IllNess

joined 2 years ago
[–] IllNess@infosec.pub 11 points 3 months ago

Open sourcing Nova would be a huge game changer. Hopefully the original creator can find something in legal where he can release it himself. I am sure a lot of devs would love to help him clean it up ready for open sourcing.

[–] IllNess@infosec.pub 9 points 3 months ago (2 children)

Kvaesitso takes a little to get used to. It is not like a traditional launcher and is no where near as customizable as Nova but I still really like it.

If you don't like having a ton of icons, only use a limited number of widgets, you like to use a search bar, and you don't like shoving things in the app screen in to folders, I suggest giving it a try.

The home screen only allows one row of icons. You have a set of icons as your favorites in the app screen. You can use tags, rather than folders, to organize icons.

It is different but it is very polished.

[–] IllNess@infosec.pub 7 points 3 months ago* (last edited 3 months ago) (2 children)

I want to know which Chevy truck this is and what viewing angles it has. If it's one of the newer ones where the grill goes above 5 feet, yeah fuck the car and the human driving it.

[–] IllNess@infosec.pub 4 points 3 months ago

Now I need the Cappy hat.

It's working already!

[–] IllNess@infosec.pub 9 points 3 months ago (1 children)

I have no idea why I assumed HOA. Sorry.

Thank you for the info.

[–] IllNess@infosec.pub 8 points 3 months ago

Thank you for the info. I guess I have HOA PTSD for me to assume it was an HOA. I read quotes and somehow I assumed it was HOA.

Sorry.

[–] IllNess@infosec.pub -4 points 3 months ago* (last edited 3 months ago) (9 children)

~~HOAs are stupid. $400,000?!~~

Edit: Not an HOA. Sorry.

[–] IllNess@infosec.pub 14 points 3 months ago (2 children)

I figured the dinosaurs in Jurassic Park would have clothes to promote the merch.

Imagine seeing a hat on a trex?!

[–] IllNess@infosec.pub 6 points 3 months ago (2 children)

As the U.S. government decided to restrict some technologies to China, it should have been more serious about these restrictions. But due to a somewhat permissive licensing policy maintained by the U.S. Department of Commerce, due to the Chinese firms being able to smuggle or buy these technologies on the black market, due to the fierce resilience of companies like Huawei that refused to fail, and due to the very extensive lobbying efforts of American companies to continue to supply to Chinese customers, the export control policy was severely weakened.

I never really thought about the black market. If each country has a different tariff depending on their relationship to this administration, then a country that doesn't comply can still get what they need from the US through other countries. Really best of both worlds.

It doesn’t make sense to turn off the U.S. as an attractor to some of the scientists yearning for some aspect of freedom, and it doesn’t make sense to deport a lot of people who could form the manufacturing industrial base in the U.S.

I never understood why the US would educate people and then try to kick them out in a short time frame. You are basically making other countries better and gaining little from it.

[–] IllNess@infosec.pub 74 points 3 months ago (4 children)

If this really about protecting kids, they could've done opt in blocking at the ISP level. Just a few new fields with ISPs and they have products that can take care of this already.

This is really about tracking every little thing you do online.

 

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

 

In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

Definitions:

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

-Wikipedia

Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

-Dark Reading

 

This relatively new ransomware-as-a-service (RaaS) operation extorts victims in exchange for not leaking stolen files and sells the documents to the highest bidder if negotiations fail. The ransomware group focuses on data-theft-based extortion rather than encrypting victims' files, although they were also identified as potential buyers of Knight ransomware source code.

Since the start of the year, RansomHub has claimed responsibility for breaching American not-for-profit credit union Patelco, the Rite Aid drugstore chain, the Christie's auction house, and U.S. telecom provider Frontier Communications. Frontier Communications later warned over 750,000 customers their personal information was exposed in a data breach.

 

Today, the Cybersecurity and Infrastructure Security Agency (CISA) announces its cyber incident reporting form moved to the new CISA Services Portal as part of its ongoing effort to improve cyber incident reporting.

CISA Services Portal

view more: ‹ prev next ›