Introducing Lumos Macro Stats Since the release of Lumos, we've received numerous requests from hacked victims, security researchers, projects, and students for charts showing statistics of hacking incidents by category. Now, anyone, regardless of their engineering background, can access a customizable chart containing the following information: → Total exploited value and incident count → Attack vector → Destination of exploited funds → Estimated value of DPRK-linked hacks Our goal is simple: to shed light on the shadows of Web3 hacks by providing transparent information on prevalent security incidents involving both smart contracts and project teams. $1.7B was lost to hacks in 2023. They can't keep getting away with this. Access Lumos: https://lnkd.in/gYUe2GFx
ChainLight’s Post
More Relevant Posts
-
Congratulations on completing this mini-module. We've successfully traversed a range of topics, from Bluetooth hacking and cryptanalysis side-channel attacks to microprocessor vulnerabilities. We've explored the historical and contemporary facets of Bluetooth attacks, gaining insights into attacks such as Bluesnarfing, Bluejacking, BlueSmacking, Bluebugging, BlueBorne, KNOB, and BIAS. This understanding equips us with the knowledge to identify and defend against such threats. In our exploration of cryptanalysis side-channel attacks, we've unveiled the principles of cryptanalysis and learned about various side-channel attacks like timing attacks, power-monitoring attacks, and acoustic cryptanalysis. This knowledge is essential for understanding the potential threats in cryptographic systems that go far beyond their software implementation. Lastly, we examined the Spectre and Meltdown vulnerabilities and gained insights into the mechanisms that enabled them and how to mitigate them.
To view or add a comment, sign in
-
👩🎓👨🎓 CSAW 2023 Embedded Security Challenge (ESC) is open for registration! This year's ESC focuses on side channel attacks (SCA) on cyber-physical systems (CPS). Cyber-physical systems are used by hundreds of industries and in many critical infrastructure systems. If these CPSs are not properly setup they can leak information even if they are using cryptographically secure software. This year, teams will investigate a range of SCAs on an Arduino Uno based CPS running several firmware that expose various side channels. The event comprises a qualification and a competition phase where teams will be able to explore several variations of a CPS and exploit side channels they find while suggesting mitigations for the found exploits. Registration and information here: https://lnkd.in/gMBmfDjV #csaw #cybersecurity #europe
To view or add a comment, sign in
-
-
A groundbreaking side-channel attack method that poses a risk of #dataleakage has been unveiled, targeting nearly all modern CPUs. Conducted by an esteemed group of eight researchers representing Technische Universität Graz in Austria and CISPA Helmholtz Center for Information Security in Germany, this cutting-edge research team includes experts who previously discovered the infamous Spectre and Meltdown vulnerabilities, along with several other side-channel attack methods. Dubbed Collide Power, the newly identified attack exhibits similarities to the notorious Meltdown and Microarchitectural Data Sampling (MDS) vulnerabilities. While this discovery raises concerns, rest assured that the #cybersecurity community is actively working on preemptive measures. Check out the link to the full article in the comment section. #cyberdefense #techfacts #datasecurity
To view or add a comment, sign in
-
-
#Day16 - Imaging QUME Virtual Machine on Raspberry Pi4 - Hello Cyber Team! I have been doing a lot of research on imagining QUME virtual machine on my Raspberry Pi4 B desktop. I tried out some different commands in the terminal and when it came to identifying and adding the Kernel path, BIOS information, I became quite confused. Thankfully, I will be connecting with my mentor tomorrow. Be safe everyone and happy cybering! ⌨ #cybersecurity #cybertechdave100daysofcyberchallenge
To view or add a comment, sign in
-
We recently hosted a fascinating talk by Annika Wilde, PhD candidate at Ruhr University Bochum, on securing next-generation platforms. Annika discussed forking attacks and mitigations in trusted execution environments (TEEs) based on Intel Software Guard Extensions (SGX) and examined the impact of cloning attacks on SGX enclaves. She shared a case study that thoroughly analyzes 72 SGX-based proposals for reducing the susceptibility of SGX enclaves to cloning attacks. The case study also provides ideas to improve the security of TTP-based anti-forking solutions. #NECLabs #cybersecurity #cloudcomputing
To view or add a comment, sign in
-
-
I leveraged the Parrot OS, a highly respected and versatile operating system, to tackle various challenges on platforms such as TryHackMe, HackTheBox, and Capture The Flag (CTF) exercises. I particularly enjoyed the Popcorn, Bashed, and Forest challenges on HackTheBox. To analyze and resolve these challenges, I utilized a range of tools, including Ida Pro, x64dbg, LARA, Cheat Engine, Cutter, Radare2, exDnSpy, and Ghidra, which allowed me to hone my skills in assembly language on multiple architectures, including arm, x64, and x86. These tools enabled me to thoroughly explore and dissect malware, further enhancing my skills in reverse engineering and problem-solving, all within the context of cyber security.
To view or add a comment, sign in
-
-
Congratulations on completing this mini-module. You've successfully traversed a range of topics, from Bluetooth hacking and cryptanalysis side-channel attacks to microprocessor vulnerabilities. You've explored the historical and contemporary facets of Bluetooth attacks, gaining insights into attacks such as Bluesnarfing, Bluejacking, BlueSmacking, Bluebugging, BlueBorne, KNOB, and BIAS. This understanding equips you with the knowledge to identify and defend against such threats. In your exploration of cryptanalysis side-channel attacks, you've unveiled the principles of cryptanalysis and learned about various side-channel attacks like timing attacks, power-monitoring attacks, and acoustic cryptanalysis. This knowledge is essential for understanding the potential threats in cryptographic systems that go far beyond their software implementation. Lastly, you examined the Spectre and Meltdown vulnerabilities and gained insights into the mechanisms that enabled them and how to mitigate them. As we conclude this module, we hope it has enriched your understanding of these vital cybersecurity topics. Remember, the cybersecurity landscape is perpetually evolving, so continuous learning is essential to stay abreast of new developments.
Completed Brief Intro to Hardware Attacks
academy.hackthebox.com
To view or add a comment, sign in
-
I'm thrilled to share that I've just completed an in-depth mini-module covering a range of critical cybersecurity topics. This journey has been both enlightening and empowering, enhancing my understanding of various vulnerabilities and attacks in the digital world. Here are some key highlights: 🔹 Bluetooth Hacking: Delved into the world of Bluetooth attacks, exploring both historical and contemporary threats like Bluesnarfing, Bluejacking, BlueSmacking, Bluebugging, BlueBorne, KNOB, and BIAS. I now have a deeper understanding of how these attacks operate and how to defend against them. 🔹 Cryptanalysis Side-Channel Attacks: Unveiled the principles of cryptanalysis and explored various side-channel attacks, including timing attacks, power-monitoring attacks, and acoustic cryptanalysis. This knowledge is crucial for recognizing threats that extend beyond software vulnerabilities in cryptographic systems. 🔹 Microprocessor Vulnerabilities: Examined the infamous Spectre and Meltdown vulnerabilities, learning about the underlying mechanisms and effective mitigation strategies. Understanding these vulnerabilities has underscored the importance of balancing high-performance computing with robust security measures. This module has significantly enhanced my cybersecurity acumen, and I'm excited to apply this knowledge to safeguard digital systems. 🚀 #Cybersecurity #BluetoothHacking #Cryptanalysis #MicroprocessorSecurity #Spectre #Meltdown
Completed Brief Intro to Hardware Attacks
academy.hackthebox.com
To view or add a comment, sign in
-
Ethical hacker | red teamer | CTF player | computer geek | jr penetration tester | CEH...in progress |Ejpt....in..progress
here is my writtup about introduction to printer hacking from HTB https://lnkd.in/dzVMAuYP JULIUS SORAELY David Felix
PRINTER EXPLOITATION FROM HTB - HackMD
hackmd.io
To view or add a comment, sign in
-
PCU Insight: New GhostRace Vulnerability Alert! Researchers uncover a critical data leakage flaw, GhostRace (CVE-2024-2193), stemming from speculative execution in modern CPUs. This complex twist on the Spectre v1 vulnerability leverages speculative execution and race conditions, posing a risk across multiple architectures. GhostRace showcases how attackers could exploit Speculative Race Conditions (SRCs) to access privileged data, challenging our current understanding of CPU security. The discovery calls for heightened vigilance and an update of synchronization practices to protect sensitive information. Stay ahead of evolving cyber threats. For insights on safeguarding your systems against such sophisticated vulnerabilities, connect with us at ProCheckUp. Let's fortify your defences together. #GhostRace #Cybersecurity #SpeculativeExecution #CPUVulnerability #ProCheckUp
To view or add a comment, sign in
-