2FA phishing
A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

πΈ How good are you at recognising AI-generated people? β Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: π Which Face Is Real?π thispersondoesnotexist.com
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) β‘ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. β If you find a USB stick somewhere: Do not plug it into…
π¬ MITRE CVE list might go offline today! This would be catastrophic for global vulnerability management. What I’ve described as a scenario theoretically possible in How Trump 2.0 could affect the IT industry in Europe might become reality more quickly than I’ve thought and not on the NIST-NVD level, but on the MITRE level including…
New MS Exchange zero-day: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2022/2022-258168-1032.html
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
The newly discovered xz-utils backdoor, which was published yesterday (NVD – CVE-2024-3094 (nist.gov)) also affects one of the Linux distributions most used by penetration testers: Kali Linux. βMake sure, that you are updating your Kali installations as fast as possible, especially when you updated them before in the time frame between 26.03.2024 and 29.03.2024. π‘For…