Month: January 2025
A Fun Chat With Patrick Miller
Happy Saturday, all! I hope you’re having a lovely weekend. This week, I had a fun chat with a long time friend and colleague, Ampyx‘s Patrick Miller. We talked about one of my favorite tech topics – digital forensics in the weird and wacky world of critical infrastructure – where it’s growing, where it’s struggling,… Read More A Fun Chat With Patrick Miller
Hack The Box: Brutus Sherlock Challange – Very Easy Difficulty
Introduction to Brutus Challange I want to share some tips for approaching the Brutus challenge. Sherlock Scenario on Brutus Brutus is an entry-level DFIR challenge with two artifacts: auth.log and wtmp. The goal is to trace an SSH brute-force attack where the attacker cracks the root password. The attacker then reconnects, creates a new user, adds it […]
The post Hack The Box: Brutus Sherlock Challange – Very Easy Difficulty appeared first on Threatninja.net.
Power Projection PR Of The Day: H-6N "President Xi’s soft-power on display," Mid Air Refueling
PLA watchers have had a busy two months, with stealth fighters, new assault ships, and a new Y-20-based KJ3000 AWAC. However, one aspect is being overlooked: the "fully operational" status of the new H-6N air-launched ballistic missile carrier. With mid air refueling, those punch packing ALBM could reach-out-to-the-second-island-chain and touch someone.Fear not; judging by several
What We Know About CVE-2024-49112 and CVE-2024-49113
This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation.
IT Security Weekend Catch Up – January 3, 2025
Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy! For the less technical For the more technical …
Beijing slams US over potential Chinese drone ban
DefenceTalkChina said on Friday it would take “all necessary measures” in response to the United States announcing it was considering restrictions on commercial Chinese drones for national security reasons. On Thursday, the United States Co…
We Know Where You Parked: Massive Data Breach at VW Raises Questions about Vehicle Privacy
Already facing significant headwinds, VW has now been hit by a data protection nightmare. Location data from 800,000 electric vehicles and contact info from owners was accessible unprotected on the internet. And the company didn’t even know about it.
Artificial Intelligence and Deepfakes: The Growing Problem of Fake Porn Images
Thousands of women have been victimized by fake porn images created by artificial intelligence. The victims include minors, celebrities and politicians. DER SPIEGEL went searching for those behind the malicious platforms.
An Endgame in Ukraine
The incoming Trump administration will pick up the Ukraine dossier where the outgoing administration left it. As American leadership moves away from election rhetorics and back to the reality of governing, President Trump will attempt to bring the war in Ukraine to a negotiated resolution, but what that might look like is uncertain. The incoming […]
An Endgame in Ukraine was originally published on Global Security Review.