Feed aggregator
Stillcolor: Disable temporal dithering on your Mac
Article URL: https://github.com/aiaf/Stillcolor
Comments URL: https://news.ycombinator.com/item?id=42043575
Points: 1
# Comments: 0
Show HN: Watch/filter new domains from certificate transparency logs
This can be used to find phishing domains or domains matching any pattern you want if you select "custom filter." You can also connect over WebSocket at /ws and use any programming language you want.
There may be duplicates because some domains are published in multiple logs. I get data from all of the logs currently included with Chrome, a list of which is available here: https://github.com/google/certificate-transparency-community....
Comments URL: https://news.ycombinator.com/item?id=42043570
Points: 2
# Comments: 0
Show HN: Convert any website into a React component
Hey HN, we built a Chrome Extension (https://www.magicpatterns.com/extension) that converts a snippet of any website to an isolated React component.
Demo video: https://youtu.be/hutUYDkyE_A
How it works: 1) Iterate through each node in the selected DOM tree, 2) For each element, find any matching CSS selectors / inline styles, 3) Use window.getComputedStyle to get the deterministic values, 4) Construct JSX
It was pretty hard producing the minimal code necessary while maintaining the same visual look. To do this, we implemented things like abstracting out global styles, removing inherited styles, pulling out SVGs, deleting styles with no effect, and condensing styles into their shorthand properties.
We dive into each of those optimizations here for fun: https://www.magicpatterns.com/blog/any-website-to-react-comp...
One of the main reasons we cared so much about condensing down the styles was not only to make it more human-readable, but also to reduce context length for an LLM, so that you can iterate on it with AI. Our extension has a “convert” option that lets you convert the output to Tailwind, Shadcn, or Chakra UI using an LLM. You can also export to Figma.
We're frontend engineers and we built the extension because our core product (https://www.magicpatterns.com/) helps software teams prototype their product ideas. And a huge pain point for users is getting their existing designs into our product, so that they can reference them to generate UIs with their existing aesthetic.
The extension allows you to get existing design context from any website, even localhost. Since launch, the extension has more than 3,000 users and interestingly is most popular in Japan.
Here's some real examples if you're curious what the final output looks like:
A) Hacker News Navbar - https://www.magicpatterns.com/ac9f38e4-5ef0-49e5-8b80-dbc429...
B) ChatGPT Welcome Screen - https://www.magicpatterns.com/7cb3ad12-cb12-4a5b-b32b-eda04d...
C) Cal.com Calendar Component — https://www.magicpatterns.com/a43bac78-134d-458d-8107-811ac7...
D) Stripe.com logo section - https://www.magicpatterns.com/deff1793-7a05-42fe-97f7-945976...
If you have an opinion about the extension, we’re all ears! You can try it for free at: https://www.magicpatterns.com/extension
Comments URL: https://news.ycombinator.com/item?id=42043552
Points: 2
# Comments: 0
Back to the future: Writing 6502 assembler with Amazon Q Developer
Lessons from 10 Years of Writing
Article URL: https://nik.art/10-lessons-from-10-years-of-writing/
Comments URL: https://news.ycombinator.com/item?id=42043548
Points: 1
# Comments: 0
Manjaro Linux prepares to enable telemetry by default
Article URL: https://forum.manjaro.org/t/testers-needed-manjaro-data-donor/170163
Comments URL: https://news.ycombinator.com/item?id=42043539
Points: 14
# Comments: 4
Why This Week's Fed Meeting Might Not Matter as Much as Next Year's
Launching My 11th Website as a Development Beginner
Article URL: https://sprunkiphase3.online/
Comments URL: https://news.ycombinator.com/item?id=42043524
Points: 1
# Comments: 1
Spotting AI Cheaters in Remote Tech Interviews
Article URL: https://utkusen.medium.com/spotting-ai-cheaters-in-remote-tech-interviews-fa41a01e911c
Comments URL: https://news.ycombinator.com/item?id=42043518
Points: 1
# Comments: 0
Election 2024: Can People See Who I Vote For?
Premier League Soccer: Livestream Fulham vs. Brentford From Anywhere
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
Over the last year, the cybersecurity industry faced a significant surge in QR code phishing campaigns, with some attacks increasing at a growth rate of 270% per month.1 A QR code (short for “Quick Response code”) is a two-dimensional barcode that can be scanned using a smartphone or other mobile device equipped with a camera. The codes can contain information like website URLs, contact information, product details, and more. They are most often used for taking users to websites, files, or applications. But when bad actors exploit them, they can be used to mislead users into unwittingly compromising their credentials and data.
Advanced protection against phishing with Microsoft Defender for Office 365 Unique characteristics of QR code phishing campaignsSecurity 101: What is phishing?
Learn moreLike with other phishing techniques, the goal of QR code phishing attacks is to get the user to click on a malicious link that seems legitimate. They often use minimalistic emails to deliver malicious QR codes that prompt seemingly legitimate actions—like password resets or two-factor authentication verifications. A QR code can also be easily manipulated to redirect unsuspecting victims to malicious websites or to download malware in exactly the same way as URLs.
Figure 1. QR code as an image within email body redirecting to a malicious website.
The normal warning signs users might notice on larger screens can often go unnoticed on mobile devices. While the tactics, techniques, and procedures (TTPs) vary depending on which bad actor is at work, Microsoft Defender for Office 365 has detected a key set of patterns in QR code phishing attacks, including but not limited to:
- URL redirection, where a click or tap takes you not where you expected, but to a forwarded URL.
- Minimal to no text, which reduces the signals available for analysis and machine learning detection.
- Exploiting a known or trusted brand, using their familiarity and reputation to increase likelihood of interaction.
- Exploiting known email channels that trusted, legitimate senders use.
- A variety of social lures, including multifactor authentication, document signing, and more.
- Embedding QR codes in attachments.
With the most common intent of QR code phishing being credential theft, malware distribution, or financial theft, QR code campaigns are often massive—exceeding 1,000 users and follow targeted information gathering reconnaissance by bad actors.2
Microsoft security researchers first started noticing an increase in QR-code based attacks in September 2023. We saw attackers quickly morphing their techniques in two keys ways: First by manipulating the way that the QR code rendered (such as different colors and tables), and second by manipulating the embedded URL to do redirection.
The dynamic nature of QR codes made it challenging for traditional email security mechanisms that were designed for link-based phishing techniques to effectively filter and protect against these types of cyberattacks. A key reason was the fact that extensive image content analysis was not commonly done for every image in every message, and did not represent a standard in the industry at the time of the surge.
As a result, for several months our customers saw an increase in bad email that contained malicious QR codes as we were adapting and evolving our technology to be effective against QR codes. This was a challenging time for our customers and those of other email security vendors. We added incremental resources and redirected all our engineering energy to address these issues, and along the way not only delivered new technological innovations but also modified our processes and modernized components of our pipeline to be more resilient in the future. Now these challenges have been addressed through a key set of innovations, and we want to share our learnings and technology advancements moving forward.
For bad actors, QR code phishing has become a lucrative business, and attackers are utilizing AI and large language models (LLMs) like ChatGPT to increase the speed and improve the believability of their attacks. Recent research by Insikt Group noted that bad actors can generate 1,000 phishing emails in under two hours for as little as $10.3 For the security industry, this necessitates a multifaceted response including improved employee training and a renewed commitment to innovation.
The necessity of innovation in QR code phishing defenseInnovation in the face of evolving QR code phishing risk is not just beneficial, it’s imperative. As cybercriminals continually refine their tactics to exploit new technologies, security solutions must evolve at a similar pace to remain effective. In response to the growing threat of QR code phishing, Microsoft Defender for Office 365 took decisive action to leverage advanced machine learning and AI—developing robust defenses capable of detecting and neutralizing QR code phishing attacks in real time. Our team meticulously analyzed these cyberthreats across trillions of signals, gaining valuable insights into their mechanisms and evolving patterns. This knowledge helped us refine our security protocols and enhance our platform’s resilience with several strategic updates. As the largest email security provider, we have seen a significant decline in QR code phishing attempts. At the height, Defender for Office 365 was blocking 3 million attempts daily, and with the delivery of innovative protection we have seen this number shrink to 200,000 QR code phishing attempts every day. This is testament that our innovation is having the desired effect: reducing the effectiveness of QR code-based attacks and forcing attackers to shift their tactics.
Figure 2. QR code phishing blocked by Microsoft Defender for Office 365.
Recent innovations and protections we’ve implemented and improved within Microsoft Defender for Office 365 to help combat QR code phishing include:
- URL extraction enhancements: Microsoft Defender for Office 365 has improved its capabilities to extract URLs from QR codes, substantially boosting the system’s ability to detect and counteract phishing links hidden within QR images. This enhancement enables a more thorough analysis of potential cyberthreats embedded in QR codes. In addition, we now extract metadata from QR codes, which enriches the contextual data available during threat assessments, enhancing our ability to detect suspicious activities early in the attack chain.
- Advanced image processing: Advanced image processing techniques at the initial stage of the mail flow process allow us to extract and log URLs hidden within QR codes. This proactive measure disrupts attacks before they have a chance to compromise end user inboxes, addressing cyberthreats at the earliest possible point.
- Advanced hunting and remediation: To offer a comprehensive response to QR code threats across email, endpoint, and identities with our advanced hunting capabilities, security teams across organizations are well equipped to specifically identify and filter out malicious activities linked to these codes.
- User resilience against QR code phishing: To further equip our organization against these emerging threats, Microsoft Defender for Office 365 has expanded its advanced capabilities to include QR code threats, maintaining alignment with email platforms and specific cyberattack techniques. Our attack simulation training systems along with standard setup of user selection, payload configuration, and scheduling, now have specialized payloads for QR code phishing to simulate authentic attack scenarios.
Read more technical details on how to hunt and respond to QR code-based attacks. By integrating all these capabilities across the Microsoft Defender XDR platform, we can help ensure any QR code-related threats identified in emails are thoroughly analyzed in conjunction with endpoint and identity data, creating a robust security posture that addresses threats on multiple fronts.
Protect against QR code-based phishing attacks with Microsoft Defender for Office 365 Staying ahead of the evolving threat landscapeThe enhancements of Microsoft Defender for Office 365 to defend against QR code-based phishing attacks showcased our need to advance Microsoft’s email and collaboration security faster. The rollout of the above has closed this gap and made Defender for Office 365 effective against these attacks, and as the use of QR codes expands, our defensive tactics will now equally advanced to combat them.
Our continuous investment in analyzing the cyberthreat landscape, learning from past gaps, and our updated infrastructure will enable us to effectively handle present issues and proactively address future risks faster as threats emerge across email and collaboration tools. We will soon be sharing more exciting innovation that will showcase our commitment to delivering the best email and collaboration security solution to customers.
For more information, view the data sheet on protecting against QR code phishing or visit the website to learn more about Microsoft Defender for Office 365.
Learn moreTo learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.
1Attackers Weaponizing QR Codes to Steal Employees Microsoft Credentials, Cybersecurity News. August 22, 2023.
2Hunting for QR Code AiTM Phishing and User Compromise, Microsoft Tech Community. February 12, 2024.
3Security Challenges Rise as QR Code and AI-Generated Phishing Proliferate, Recorded Future. July 18, 2024.
The post How Microsoft Defender for Office 365 innovated to address QR code phishing attacks appeared first on Microsoft Security Blog.
Modus: code-first intelligent APIs powered by WebAssembly
Article URL: https://hypermode.com/blog/introducing-modus-code-first-intelligent-apis
Comments URL: https://news.ycombinator.com/item?id=42043510
Points: 2
# Comments: 0
Jobs Killed Music DRM – Why Not Movies?
Article URL: https://unbound.news/jobs-killed-music-drm-why-not-movies-2/
Comments URL: https://news.ycombinator.com/item?id=42043509
Points: 2
# Comments: 0
Show HN: Happy Inbox – Privacy First Gmail Cleanup
Hey HN,
I have always been one of those who finds it very hard to maintain a clean inbox. Two main issues stood out: first, Gmail doesn’t make it easy to identify the biggest space hogs, and second, deleting large quantities of emails isn’t intuitive. I realized that inbox cleanup could be much simpler with the right approach.
Problem with existing solutions: When I looked for tools to solve this, I found they were either pricey or selling user data to third parties. For me, email holds some of my most sensitive personal data, so data-sharing was an absolute dealbreaker. Plus, Gmail cleanup is usually done periodically, so paying monthly fees wasn't convincing enough.
What Happy Inbox does differently: Happy Inbox organizes emails by volume. For example, if you have 1,800 emails from "Amazon Promotions," we group them in a “1500+” bucket, making it easy to delete all with a single click or selectively choose what to remove. This feature gives users clear insight into their top space consumers and an efficient way to clean up, all while prioritizing privacy. So you can check once in a while and clear out your top space cloggers and easily get back your inbox space. Easy-Peasy!!
Our journey so far: We launched Happy Inbox four months ago and have grown organically helped people worldwide delete over 6 million emails, showing just how much inbox clutter people are dealing with!
We’d love to hear your feedback and any ideas for improvement. Try it out here: www.happy-inbox.com
Comments URL: https://news.ycombinator.com/item?id=42043504
Points: 1
# Comments: 0
Auden's Island
Article URL: https://hedgehogreview.com/issues/in-need-of-repair/articles/audens-island
Comments URL: https://news.ycombinator.com/item?id=42043490
Points: 2
# Comments: 0
Don't Fragment My UDP Packets
Article URL: https://nanovms.com/dev/tutorials/dont-fragment-my-udp-packets
Comments URL: https://news.ycombinator.com/item?id=42043482
Points: 1
# Comments: 0
Tiny GraphRAG in 1000 lines of Python
Article URL: https://www.stephendiehl.com/posts/graphrag1/
Comments URL: https://news.ycombinator.com/item?id=42043470
Points: 4
# Comments: 0
Yellowstone's Abyss Pool Is Getting Hotter, Changing Colors and Could Explode
Article URL: https://cowboystatedaily.com/2024/11/03/yellowstones-abyss-pool-is-getting-hotter-changing-colors-and-could-explode/
Comments URL: https://news.ycombinator.com/item?id=42043455
Points: 3
# Comments: 0
Google Says Its AI Found SQLite Vulnerability That Fuzzing Missed
Article URL: https://www.securityweek.com/google-says-its-ai-found-sqlite-vulnerability-that-fuzzing-missed/
Comments URL: https://news.ycombinator.com/item?id=42043453
Points: 3
# Comments: 1