2FA phishing
A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

There was an interesting article published about Bing’s AI chat bot using a LLM (Large Language Model) this weekend in the New York Times. A clear recommendation for reading:Why a Conversation With Bing’s Chatbot Left Me Deeply Unsettled – The New York Times
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) ⚡ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. ❗ If you find a USB stick somewhere: Do not plug it into…
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers. Link to article of German newspaper “Die Zeit” (08.10.2022)
Are the bad guys using AI? They might! AI tools like ChatGPT or DALL-E-2 are currently widely tested out on the internet – both for the good as well as for the bad. From my point of view, we are at the very beginning of an interesting development, which will unfold over the next couple…
The newly discovered xz-utils backdoor, which was published yesterday (NVD – CVE-2024-3094 (nist.gov)) also affects one of the Linux distributions most used by penetration testers: Kali Linux. ❗Make sure, that you are updating your Kali installations as fast as possible, especially when you updated them before in the time frame between 26.03.2024 and 29.03.2024. 💡For…
Enjoy the Easter weekend!If you haven’t done yet, this weekend could be an opportunity to update your passwords / authentication methods. Remember those 3 basic measures: