How to force a Bluetooth connection to someone else’s phone?

Couldn’t find a way to forcefully connect to someone’s phone through Bluetooth? I was thinking of spoofing but the amount of data that you have to spoof seems fairly large and that would only work for one device that they have already connected too. Ha…

Avast researchers released a free BianLian ransomware decryptor for some variants of the malware

Antivirus firm Avast released a free decryptor for the BianLian ransomware family that allows victims to recover locked files. Security firm Avast has released a free decryptor for the BianLian ransomware to allow victims of the malware to recover locked files. The BianLian ransomware emerged in August 2022, the malware was employed in attacks against organizations in […]

The post Avast researchers released a free BianLian ransomware decryptor for some variants of the malware appeared first on Security Affairs.

Experts spotted a backdoor that borrows code from CIA’s Hive malware

Netlab 360 observed unidentified threat actors using a new backdoor based on the US CIA’s Project Hive malware suite. Researchers from Qihoo Netlab 360 reported that unidentified threat actors using a new backdoor based on the US CIA’s Project Hive malware suite. “Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated […]

The post Experts spotted a backdoor that borrows code from CIA’s Hive malware appeared first on Security Affairs.

Over 6000 Norton LifeLock affected by a data breach

Thousands of customers of Norton LifeLock have been affected by a data breach that compromised their accounts. The attacks enabled the threat actors to access customer password managers according to the details revealed by Gen Digital, the parent compa…

See the details of CVE?

I’ve been experimenting with a few systems on my home network to learn more about OS design. I’m a software engineer by classical training, and lately I’ve been thinking about trying to contribute to some Linux distros / GNU applications. I thought understanding vulnerabilities would be a good way to understand what NOT to do (vulnerabilities on all platforms btw. Understanding what not to do for windows systems or ios or Android is also applicable to Linux, imo).

However, while it’s really easy to look up CVEs in databases, I’ve had a lot of trouble actually finding the details of how to recreate the exploit at home. Where can I see this info?

submitted by /u/Zephos65
[link] [comments]

Cybercheft HEX XOR

I want to XOR a HEX input, with a HEX XOR key, but it seems to always take ASCII as input. For instance, I want to XOR 0C with 0C. This should lead to 0, but I end up with <0. Is there a way to have Cyberchef take the input the same as the key type?…