![]() ![]() But Altaf Shaik, a researcher at the Technical University of Berlin, said these 5G networks could also present new security challenges. “Basic” security flaws create major 5G risksĥG commercial networks are starting to roll out, promising exciting new use cases like automated cars, more intelligent healthcare and smart sensor networks. SecureCycle, built by a team of Virtru employees in three days during a recent company hackathon, leverages open source end-to-end encryption offered by OpenTDF and will notify the data owner if any third party attempts to access their data. In response, Virtru, best known for its email encryption service for enterprises and consumers, showcased a prototype period-tracking app at Def Con that claims to give users complete control of their private information. Wade sparked fears that period and ovulation-tracking apps could be used to prosecute people who seek an abortion or medical care for a miscarriage and those who assist them. Virtru reveals encrypted period-tracking app prototype Write to us via our Tor-based tip line: /28BgYXYRy2 To the guy in the photo: Imagine how many cool hats you could buy with $10 million dollars! Government reveals the face of a Conti associate for the first time! We’re trying to put a name with the face! government has publicly identified a Conti operative. The reward is offered as part of the State Department’s Rewards for Justice (RFJ) program, which on Thursday shared an image of a known Conti ransomware operator known as “Target,” marking the first time the U.S. Department of State, which used the opportunity to announce a $10 million reward for information leading to the identification and location of five alleged members of the notorious Russia-backed Conti ransomware gang. unmasks alleged Conti ransomware operativeĪlso making a surprise appearance was the U.S. Zhora, who serves as deputy chairman of Ukraine’s State Service of Special Communications and Information Protection, revealed that cyber incidents in the country have tripled since Russia’s invasion in February, adding that Ukraine had detected more than 1,600 “major” cyber incidents so far in 2022, including the discovery of the Industroyer2 malware that can manipulate equipment in electrical utilities to control the flow of power. Victor Zhora, Ukraine’s lead cybersecurity official, made an unannounced visit to Black Hat, where he spoke to attendees about the state of cyberwarfare in the country’s conflict with Russia. Ukraine’s cyber chief makes surprise appearance Slides with full details & PoC exploit: #0day /9dW7DdUm7P Was stoked to talk about (& live-demo □) a local priv-esc vulnerability in Zoom (for macOS). Mahalo to everybody who came to my talk "You're M̶u̶t̶e̶d̶ Rooted" □□ Following his talk, SpaceX responded with a six-page paper explaining how it secures its systems along with a firmware update that “makes the attack harder, but not impossible, to execute.” Wouters revealed the vulnerability to SpaceX last year, earning his place in the company’s bug bounty hall of fame. ![]() Belgian security researcher Lennert Wouters took to the stage at Black Hat on Thursday to showcase how he was able to hack StarLink’s user terminals - referred to as “ Dishy McFlatface” by Elon Musk’s SpaceX employees - using a homemade circuit board, or “modchip.” This gadget permits a fault injection attack that bypasses Starlink’s security system and allows access to control functions that Starlink had intended to keep locked down. Starlink hacked with $25 homemade modchipĪ cybersecurity researcher revealed it’s possible to hack into Starlink terminals using a $25 device. We’ve rounded up some of the best announcements from the two shows. ![]() This meant that amid the mask confusion and subsequent influx of positive tests, there was a lot for the hacking community to catch up on. This year’s cyber gathering was particularly exciting: Not only did it mark Black Hat’s 25th anniversary, but also the first time since the start of the pandemic that attendees have fully returned to the carpeted hallways of the popular security conferences. Hackers, researchers, cybersecurity companies and government officials descended on Las Vegas last week for Black Hat and Def Con, a cybersecurity double-bill that’s collectively referred to as “hacker summer camp.” ![]()
0 Comments
Leave a Reply. |