🦞🌯 Lobster Roll

Thread

Malicious SHA-1 (malicioussha1.github.io)

Stories related to "Malicious SHA-1" across the full archive.

Subtle Power-Consumption Changes Can Signal Malicious Intrusions (technologyreview.com)
Malicious Code Execution in PCI Expansion ROM (resources.infosecinstitute.com)
TrueCrypt audit finds “no evidence of backdoors” or malicious code (arstechnica.com)
Malicious SHA-1 (malicioussha1.github.io)
Is Extended Random A Malicious NSA Plot? (sockpuppet.org)
Malicious Firmware Found Preinstalled on Xiaomi, Huawei, Lenovo Phones (public.gdatasoftware.com)
The price of the Internet of Things will be a vague dread of a malicious world (ieet.org)
ScriptObservatory.org -- How much malicious JavaScript goes unnoticed? (scriptobservatory.org)
OpenSSH: client bug can leak keys to malicious servers (undeadly.org)
A2: Analog Malicious Hardware (static1.1.sqspcdn.com)
[LtU](http://lambda-the-ultimate.org/node/5344)'s article on it has some additional text commenting on it.
200k+ Parked/Expired Domains Used to Distribute Malicious Ads (blog.sucuri.net)
One easy way to inject malicious code in any Node.js application (blog.sqreen.io)
Detecting potentially malicious PHP code using checksums and heuristics on parse trees (blog.garage-coding.com)
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work (usenix.org)
Content-Type: Malicious - New Apache Struts 0-day Under Attack (blog.talosintelligence.com)
Antbleed - Exposing the malicious backdoor on Antminer (antbleed.com)
Also it appears to have a [remote code execution](https://twitter.com/petertoddbtc/status/857340167400587264) vulnerability.
Nexus 9 vs. Malicious Headphones, Take Two (alephsecurity.com)
Arbitrary code execution on clients through malicious svn+ssh URLs in svn:externals (subversion.apache.org)
Malicious software libraries in PyPI, posing as well-known libraries (nbu.gov.sk)
Python security team's reponse to typosquatting and malicious packages on PyPI (mail.python.org)
Dangerous Pickles — Malicious Python Serialization (intoli.com)
Malicious Code Detection for Open Firmware (2002) (cs.cornell.edu)
HIDDEN COBRA - North Korean Malicious Cyber Activity (us-cert.gov)
New Quad9 DNS service blocks malicious domains for everyone (arstechnica.com)
Reported malicious module: getcookies (blog.npmjs.org)
Postmortem for Malicious Packages Published on July 12th, 2018 (eslint.org)
Protecting Mozilla’s GitHub Repositories from Malicious Modification (blog.mozilla.org)
“Impressive” Memory and Navigation Revealed by Mako Shark Tracking off West Coast (scitechdaily.com)
These top predators travel far across the Pacific, returning to the same areas in the Southern California Bight each year. The largest effort ever to tag and track shortfin mako sharks off the West Coast has found that they can travel nearly 12,000 miles in a year. The sharks range far offshore, but...
Tracking Basking Sharks Yields Fascinating Insights Into Their Behavior (scitechdaily.com)
Tracking the world’s second-largest shark species has revealed that it moves to different depths depending on the time of year. Basking sharks spend most of the summer months at the ocean’s surface, but dive to deeper depths in winter. This seasonal variation in behavior is likely caused...
Shark Skin Microbiome Protects Wounds From Infection (scitechdaily.com)
No evidence of infection found in the bacterial community around shark wounds. A survey of the shark skin microbiome provides the first step toward understanding the remarkable resilience of shark wounds to infection. In the wild, blacktip reef sharks are often seen bearing wounds, but they rarely e...