Admin login

Stacey is a lightweight content management system.

2012.04.21 16:42 pixel7000 Stacey is a lightweight content management system.

[link]


2011.10.19 14:11 MacSysAdmin

A subreddit for all things related to the administration of Apple devices.
[link]


2008.10.22 04:41 Sysadmin

A reddit dedicated to the profession of Computer System Administration.
[link]


2024.05.19 00:26 Latter-Loan7376 MacBook Pro 2010 admin login not accepting user name and password information.

I know my username and password of this MacBook Pro 2010 but it won’t let me make changes in Users and groups or energy saver. I type the admin name and password but it keeps rejecting it. I wanted to change my user. Is there anyway to bypass this? I already tried changing my password and I still get the same result.
submitted by Latter-Loan7376 to macbookpro [link] [comments]


2024.05.18 23:05 13hoot DS1821+ Login issues

DS1821+ Login issues
So I got a mail to update certain packages. I used the app to update the package on my phone and after that I started getting the error "You're not authorised to use this service". When I tried to login with my user name (admin account) the blue circle after entering the password kept on going on and on. I tried through quickconnect and it would throw me back at the user name page. A few Google searches later I was down on my knees with a pin in my hand and did the "1 beep" reset.
Next I found the nas (different IP address) and did what was suggested
User name > admin PW field (blank)
I'm still unable to login. The blue circle is still going on spinning.
submitted by 13hoot to synology [link] [comments]


2024.05.18 22:11 CthulhuDev Jackett ne marche plus avec ygg ?

Jackett ne marche plus avec ygg ? submitted by CthulhuDev to yggTorrents [link] [comments]


2024.05.18 20:29 metalzero24 I can't login to my account, horrible experience after using Tailscale for 2 years

I've been using Tailscale for 2 years, I use it on all of my laptops, my phone, etc.
Yesterday I noticed some connectivity problems on my phone, then I noticed that I cannot login to my admin panel (SSO provider GitHub). I tried logging out of my desktop client and logging back in, that completely locked me out of my Tailnet. When I try to login (after tailscale opens up the browser window) I get this error:
internal server error REQ-10a0d1f0d-8118-472e-8647-9c4e3a72d52d 
After 24 hours I still cannot login to my Tailnet on any of the platforms, Windows, Mac, iOS anything.
I contacted Tailscale support immediately after this happened. After 24 hours I still don't have any responses.
I saw the support page about responding to Premium users in 4 hours, I want to buy premium to get faster support but SINCE I CANNOT LOGIN, I can't. I marked my ticket severity 1 and I am still waiting after more than 24 hours.
I didn't change any GitHub settings or Tailscale settings before this happened. Other SSO logins work with my GitHub account. Any tailscale employees here?
submitted by metalzero24 to Tailscale [link] [comments]


2024.05.18 19:37 Hampzz99 Detailed Setup Guide - Host/Join Nitrox Server

Hello! I thought I'd make a detailed guide on how to setup and host/join a server since there seems to be a lack of proper detailed guides out there.
You cannot play multiplayer unless you have the game on STEAM.
Installtion of Nitrox
  1. Download Nitrox - https://nitrox.rux.gg/
  2. Go to Options and make sure that it's pointing to your Subnautica installation
  3. Go to Steam -> Right click Subnautica -> Properties -> Betas -> And choose Legacy in the dropdown menu. This will start a download of all old files and game versions.
Hosting A Server for your friends with Port Forwarding
  1. Open the Command Prompt (CMD) and type ipconfig . This will display your PC and Routers IP Addresses.
  2. To Port forward from your own Network put the Default Gateway address into your Webbrowser's Search bar. You will now need to Login which is usually with the username admin and then the Wi-Fi password that's underneath your Router, yes the long one with numbers and letters.
  3. Click on Port Forwarding -> Add New/Enable -> Enter an ID or Name for it, this can be whatever you want
  4. Enter all the details needed, for example:
Name Protocol Ext.Port Internal IP Int.Port
whateverYouwant UDP 11000 your IPv4 address you got when writing ipconfig in the cmd any number between 1-65535 , for example 1105
  1. Save changes / Apply.
  2. Go to the Nitrox Launcher -> Sever -> External Console -> Start Server
  1. Go back to Play Game -> Play Multiplayer.
  2. Once you're in go to Multiplayer -> Add Server.
  3. Enter all the details needed, for example:
Name Host Port
whateverYouWant your IPv4 address 11000
  1. Connect to the server.
  2. Your friend can now connect to your server by -> Adding the server in the game using the Public IP address and port 11000
  3. Enjoy :)
Hope this helped someone out there :)
submitted by Hampzz99 to SubnauticaNitrox [link] [comments]


2024.05.18 18:50 GearsDoesRedstone My unban appeal.

For refrences, my IGN is gearsgameriscool.
So, I dont rember all thje details, they are sorta fuzzy. Ive kinda moved on from minecraft at this point, alough, I cannot seem to login and am banned. I rember when I was a child many years back, I logged on, and I kinda griefed a synergy biuld. Unfortunatley, my sister wanted to see what I was doing, and for some reason another account joined with my ip, which seemed to be wierd I have no clue who that was. Anyways, Lunalulane is my sister's account I told her to join, and we use a home network. Unforutnatley, we both got banned, beacuse, to your perspective, I was alt abusing, which is completley understandable. If you unban me, i can return said items, fix the base if it already hasnt moved on. I want to return ~4 year old items to thier rightfull owners. I just want to know if this is cleared up. As for my main, it is still banned. I have moved on, but I have work to finished, I have changed as a person, I would just like to return the items, and maybe you can just remove acsess to survival(if aplicable) I have ADHD and Autism (which in the past has made me act impusivley, which Is why I got banned, yeah :/). I just want to give those lost items back to thier owners.
My wrongs have been wronged, and I want, finally, to return these items. If you don't trust me, you can have an admin just kill my player and return the items that way. I just want to set wrongs right.
I want to join minecraft, and the redstone community as a whole. Its a childhood game I used to love doing. Its for nostalgia.
I also remeber when that one redstone server, I think it was called openredstone or something, got shut down.
Edit, Hardfg is a mod wait WHAT??? (why is that name sound so farmiliar, do I know Hardfg???)
Thank you for reading, and your time. - E
submitted by GearsDoesRedstone to SynergyServer [link] [comments]


2024.05.18 15:31 CautiousXperimentor Privacy on macOS and iOS through encryption: how long should a login password be?

Hello, dear Privacy users
I’ve been using encrypted devices for the last few years to protect my privacy against whoever might end up having or getting my devices in the future, because they steal them, or me just dying, which will certainly happen one day.
 
So, I know my devices are encrypted, namely my Mac (Monterey) has its internal SSD encrypted with FileVault 2.0, with a 20-25 long encryption key that FileVault generates. However, the login password I use is rather short, just like on my iPhone and iPad: 6 characters long.
On my iOS devices, that’s a number code, but let’s focus on my Mac for now, which has an alphanumeric one. I know a 6 character login password is very easy to crack. However, I also know macOS has measures implemented in order to prevent brute force attacks on the login screen.
I’ve been told that through external devices, that admin password can be cracked, but isn’t the internal hard drive encrypted with that long FileVault key? Should I use a long login/admin password on macOS as well? What should be the minimum of characters? Because that’s a password we Mac users type quite often, and it can be a hassle each time the Mac goes into sleep. By the way, mine is an Intel Mac without a T2 security chip.
In case my login password should be at least 12 characters long, can it be a repetition of a word? Or should it be different words? Is it much more secure to put in numbers, or not necessarily? Can a dictionary be used to decode the passphrase? I don’t think I can remember long series of random letters…
 
As for iOS, it is pretty convenient to have a 6 digit numeric code, however, I’m afraid it is equally vulnerable against a brute force attack, right?
 
Finally, would you choose to store all your external SSD encrypted passwords on your Mac, so that you no longer need to type them each time you plug the drive in? I know anyone with access to my Mac could have access to those external drives, that’s why I want to improve my Mac privacy strengthening the login password.
I’m gonna format the computer and now seems like an appropriate moment to implement a longer password/passphrase, if that’s necessary to keep my privacy safe.
submitted by CautiousXperimentor to privacy [link] [comments]


2024.05.18 13:47 Roockynoto My Yubikeys work only in DSM.

Hello everyone.
I decided to protect my user and admin login of my synology with yubikey (as a second factor, no passwordless).
It works perfectly on the DSM admin interface, but when I want to connect to Synology Photo, File Station or Drive, via their web interface (I have a custom domain in the NAS), after having put my username and my password, it asks me for a 2FA (TOTP that I kept or the security key), and when I choose security key my browser tells me that it does not know it.
But, when I connect with the same user but on the DSM interface, I have no issue, my security key is valid.
Do you know why I have two different behaviors with the same configuration?
Thank a lot !
submitted by Roockynoto to synology [link] [comments]


2024.05.18 12:59 Original_Ad_9682 Changing Your Linksys Router Password

As our lives become more and more dependent on the internet in today's connected world, protecting our home networks is essential. By controlling the data flow between your devices and the internet, your Linksys router serves as the entry point to your digital world. Resetting your Linksys router's default password is an essential first step in protecting your network. To improve the security of your home network, we'll walk you through the process of Changing Your Linksys Router Password in this guide.

Simple Steps for Using a New Admin Password to Secure Your Linksys Router

It is necessary to log into the user interface in order to modify the password for the Linksys router. Enter the admin panel using the default IP address, password, and login. Here are the instructions for updating the Linksys router password:
The above steps outline how to change the password on your Linksys router. Once the password has been changed, you can use it to log in. Moreover, we will describe the procedure

It Only Takes Minutes to Change the WiFi Password on Your Linksys Router

You must log into the web interface of the router in order to change the WiFi password. You have total control over the router's settings with this interface. The following actions are necessary to update the WiFi password:

Simple Steps for Using a New Admin Password to Secure Your Linksys Router

It is necessary to log into the user interface in order to modify the password for the Linksys router. Enter the admin panel using the default IP address, password, and login. Here are the instructions for updating the Linksys router password:
submitted by Original_Ad_9682 to u/Original_Ad_9682 [link] [comments]


2024.05.18 11:28 Jazza23 Stored XXS not working - Hack Your First Web App: Ep.6 — Taking the Lead

This question is driving me insane!
I am referencing the forum where people have commented on issues with the same question.
https://www.reddit.com/immersivelabs/comments/qq5moq/just_completed_hack_your_first_web_app_that_one/
I ran this script - in the 'name' field of the form which displays a popup message indicating the attack worked.
When I then login to the admin portal and view the dashboard, there is nothing there outside of the email and message fields that were filled on the form on the other page...
I am completely lost with this one :(
submitted by Jazza23 to immersivelabs [link] [comments]


2024.05.17 23:47 uvm7 HOW TO setup your own Dracula training dojo (no mods headache)

So I've been playing on a Brutal Duo PvP server. Experience was great, all bosses were somewhat doable, but I had a problem with Dracula, which led me to writing this post. Here are the exact reasons:
See anything familliar? Than this guide is for you.

So we're aiming at preparing an environment to efficiently train defeating Dracula. Won't go into details on how to host a private game with brutal difficulty and all the spells and passives open - it's pretty instinctive given the game UI.
And here comes customization part.
1. Settings -> General -> check "Console Enabled" checkbox. Now it is accessible via tilda (~). 2. General commands:
3. Gearing up: give command is your go-to. Can be used for anything: gear, potions, heals, etc. Syntax is the following: give [how many] Example: give "[Name]Blood Rose Potion - Item_Consumable_HealingPotion_T02 - Guid: 429052660" 20
You would also need jewels. Without going into much details, here is the command: GenerateJewel 3 1 Example: GenerateJewel AB_Blood_BloodRite_AbilityGroup 3 1 Will give you desired jewel with 4 random maxed out stats. Repeat until you get what you require.
4. Blood - probably the most complicated part. Console commands can't let you generate blood you want. For that you need mods. OR:
  • Create yourself a killing button: Console.Bind l changehealthofclosesttomouse -1500 - point it to the npc , boom, it's dead. You may use any button instead of "L";
  • Now we need a skiptime bind: Console.Bind n addtime 12;
  • toggleobserve 2 to make yourself invisible for the npcs;
  • Teleport to the place with the most number of blood bearers you need. For example - cathedral for Scholar blood;
  • Point at the npcs, click the killing button, click skiptime button couple times - npc reappears. Repeat until you get necessary blood bearer;
  • toggleobserve 0 to make yourself normal again.
5. Training part. First we would need a healing bind: Console.Bind o changehealthofclosesttomouse 10000. This we can use for healing self and Dracula in order to not experience reset and long downtime.
Killing bind is good for skipping phases. Phase 1 can be skipped by putting him down to around 60% hp, phase 2 by eradicating his health entirely. Well, you get the point.

Concluding, we prepared a decent environment to fight Dracula. We can skip phases, reset the fight without downtime, give ourselves gear, consumables and blood we want. Without any interferences, distraction, etc.
As for myself - 3 days of training really helped me out. After that I was able to login onto the server, take down Dracula there, take a shard and become a huge target dummy for the whole server.
The rest is up to you. Good luck!
Edit: typos
submitted by uvm7 to vrising [link] [comments]


2024.05.17 22:45 dude_named_will Cannot add Trusted Sites

Trying to set up an entra agent on another DC running Windows 2022. When I click 'Authenticate', I receive a pop up saying that "https://login.microsoftonline.com is blocked by Internet Explorer Enhanced Security Configuration". When I click to add it, all of the buttons on Trusted Sites are greyed out and I don't see any websites in the list.
Perhaps I'm a noob with group policy, but I've tried creating a group policy specifically for this server (I don't want to break everything) to add this website to trusted sites.
Edited Computer Configuration -> Policies -> Admin Templates -> Windows Components -> Internet explorer -> Internet Control Panel -> Security Page. Enabled Site to Zone Assignment List and added the site. However, I still cannot authenticate and I do not see anything under Trusted Sites. Am I being a noob with group policy or is there something else I need to do?
submitted by dude_named_will to activedirectory [link] [comments]


2024.05.17 22:23 dude_named_will Cannot add Trusted Sites

Trying to set up an entra agent on another DC. When I click 'Authenticate', I receive a pop up saying that "https://login.microsoftonline.com is blocked by Internet Explorer Enhanced Security Configuration". When I click to add it, all of the buttons on Trusted Sites are greyed out and I don't see any websites in the list.
Perhaps I'm a noob with group policy, but I've tried creating a group policy specifically for this server (I don't want to break everything) to add this website to trusted sites.
Edited Computer Configuration -> Policies -> Admin Templates -> Windows Components -> Internet explorer -> Internet Control Panel -> Security Page. Enabled Site to Zone Assignment List and added the site. However, I still cannot authenticate and I do not see anything under Trusted Sites. Am I being a noob with group policy or is there something else I need to do?
submitted by dude_named_will to sysadmin [link] [comments]


2024.05.17 21:32 VintageRCFishArtist Can't imagine this being anything but tech support malware (need assistance)

Can't imagine this being anything but tech support malware (need assistance)
I've tried Ctrl+Alt+Esc, F11, and Alt+F4 and nothing worked. I can't use my keyboard and mouse. I tried turning it on and back off but it didn't do anything
submitted by VintageRCFishArtist to antivirus [link] [comments]


2024.05.17 18:30 eugeniox DaDaBIK V. 12.0 is out. New major release, new User Interface for a solid, mature (20+years), self hosted alternative to Power Apps, Airtable, AppSheet, Zoho creato. Build CRUD, internal tools, admin panels, dashboards in minutes with no-code. Add your own custom PHP & Javascript code, if needed.

Hi!
After almost three years, a new major release of DaDaBIK is out (founder here).
V. 12 brings, among other new features:
For those unfamiliar with DaDaBIK, here's a quick overview: DaDaBIK has been a pioneer in the low-code and no-code space since 2001, it was one of the very first no-code low-code platform, typically used for internal tools, business process automation, online databases.
Users include individuals, small and large business and many universities.
Some of the main features:
You can also add your own PHP / Javascript code, if needed, through a unique low-code integration approach. This includes custom buttons, hooks, custom validation functions, calculated fields, custom PHP pages and more. Your code remain completely separated from the DaDaBIK core code but fully integrated with the application, you can use vanilla PHP / Javascript and/or take advantage of the DaDABIK API.
No artificial limits on users, tables, records: if you need to scale, just power up your server.
Integration capabilities:
Licensing Options: both lifetime and monthly subscription licenses are available. Start your free trial here: Download DaDaBIK
This is the YouTube live streaming during which V 12 has been unveiled
If you want to see DaDaBIK in action, here are some apps created with it: dadabik.com/demo
Any feedback is welcome, thanks!
Eugenio
submitted by eugeniox to selfhosted [link] [comments]


2024.05.17 17:25 MylianMoonstar Password Admin Login Issue W10

As the title suggests
My boss and I are unable to Log into the laptop due to him resetting the password recently and writing it down incorrectly. We do not have the disc as the password reset suggests. Our only options besides logging in are shutting down, ease of access and wifi.
Any thoughts?
submitted by MylianMoonstar to WindowsHelp [link] [comments]


2024.05.17 17:17 Appropriate_Face8497 Unable to login and get token when visiting the url for token auth

Unable to login and get token when visiting the url for token auth
Trying to use suite script from external API. My end goal it to be able to fetch all items based on the bin that they are in and display the information on a screen. Currently I am just trying to set up a hello world route in net suite that I can hit from an external server / api. When I am attempting to do this with the following code (_please not I removed part of the url as I believe it shouldn't be shared_: ```javascript
const axios = require("axios"); // NetSuite Token-based Authentication endpoint const tokenEndpoint = "https://.app.netsuite.com/app/login/oauth2/authorize.nl?scope=restlets+rest_webservices&redirect_uri=" // Request body for token endpoint const data = { code: "theCode", AplicationType: "x-www-form-urlencoded", grant_type: "authorization_code", redirect_uri: "https://api.github.com", }; // Make a POST request to obtain the access token axios .get(tokenEndpoint) .then((response) => { // Access token received from NetSuite // const accessToken = response.data.access_token; console.log("Access Token:", response); // Pass the access token to your client-side code or perform further actions }) .catch((error) => { console.error("Error:", error); }); 
``` This code returns a large response with a lot of information. If you watch the video you will see that he opens the browser to get the auth token. So I figured I would try that. When I do I cannot login. I get stuck on the screen in the image below:
https://preview.redd.it/h6vre6r3q01d1.png?width=1903&format=png&auto=webp&s=aa5a100756b30c3a965b360b505691f3ca3bd05d
**No matter** what account I use I cannot get any access. However I am attempting to use an admin sandbox account. I have already checked that suite script is enabled and it is. Are there any other rules or permissions I could be missing?
This was the video I was following: https://www.youtube.com/watch?v=JD82GlFHR1k
submitted by Appropriate_Face8497 to Netsuite [link] [comments]


2024.05.17 17:02 GreasedTea Why do people set up tribute websites then make zero effort with them?

My dad died nearly two years ago and my estranged mother set up one of those tribute pages. It has a link to donate to charity but no personalisation aside from his name. The main photo is the website’s default blue flower bc nobody could be bothered to do anything with it. It’s so generic and low effort and the lack of an attempt to make it about remembering him as an individual feels deeply disrespectful to me. It’s like he’s vanished. He had such a big personality in life with so many interests and things to say and now he’s reduced to just a name, a picture of a flower, a charity box, and “Happy Heavenly Birthday! 🪽🪽” once a year despite being an atheist who would have rolled his eyes at that sentiment.
I added a few things on the first anniversary of his death last year hoping it would prompt other people to do something, but I come back nearly a year later and there’s nothing. I don’t have the admin login for the website so I can’t customise it properly. I have no contact with my mum and very little with the rest of my family and it’s like they use the fact that I’m physically not around them as an excuse. They couldn’t even be bothered to scatter his ashes properly and I blame myself for not being there with them to do it the way he wanted, bc best believe I’d have snatched that urn out of their hands and done it on my own. He would be fuming at the laziness and indifference and I feel like I’ve let him down.
submitted by GreasedTea to GriefSupport [link] [comments]


2024.05.17 16:38 moeraemii Disgruntled ex locked me out of my iMac / Activation Lock

Long story short, my ex locked me out of my 2022 iMac out of retaliation after a recent breakup. He reported the computer as lost through FindMy and removed it from my FindMy account so I couldn’t turn off that it was lost. I have the purchase receipt and own the computer. I took it to Apple with proof of purchase. They attempted to reset the password by sending a link to his phone number and my email and Apple said if he sees the message first, I’m basically screwed. I contacted them multiple times and went in person and they said there was no way to remove the activation lock without him turning off that it was lost or I knew his log in information.
He changed his phone number and I’d assume rejected the password reset that was sent to his email because their method didn’t work. I also showed Apple proof that I had a temporary restraining order against him so I could not contact him to take the lock off. Is there ANY solution to reset/wipe out the computer? I remember back in the day, there was only one Admin on a mac but apparently both he and I were admins on the computer without my knowledge. I tried logging in using my credentials but I believe he was the last one logged in so my login info is useless even though I’m an admin. It’s been hell dealing with this mess as I had recent major surgery so this is the last thing I need to deal with as he’s stolen so much from me already (he’s an addict and he stole and sold my other property while I was in the hospital for another health issue).
I know this question has been asked so many times on reddit but if there’s any solution so I can have my computer back and use it for my freelance business, I’d be so grateful. Idc if I have to wipe it clean as I have a backup device that I can use with TimeMachine. It just sucks that I trusted him and he betrayed that trust and now I’m out $2k on a computer and it’s just sitting in my closet collecting dust. I can’t even resell it for parts so I can use the funds to purchase a new one. I don’t need to hear lectures of how foolish I was to trust him as I’ve dealt with enough guilt and heartbreak. I just need to know if there’s any way I can regain access to my computer that I paid for with my hard earned money. 😞
submitted by moeraemii to mac [link] [comments]


2024.05.17 16:14 ROBLOXEpicFan2006 Old ROBLOX Game Page from 2007 (please don't cry if you played in 2007 or 2008 please don't cry.)

Old ROBLOX Game Page from 2007 (please don't cry if you played in 2007 or 2008 please don't cry.) submitted by ROBLOXEpicFan2006 to oldroblox [link] [comments]


2024.05.17 15:59 terataz Login as other users but only if in a lower role

I know that to allow a user to login as another user, modify all data permission must be on.
Is there a way to allow this only for lower role users?
So if you're an admin you can not login in a super admin account
Thanks
submitted by terataz to salesforce [link] [comments]


2024.05.17 15:56 CISO_Series_Producer Top cybersecurity stories for the week of 05-13-24 to 05-17-24

Below are some of the stories we’ve been reporting this week on Cyber Security Headlines.
If you’d like to watch and participate in a discussion about them, the CISO Series does a live 20-minute show every Friday at 12:30pm PT/3:30pm ET. Each week we welcome a different cyber practitioner to offer some color to the week's stories. Our guest this week is Ryan Bachman, evp and global CISO, GM Financial.
To get involved you can watch live and participate in the discussion on YouTube Live https://youtube.com/live/3XI0UxGnFyM or you can subscribe to the Cyber Security Headlines podcast and get it into your feed.
Here are the stories we plan to cover, time permitting:
Okta’s security chief speaks out An interesting interview with Okta Chief Security Officer David Bradbury in Recorded Future News last week. Speaking to Jonathan Grieg, Bradbury highlighted the fact that identity-based attacks are shifting from pre-authentication, coming after your password, to post-authentication, in which threat actors bypass the login page and go straight to stealing a browser’s session token cookie. Bradbury also advised companies to maximize their transparency efforts during an attack – based in part on Okta’s own recent experiences, as well as to be aware of the improvements in the quality of attack techniques such as correctly spelled phishing emails and pitch-perfect deepfake voice messaging thanks to AI. (The Record)
Volt Typhoon demonstrates a new form of tradecraft in cyberthreats, say Feds Speaking at RSA last week, Eric Goldstein, CISA’s executive assistant director for cybersecurity told reporters that the techniques practiced by Volt Typhoon represent a sinister new level of cyberthreat that has permanently altered the landscape. Referring to China specifically he said, “if the end goal objective is to have placement and access to the United States for an attack at the time of their choosing, they’re probably going to continue that path” pointing out the desire “to compromise insecure or end-of-life devices to then pivot into more sensitive networks.” These comments are in line with a report issued in February by the U.S. and its allies which showed that the group has maintained access and other footholds in victim networks for “at least” the last five years “Volt Typhoon is not over,” the NSA’s Dave Luber added. (The Record)
FBI seizes BreachForums On the morning of March 15th, the US FBI announced its seizure of the illicit clear-net hacking forum as well as its Telegram channel, updating the BreachForums homepage with a takedown notice. It also said it obtained and began reviewing the site’s backend data. The FBI sent a Telegram message from BreachForum’s admin Baphomet, but its unclear if it arrested the individual operating the account. BreachForums began operation in March 2022, leaking stolen data from Europol, AT&T, 23andMe, HPE, Home Depot, and many other breaches. (Bleeping Computer)
Google to use GenAI to help identify phone scams At the Google I/O 2024 developer conference on Tuesday, Google previewed a Generative AI-driven feature that will alert users to potential phone scams in real-time. The feature will be built into a future version of Android and will use Gemini Nano, which can run entirely on-device. The system effectively listens for “conversation patterns commonly associated with scams” such as fraudsters claiming to be bank representatives, offering gift cards or making requests for passwords. When a potential scam is detected, a pop up notification will alert the user that they may be falling prey to unsavory characters. No specific release date has been set for the feature. (TechCrunch)
Security flaws discovered in GE Ultrasound machines Researchers from Nozomi Networks have discovered 11 flaws in the Vivid T9 Ultrasound series of products, including its pre-installed Common Service Desktop web application. These flaws could result in the installation of malware, manipulation of patient data, and could also affect a software program called EchoPAC, installed on a doctor's Windows workstation to access the ultrasound images. According to Nozomi, successful exploitation of these flaws does require prior access to the hospital environment through stolen VPN credentials or physical insertion of an infected USB device. Advisories from GE state that existing mitigations and controls reduce the risks posed by these flaws to acceptable levels, and “in the unlikely event a malicious actor with physical access could render the device unusable, there would be clear indicators of this to the intended user of the device." it noted,"the vulnerability can only be exploited by someone with direct, physical access to the device." (The Hacker News and GE advisory)
Crypto heist by MIT grads nets $25M in 12 seconds, shakes the foundations of blockchain This has all the makings of a classic heist movie: two brothers who were educated in mathematics and computer science at MIT, then plotted for months to steal $25 million in Ethereum cryptocurrency, which they did in just 12 seconds. They achieved this by “by fraudulently gaining access to pending private transactions and then altering the transactions to obtain their victims' cryptocurrency.” This is now being referred to as “The Exploit” by prosecutors and others at the Department of Justice and the IRS. U.S. Attorney Damian Williams said in a statement on Wednesday, "the defendants' scheme calls the very integrity of the blockchain into question." (BBC News)
Black Basta weaponizes Quick Assist Microsoft began tracking a social engineering campaign, which sees Black Basta operatives email bombing targets with numerous email subscription services, then approaching them as a either Microsoft or company-based help desk staff to fix spam proliferation. In this approach, the attackers attempt to get victims to launch Windows Quick Assist, which allows for a subsequent downloading of ZIP files to deliver a malicious payload. Ultimately the approach attempts to deploy Black Basta’s ransomware using the Windows PSExec telnet-replacement tool. Microsoft recommends blocking or uninstalling Quick Assist if not regularly used. (Bleeping Computer)
MITRE releases threat-modeling framework for embedded devices The MITRE Corporation has officially released a new threat-modeling framework named EMB3D. According to MITRE, this framework was designed to enhance the security of embedded devices in critical infrastructure by providing a comprehensive knowledge base of cyber threats and mitigation strategies. Similar to the ATT&CK framework, EMB3D is designed to evolve over time to address emerging threats, vulnerabilities, and attack vectors specific to embedded systems. The initial release of the framework includes the device properties and threats enumerations. The full set of mitigations is expected to be released in the summer 2024 update. (The Hacker News), (MITRE EMB3D)
submitted by CISO_Series_Producer to cybersecurity [link] [comments]


http://swiebodzin.info