mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#authenticode

0 Beiträge0 Beteiligte0 Beiträge heute
The New Oil<p>Hackers turn <a href="https://mastodon.thenewoil.org/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> into <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> using <a href="https://mastodon.thenewoil.org/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a> stuffing</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-turn-screenconnect-into-malware-using-authenticode-stuffing/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-turn-screenconnect-into-malware-using-authenticode-stuffing/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a></p>
Sascha Stumpler<p>PowerShell-OpenAuthenticode <a href="http://dlvr.it/TJ0mZY" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJ0mZY</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://hessen.social/tags/OpenAuthenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAuthenticode</span></a> <a href="https://hessen.social/tags/CrossPlatform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossPlatform</span></a> <a href="https://hessen.social/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a></p>
Simon Tatham<p>I've just renewed the <a href="https://hachyderm.io/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a> certificate I use to sign <a href="https://hachyderm.io/tags/PuTTY" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PuTTY</span></a>.</p><p>Now <a href="https://hachyderm.io/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://hachyderm.io/tags/Defender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defender</span></a> gives me dire warnings about my own nightly builds. Apparently it thinks the new cert belongs to some previously unknown SW publisher, who might be a malware source for all it knows.</p><p>Is there any way to reassure it? E.g. the old cert hasn't expired yet, so I could use each one to cross-sign a declaration that the other one belongs to the same person.</p><p>Is there a standard procedure for this?</p>
Morten Linderud<p>Spent the past couple of days rewriting my old pkcs7/authenticode library stuff for go-uefi into the new cryptobytes API.</p><p>So far quite happy with it and hopefully makes me sleep better at night.</p><p><a href="https://github.com/Foxboron/go-uefi/commit/1b4504c78072bbf10eb957028da159c1761f3494" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Foxboron/go-uefi/co</span><span class="invisible">mmit/1b4504c78072bbf10eb957028da159c1761f3494</span></a></p><p><a href="https://chaos.social/tags/Golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Golang</span></a> <a href="https://chaos.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://chaos.social/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a> <a href="https://chaos.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a></p>
Richard Hughes<p>Does anyone happen to know what COFF sections get included when using <a href="https://mastodon.social/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a> signatures?</p>