👮‍♀ 10 Cybersecurity Blogs/Websites for Cybersecurity Professionals/Hackers 1. Daniel Missler 2. Graham Kewley 3. Security Weekly 4. Infosecurity Logs 5. Hacker news 6. Intigriti 7. Hakluke 8. Hacker 1 9. BugCrowd 10. IT Security Guru
⚙ Network intelligence tools. • The ohshint website has a section with very useful tools and resources on network intelligence. All material is divided into relevant categories and contains a brief description. #OSINT
Seeker A tool for creating fake web pages that request permission to access the user's geolocation. If the request is accepted, the attacker receives the exact coordinates of the device, such as longitude and latitude, as well as additional information, including the unique device ID, model, operating system, IP address, and other characteristics. Unlike conventional geolocation methods that only use IP address and provide an approximate location, Seeker uses GPS data, which allows for more accurate information, especially on smartphones. Link to the tool:
🤐 Censorship for those who are uncomfortable? The Spanish government is preparing a new law that will force users considered "relevant" on social networks to rectify false or inaccurate information they publish. This legislation, in the draft phase, extends the 1984 law, originally designed for traditional media, to now include influencers and other users with a wide reach on digital platforms. The Government wants to fight against "professional hoaxers". Reports LibertadDigital -I would just like to say... How many times has an "official" or "real" story been subsequently denied?-
Illusion of Freedom "When governments intervene in markets, they repeat the mistakes the countries of Eastern Europe made in the latter half of the 20th century. High taxes on competing goods is a form of indirect subsidy too. It's impossible to calculate the total damages taxation and inflation have done to society. But think of it this way: If you're in a so-called laissez-faire country, your total taxes might look something like this: 25% income tax, 25% social-security contributions, and other taxes your employer pays. Even before we start adding hidden costs, that's about 50%. Add a VAT adjusted for certain goods with extra taxes, like fuel for your car... That's an additional 25% of whatever you had left. So, in total, 62.5%. Make that 65% to compensate for every other tax we didn't include. Now add a best-case scenario of 5% inflation rate. Congratulations, you live in a "free country", and you're 70% a slave." Book: https://21million.konsensus.network/
Due to maintenance work on OpenStreetMap, it is temporarily not possible to save any map edits. OpenStreetMap.org will shortly be available READ-ONLY. You will unfortunately NOT be able to save any map edits. We will be running on our backup infrastructure in Dublin. We are working to restore full services and we are waiting for our ISP to restore services in Amsterdam.❞ Source: en.osm.town/@osm_tech
Indian uncles treat buying a car as the ultimate life achievement. They’ll talk about it endlessly, making others feel like their lives are wasted. I’ve seen it in my family. My opinion: Luxuries = liability Live free, live on your own terms If you own alot of liabilities in a city you aren’t available to explore things and move around
📱 Unlocking and infecting a journalist's phone Serbian police used a Cellebrite device to unlock the mobile phone of a journalist, Slaviša Milanov, and then infect it with malware. This allowed access to his phone and the installation of surveillance software. Milanov was arrested in Pirot, Serbia, where police confiscated his phone, laptop and camera, claiming they only wanted to check his documents. However, after more than an hour, and without following clear legal procedures, officers used a Cellebrite device to extract data from his phone. Upon returning the phone to Milanov, he noticed odd things, such as mobile data and Wi-Fi being disabled, and apps draining excessive battery power. He used the Stay Free app to monitor the phone's usage, discovering that several apps had been active during the time his device was with police, suggesting malware had been installed. The Amnesty International report also mentions that, together with Google researchers, they discovered a vulnerability in a wide range of Android phones that Cellebrite was exploiting. This vulnerability has since been patched by Qualcomm, the affected chipmaker, and Google has remotely removed the spyware from infected devices. Cellebrite said it is investigating the allegations and is prepared to terminate relationships with any agency that has used its technology inappropriately. As reported by TechCrunch:
🛡 Router Security Vulnerabilities. ➡️ is a useful resource that includes a list of vulnerabilities found in various routers. The guys have already analyzed more than 1000 models and provided the necessary information to eliminate security errors.
Bellingcat Challenges A small selection of сhallenges (with the ability to check answers) to test #osint skills.