Infosec.Pub

4,699 readers
117 users here now

To support infosec.pub, please consider donating through one of the following services:

Paypal: jerry@infosec.exchange

Ko-Fi: https://ko-fi.com/infosecexchange

Patreon: https://www.patreon.com/infosecexchange

founded 2 years ago
ADMINS
651
652
653
654
655
656
657
658
 
 

BioCatch Says Crime Groups Have Industrialized Operations With Stablecoin TransfersOrganized crime groups have industrialized digital banking fraud operations in the United States, with money mule networks surging 168% in the first half of 2025. Money mules are being recruited at unprecedented scale, and they're using stablecoins to transfer funds to crypto exchanges.

659
660
 
 
661
 
 

One night, a friend of mine went out for dinner with her husband and toddler. The toddler, who sometimes had trouble swallowing, choked on his food - and threw up, repeatedly, in the restaurant. People around them were laughing while my friend and her family were in distress, adding to their embarrassment. But that wasn't […]

662
 
 

A little over a year ago we released Rayhunter, our open source tool designed to detect cell-site simulators. We’ve been blown away by the level of community engagement on this project. It has been installed on thousands of devices (or so we estimate, we don’t actually know since Rayhunter doesn’t have any telemetry!). We have received dozens of packet captures, hundreds of improvements, both minor and major, documentation fixes, and bug reports from our open source community. This project is a testament to the power and impact of open source and community driven counter-surveillance.   If this is your first time hearing about Rayhunter, you can read our announcement blog post here. Or if you prefer, you can watch our DEF CON talk. In short, Rayhunter is an open source Linux program that runs on a variety of mobile hotspots (dedicated devices that use a cellular connection to give you Wi-Fi). Rayhunter’s job is to look for cell-site simulators (CSS), a tool police use to locate or identify people's cell phones, also known as IMSI catchers or Stingrays. Rayhunter analyzes the “handshakes” between your Rayhunter device and the cell towers it is connected to for behaviors consistent with that of a CSS. When it finds potential evidence of a CSS it alerts the user with an indicator on the screen and potentially a push notification to their phone.   Understanding if CSS are being used to spy on protests is one of the main goals of the Rayhunter project. Thanks[...]

663
 
 

Security Researchers Reveal Methods to Reverse Engineer MediaTek FirmwareReverse engineering Wi-Fi chips opens new opportunities for security research. Security researchers Daniel Wegemer and Edoardo Mantovani describe tools, methods and motivations for unlocking hidden functions and enabling deeper hardware analysis.

664
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

665
666
667
668
669
670
671
672
673
674
675
3
Kerberoasting (blog.cryptographyengineering.com)
submitted 1 month ago by lemmydev2 to c/pulse_of_truth
 
 

Comments

view more: ‹ prev next ›