Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to Start a Website in Nigeria: A Complete Beginner’s Guide

    July 7, 2025

    NYT Connections hints and answers for November 13: Tips to solve ‘Connections’ #521.

    November 13, 2024

    Wordle today: The answer and hints for November 13

    November 13, 2024
    Facebook X (Twitter) Instagram YouTube
    • Go To Cupisweb
    • Submit Ticket
    Facebook X (Twitter) Instagram YouTube
    Cupisweb BlogCupisweb Blog
    • Updates
    • Business
    • Marketing
    • Tech News
    • Hosting Guides
    • WP Tutorials
    Cupisweb
    Cupisweb BlogCupisweb Blog
    Home»Tech & Industry News»The best hacks and security research from Black Hat and Def Con 2024
    Tech & Industry News

    The best hacks and security research from Black Hat and Def Con 2024

    adminBy adminAugust 12, 2024No Comments4 Mins Read1 Views
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Thousands of hackers, researchers and security professionals descended on the Black Hat and Def Con security conferences in Las Vegas this week, an annual pilgrimage aimed at sharing the latest research, hacks, and knowledge across the security community. And TechCrunch was on the ground to report on the back-to-back shows and to cover some of the latest research.

    CrowdStrike took center stage, and picked up an “epic fail” award it certainly didn’t want. But the company acknowledged it messed up and handled its scandal several weeks after releasing a buggy software update that sparked a global IT outage. Hackers and security researchers seemed largely willing to forgive, though maybe not easily forget.

    As another round of Black Hat and Def Con conferences wrap up, we look back at some of the highlights and the best in research from the show that you might’ve missed.

    Hacking Ecovac robots to spy on their owners over the internet

    Security researchers revealed in a Def Con talk that it was possible to hijack a range of Ecovacs home vacuum and lawnmower robots by sending a malicious Bluetooth signal to a vulnerable robot within a close proximity. From there, the on-board microphone and camera can be remotely activated over the internet, allowing the attacker to spy on anyone within ear- and camera-shot of the robot.

    The bad news is that Ecovacs never responded to the researchers, or TechCrunch’s request for comment, and there is no evidence that the bugs were ever fixed. The good news is that we still got this incredible screenshot of a dog taken from the on-board camera of a hacked Ecovacs robot. 

    A dog seen through a hacked Ecovacs device.
    A dog seen through a hacked Ecovacs device. Image Credits: Dennis Giese and Braelynn / supplied.
    Image Credits: Dennis Giese and Braelynn

    The long game of infiltrating the LockBit ransomware game and doxing its ringleader

    An intense cat and mouse game between security researcher Jon DiMaggio and the ringleader of the LockBit ransomware and extortion racket, known only as LockBitSupp, led DiMaggio down a rabbit hole of open source intelligence gathering to identify the real-world identity of the notorious hacker. 

    In his highly detailed diary series, DiMaggio, spurred on by an anonymous tip of an email address allegedly used by LockBitSupp and a deep-rooted desire to get justice for the gang’s victims, finally identified the man, and got there even before federal agents publicly named the hacker as the Russian national, Dmitry Khoroshev. At Def Con, DiMaggio told his story from his perspective to a crowded room for the first time.

    Hacker develops laser microphone that can hear your keyboard taps

    Renowned hacker Samy Kamkar developed a new technique aimed at stealthily determining each tap from a laptop’s keyboard by aiming an invisible laser through a nearby window. The technique, demonstrated at Def Con and as explained by Wired, “takes advantage of the subtle acoustics created by tapping different keys on a computer,” and works so long as the hacker has a line-of-sight from the laser to the target laptop itself. 

    Prompt injections can easily trick Microsoft Copilot

    A new prompt injection technique developed by Zenity shows it’s possible to extract sensitive information from Microsoft’s AI-powered chatbot companion, Copilot. Zenity chief technology officer Michael Bargury demonstrated the exploit at the Black Hat conference, showing how to manipulate Copilot AI’s prompt to alter its output.

    In one example he tweeted out, Bargury showed it was possible to feed in HTML code containing a bank account number controlled by a malicious attacker and trick Copilot into returning that bank account number in responses returned to ordinary users. That can be used to trick unsuspecting people into sending money to the wrong place, the basis of some popular business scams. 

    we got an ~RCE on M365 Copilot by sending an email

    by ~RCE I mean full remote control over
    its actions – search for sensitive content (sharepoint, email, calendar, teams), execute plugins
    and outputs – bypass DLP controls, manipulate references, social engineer its users on our… pic.twitter.com/r1yMRLXKAG

    — mbg @ defcon (@mbrg0) August 8, 2024

    Six companies saved from hefty ransoms, thanks to ransomware flaws in ransomware leak sites

    Security researcher Vangelis Stykas set out to scope dozens of ransomware gangs and identify potential holes in their public-facing infrastructure, such as their extortion leak sites. In his Black Hat talk, Stykas explained how he found vulnerabilities in the web infrastructure of three ransomware gangs — Mallox, BlackCat, and Everest — allowing him to get decryption keys to two companies and notify four others before the gangs could deploy ransomware, saving in total six companies from hefty ransoms. 

    Ransomware isn’t getting better, but the tactics law enforcement are using against gangs that encrypt and extort their victims are getting more novel and interesting, and this could be an approach to consider with gangs going forward.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleJohn Oliver gleefully mocks JD Vance’s very odd laugh
    Next Article Sam Soar on TikTok, activism, and getting free books

    Related Posts

    Tech & Industry News

    NYT Connections hints and answers for November 13: Tips to solve ‘Connections’ #521.

    November 13, 2024
    Tech & Industry News

    Donald Trump announces Elon Musk will co-lead Department of Government Efficiency

    November 13, 2024
    Tech & Industry News

    T-Mobile, Mint Mobile outage maps: See which regions are affected

    November 12, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Top Posts

    How to unblock Xnxx porn for free

    August 27, 2024385 Views

    How to unblock Redtube for free

    September 4, 2024357 Views

    How to unblock XVideos for free

    November 8, 2024114 Views
    Stay In Touch
    • Facebook
    • YouTube
    • Twitter
    • Instagram
    • WhatsApp

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Tags
    dedicated hosting featured hosting guild offshore offshore hosting Really Simple SSL Plugin shared hosting ssl protocol error web hosting WordPress wordpress hosting

    Products

    • Startup Hosting
    • Shared Hosting
    • WordPress Hosting
    • Reseller Hosting
    • Domain Registration

    Security & Tools

    • SSL Certificates
    • Professional Email
    • Website Backup
    • Email Service

    Company

    • About Us
    • Help Center
    • Contact Support
    • Affiliates

    Subscribe to Updates

    Get the latest update and promo about your website, business from Cupisweb

    {copy} 2023 Cupisweb. Premium Web Hosting, Cloud, VPS & Domain Registration Services.

    • Privacy Policy
    • Teams

    Type above and press Enter to search. Press Esc to cancel.