Defcon conference 202212/30/2023 ![]() Virtru reveals encrypted period-tracking app prototype Write to us via our Tor-based tip line: /28BgYXYRy2 To the guy in the photo: Imagine how many cool hats you could buy with $10 million dollars! Government reveals the face of a Conti associate for the first time! We’re trying to put a name with the face! government has publicly identified a Conti operative. The reward is offered as part of the State Department’s Rewards for Justice (RFJ) program, which on Thursday shared an image of a known Conti ransomware operator known as “Target,” marking the first time the U.S. Department of State, which used the opportunity to announce a $10 million reward for information leading to the identification and location of five alleged members of the notorious Russia-backed Conti ransomware gang. ![]() unmasks alleged Conti ransomware operativeĪlso making a surprise appearance was the U.S. Zhora, who serves as deputy chairman of Ukraine’s State Service of Special Communications and Information Protection, revealed that cyber incidents in the country have tripled since Russia’s invasion in February, adding that Ukraine had detected more than 1,600 “major” cyber incidents so far in 2022, including the discovery of the Industroyer2 malware that can manipulate equipment in electrical utilities to control the flow of power. Victor Zhora, Ukraine’s lead cybersecurity official, made an unannounced visit to Black Hat, where he spoke to attendees about the state of cyberwarfare in the country’s conflict with Russia. Ukraine’s cyber chief makes surprise appearance Slides with full details & PoC exploit: #0day /9dW7DdUm7P ![]() Was stoked to talk about (& live-demo □) a local priv-esc vulnerability in Zoom (for macOS). Mahalo to everybody who came to my talk "You're M̶u̶t̶e̶d̶ Rooted" □□ Following his talk, SpaceX responded with a six-page paper explaining how it secures its systems along with a firmware update that “makes the attack harder, but not impossible, to execute.” Wouters revealed the vulnerability to SpaceX last year, earning his place in the company’s bug bounty hall of fame. Belgian security researcher Lennert Wouters took to the stage at Black Hat on Thursday to showcase how he was able to hack StarLink’s user terminals - referred to as “ Dishy McFlatface” by Elon Musk’s SpaceX employees - using a homemade circuit board, or “modchip.” This gadget permits a fault injection attack that bypasses Starlink’s security system and allows access to control functions that Starlink had intended to keep locked down. ![]() Starlink hacked with $25 homemade modchipĪ cybersecurity researcher revealed it’s possible to hack into Starlink terminals using a $25 device. We’ve rounded up some of the best announcements from the two shows. This meant that amid the mask confusion and subsequent influx of positive tests, there was a lot for the hacking community to catch up on. This year’s cyber gathering was particularly exciting: Not only did it mark Black Hat’s 25th anniversary, but also the first time since the start of the pandemic that attendees have fully returned to the carpeted hallways of the popular security conferences. Hackers, researchers, cybersecurity companies and government officials descended on Las Vegas last week for Black Hat and Def Con, a cybersecurity double-bill that’s collectively referred to as “hacker summer camp.”
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |