am I screwed or is there hope

My Google account got hacked last year. My buddy ga e away the phone I bought him which had my Google account on it so he could play my Google play games. Well the guy he gave the phone to changed my recovery email and phone number. Now I could easily prove I own this account. I have years worth of photos of me and my family and friends. I have gps history and card numbers and all that but Google won’t give me any recovery options other than enter recovery email or phone number. What’s the odds of hiring someone to get me back in my account? I would love my.photos back

submitted by /u/justsomeguywhogames
[link] [comments]

How do you hack a printer? serious artistic inquiry

Hello! Im an artist so I dont really have experience with tech/coding. I want to continuously print on a moebius strip of paper, so somehow i must override the printers sensor so it just keeps flowing. I still havent bought the model of printer (sugges…

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals…
The post AsyncRAT Analysis with ChatGPT appeared first on Quick Heal Blog | Latest computer security news, tips, …

US Cyber Command Operations During the 2022 Midterm Elections

The head of both US Cyber Command and the NSA, Gen. Paul Nakasone, broadly discussed that first organization’s offensive cyber operations during the runup to the 2022 midterm elections. He didn’t name names, of course:

We did conduct operations persistently to make sure that our foreign adversaries couldn’t utilize infrastructure to impact us,” said Nakasone. “We understood how foreign adversaries utilize infrastructure throughout the world. We had that mapped pretty well. And we wanted to make sure that we took it down at key times.”

Nakasone noted that Cybercom’s national mission force, aided by NSA, followed a “campaign plan” to deprive the hackers of their tools and networks. “Rest assured,” he said. “We were doing operations well before the midterms began, and we were doing operations likely on the day of the midterms.” And they continued until the elections were certified, he said…

French rugby club Stade Français leaks source code

Prestigious club Stade Français potentially endangered its fans for over a year after leaking its website’s source code. Stade Français is a professional rugby union club based in Paris. Founded in 1883 and competing in France’s premier rugby league, Top 14, it has established itself as one of the most successful teams in the country, […]

The post French rugby club Stade Français leaks source code appeared first on Security Affairs.

DragonSpark threat actor avoids detection using Golang source code Interpretation

Chinese threat actor tracked as DragonSpark targets organizations in East Asia with a Golang malware to evade detection. SentinelOne researchers spotted a Chinese-speaking actor, tracked as DragonSpark, that is targeting organizations in East Asia. The attackers employed an open source tool SparkRAT along with Golang malware that implements an uncommon technique to evade detection. “The threat […]

The post DragonSpark threat actor avoids detection using Golang source code Interpretation appeared first on Security Affairs.

use dns tunneling to bypass sensorships

Can anyone explain how can i bypass my country sensorship using dns tunnling. I know something about dns tunneling in theory but i dont know how to perform it. submitted by /u/Wrong_Incident_4722 [link] [comments]