalCase-Halloween-1920x1080.jpg?rlkey=ntaeq1gs0p29dj1zco7o9j9g3&dl=1

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 North Korea's Group strikes again. Discover how they hacked a software vendor using known security flaws.

https://thehackernews.com/2023/10/n-korean-lazarus-group-targets-software.html

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🇺🇸 🎰 Hackers that breached Las Vegas casinos rely on violent threats, research shows
➝ 🔓 🇺🇸 University of Michigan employee, student data stolen in
➝ 🔓 discloses security incident linked to breach
➝ 🇺🇸 Cyber attacks hit NY state operation, two Hudson Valley hospitals
➝ 🇺🇸 🗳️ D.C. Board of Elections: Hackers may have breached entire voter roll
➝ 🔓 🇮🇪 Thousands of drivers have sensitive data exposed to hackers in major IT
➝ 🇷🇺 📨 Pro-Russia hackers target inboxes with in webmail app used by millions
➝ 🇫🇷 🇷🇺 says Russian state hackers breached numerous critical networks
➝ 🇳🇬 Nigerian Police dismantle recruitment, mentoring hub
➝ 🇵🇸 💸 donation scams emerge amid Israel-Hamas war
➝ 🇪🇸 👮🏻‍♂️ arrests 34 who stole data of 4 million people
➝ 🇨🇦 🇨🇳 : Lawmakers Targeted by China-Linked ‘’ Disinformation
➝ 🇺🇸 🇷🇺 Ex-NSA Employee Pleads Guilty to Leaking Classified Data to
➝ 🦠 🇰🇵 N. Korean Group Targets Software Vendor Using Known Flaws
➝ 🦠 🇮🇷 Iranian Group Launches New Wave of IMAPLoader Attacks
➝ 🦠 🪰 malware framework infects 1 million , hosts
➝ 🦠 📱 Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation
➝ 🔓 📱 Galaxy S23 hacked two more times at Toronto
➝ 🔓 Critical Flaws Uncovered in , , and Platforms
➝ 🔓 🩺 Critical Flaw in NextGen's Mirth Connect Could Expose Data
➝ 🔓 Warns of Critical Remote Code Execution Vulnerability in BIG-IP
➝ 🔓 🍏 Hackers can force iOS and browsers to divulge and much more
➝ 🩹 warns admins to patch CVE-2023-4966 bug immediately
➝ 🔓 ✌🏻 Finds Second Zero-Day as Number of Hacked Devices Apparently Drops
➝ 🔓 Critical RCE flaws found in access audit solution

📚 This week's recommended reading is: "Click Here to Kill Everybody: Security and Survival in a Hyper-connected World" by Bruce Schneier

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-432023

YourAnonRiots, to Korean Japanese
@YourAnonRiots@mstdn.social avatar

🚨 hacking group Group targets defense industry and nuclear engineers with fake job interviews, using trojanized VNC apps to steal data and execute commands.

https://thehackernews.com/2023/10/lazarus-group-targeting-defense-experts.html?m=1

taylorparizo, to random

Another way of implementing BYOVD to evade EDRs. MATA, linked to Lazarus, uses CallBackHell as a LPE exploit against CVE-2021-40449 to either execute with SYSTEM privileges or wipes pointers to kernel callback routines related to process/thread creation within specific drivers. Endpoint security products are then unable to monitor specific behavior.
If a system patched that vulnerability, a second tool is used. This one takes two arguments: a driver file path and antivirus name to target. The driver used is ene.sys, developed by ENE Technology.

It is becoming increasingly common to pair "EDR Evasion" with "BYOVD"

https://securelist.com/updated-mata-attacks-industrial-companies-in-eastern-europe/110829/

YourAnonRiots, to cryptocurrency Japanese
@YourAnonRiots@mstdn.social avatar

laundering hits $7 BILLION 💰

Report reveals Group, tied to North Korea, involved in $900 million cross-chain bridge laundering spree. As mixers face scrutiny, crypto criminals shift tactics.

https://thehackernews.com/2023/10/north-koreas-lazarus-group-launders-900.html

techbites, to security

The Lazarus Group, a cybercrime gang associated with the North Korean government, has been identified as the perpetrator of an attack on a Spanish aerospace firm. This attack utilized a new piece of malware called "LightlessCan." The hackers posed as recruiters from Meta (formerly Facebook) on LinkedIn, offering coding challenges that, when downloaded and printed, triggered a payload and installed the malware. ESET, a cybersecurity firm, believes the goal of the attack was espionage. LightlessCan is an upgraded version of a previously used remote access Trojan known as BlindingCan, featuring 68 commands, although only 43 appear to be implemented. The malware can mimic Windows commands and execute them discreetly, making it harder to detect.

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Caution! 🚨 Recruiters on LinkedIn offering your dream job might just be Lazarus turning it into a nightmare!


https://www.hackread.com/lazarus-exploit-linkedin-spanish-aerospace-firm/?s=09

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • thenastyranch
  • tacticalgear
  • ethstaker
  • InstantRegret
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • Youngstown
  • mdbf
  • khanakhh
  • slotface
  • rosin
  • provamag3
  • kavyap
  • everett
  • cisconetworking
  • Durango
  • modclub
  • osvaldo12
  • tester
  • Leos
  • cubers
  • normalnudes
  • megavids
  • anitta
  • lostlight
  • All magazines