Royal Mail ransomware attackers threaten to publish stolen data

Postal service has been unable to send letters and parcels overseas since Wednesday due to hackingRoyal Mail has been hit by a ransomware attack by a criminal group, which has threatened to publish the stolen information online.The postal service has r…

Can a hardware manufacturer track it’s devices?

Hypothetically, if someone would order a windows laptop from the manufacturer, which got lost for 2 months in the shipping, and they would have retrieved the money back that they paid for it, and then it would show up one day and they don’t mention this to the company; could the company find out that they are now using it, while keeping the refund? Do modern laptops have some kind of tracking that allows the manufacturer to track it’s product? And i don’t mean the windows finder function, that would be disabled, but the hardware. Could this person get in trouble, hypothetically?

submitted by /u/Hosentaschen_Mike
[link] [comments]

Ducky script/snippet to send a sequence of modifier keys?

Hey!, not sure if this is the right place to post this question but some googling around pointed me to this forum so hopefully someone can point me in the right direction.

I have a KVM that is controlled by a sequence of keys and I want to try to automate its use (by integrating it with Home Assistant). Following this project here I managed to get a Ducky-like device that can receive commands from a network. When I connect it to my computer it works perfectly. All good so far.

What I can’t figure out however is how to send sequence of modifier keys. The one I’m trying to mimic is hitting left control -> Releasing -> Left control again -> Release -> A number from 1 to 4.

All the examples I can find are about holding modifier keys while pressing something else or how to send just the Windows key without anything else but can’t figure out how to script the sequence I need.

Any ideas?.

submitted by /u/Laucien
[link] [comments]

Critical bug in Cisco EoL Small Business Routers will receive no patch

Cisco warns of a critical flaw in small business RV016, RV042, RV042G, and RV082 routers, which have reached end of life (EoL). Cisco is warning of a critical vulnerability, tracked as CVE-2023-20025 (CVSS score of 9.0), that impacts small business RV016, RV042, RV042G, and RV082 routers. The IT giant announced that these devices will receive no security […]

The post Critical bug in Cisco EoL Small Business Routers will receive no patch appeared first on Security Affairs.

Is there phones who call without a sim card

So i am looking to find a device, that can call normally without a sim card, and that is also able to set custom caller id (so i can call as somebody else) Btw i am not looking to do anything illegal or harmful with such a device, all i am asking for i…

Hiding text in files

Awhile back I was looking at some malicious stuff that showed up on someone’s server and one of the tricks they did was to hide a bunch of javascript in template files. If you catted the file or viewed it in nano you saw nothing. View it in vi and poof, bunch of malicious code.

Thought it was kind of cool but didn’t take notes or keep samples. Year later I find a need for this for a project. Google searches were somewhat unhelpful since all manner of stupid stuff matches.

Anyone know what the method is called so I can do more research?

submitted by /u/FantasticThing359
[link] [comments]

Threat actors actively exploit Control Web Panel RCE following PoC release

Threat actors are actively exploiting a recently patched critical remote code execution (RCE) vulnerability in Control Web Panel (CWP). Threat actors are actively exploiting a recently patched critical vulnerability, tracked as CVE-2022-44877 (CVSS score: 9.8), in Control Web Panel (CWP). The exploitation attempts began on January 6, 2023, after a proof-of-concept (PoC) exploit code was published […]

The post Threat actors actively exploit Control Web Panel RCE following PoC release appeared first on Security Affairs.

would this work?

imagine having to pentest a data center , you notice theyr routers are not secure , so you use log4j or some other exploit to get access to them , now that you have router access how would you modify the dns adress of example.com that the servers recei…

Threat actors claim access to Telegram servers through insiders

Researchers reported that a threat actor claims to provide access to internal servers at Telegram for $20,000. SafetyDetectives reported that a member of a dark web marketplace is claiming to provide access to internal servers at Telegram for $20,000. The seller claims that the access is permanent because is provided by insiders that are staff […]

The post Threat actors claim access to Telegram servers through insiders appeared first on Security Affairs.