15.8 C
New York
Wednesday, March 19, 2025
Home Blog Page 8

ios – CGImage to vImage buffer conversion results in improper colours


I’m changing an UIImage to a Vimage_Buffer. The code appears to be like as follows:

    CGImageRef originalImageRef = [image CGImage];
    CGColorSpaceRef originalColorSpace = CGImageGetColorSpace(originalImageRef);
    CGColorRenderingIntent intent = CGImageGetRenderingIntent(originalImageRef);
    
    vImage_CGImageFormat inputImageFormat =
    {
        .bitsPerComponent = (uint32_t) CGImageGetBitsPerComponent(originalImageRef),
        .bitsPerPixel = (uint32_t) CGImageGetBitsPerComponent(originalImageRef) * (uint32_t)(CGColorSpaceGetNumberOfComponents(originalColorSpace) + (kCGImageAlphaNone != CGImageGetAlphaInfo(originalImageRef))),
        .colorSpace = originalColorSpace,
        .bitmapInfo = CGImageGetBitmapInfo(originalImageRef),
        .model = 0,
        .decode = NULL,
        .renderingIntent = kCGRenderingIntentDefault
    };
    
    vImage_Error error = vImageBuffer_InitWithCGImage(inputImageBuffer, &inputImageFormat, NULL, originalImageRef, kvImageNoFlags);
    if (error  == kvImageNoError) {
        NSLog(@"picture to vimage buffer conversion full");
    } else {
        NSLog(@"picture to vimage buffer conversion failed");
    }

However the ensuing buffer colours are all completely different. All of the Blue tones develop into Yellow and so forth. I attempted the next code as properly:

   CGImageRef sourceRef = [image CGImage];
   NSUInteger sourceWidth = CGImageGetWidth(sourceRef);
   NSUInteger sourceHeight = CGImageGetHeight(sourceRef);

   CGDataProviderRef supplier = CGImageGetDataProvider(sourceRef);
   CFDataRef bitmapData = CGDataProviderCopyData(supplier);

   unsigned char *sourceData = (unsigned char*)calloc(sourceHeight * sourceWidth * 4, sizeof(unsigned char));
   NSUInteger bytesPerPixel = 4;
   NSUInteger sourceBytesPerRow = bytesPerPixel * sourceWidth;

   CFDataGetBytes(bitmapData, CFRangeMake(0, CFDataGetLength(bitmapData)), sourceData);

   vImage_Buffer v_image = {
       .information = (void *)sourceData,
       .top = sourceHeight,
       .width = sourceWidth,
       .rowBytes = sourceBytesPerRow
   };

   CFRelease(bitmapData);

However this additionally appears to have identical downside. Any assist on this regard is very appreciated.

Home windows File Explorer Vulnerability Permits Community Spoofing Assaults: PoC Launched

0


A crucial vulnerability in Home windows File Explorer has been found, permitting attackers to seize NTLM hashes and probably exploit them for community spoofing assaults.

The vulnerability, recognized as CVE-2025-24071, includes the automated processing of specifically crafted .library-ms information inside compressed archives like RAR or ZIP.

When these information, containing paths to attacker-controlled SMB servers, are extracted, Home windows Explorer initiates an implicit NTLM authentication handshake, leaking delicate credentials with out requiring person interplay, as per a report by CTI monster.

CVE-2025-24071: Overview of the Vulnerability

CVE-2025-24071 is a major problem in Home windows File Explorer that exploits the automated processing of .library-ms information.

These XML-based information outline search and library areas and are trusted by Home windows Explorer.

When a .library-ms file containing an SMB path is extracted from a compressed archive, Home windows Explorer makes an attempt to resolve this path routinely to assemble metadata and index file data.

This course of triggers an NTLM authentication handshake with the attacker-controlled SMB server, leaking the sufferer’s NTLMv2 hash with none express person interplay.

Translation from Russian for the threat actor's postTranslation from Russian for the threat actor's post
Translation from Russian for the risk actor’s put up

The vulnerability is especially harmful as a result of it doesn’t require the person to open or execute the extracted file; merely extracting it from the archive is sufficient to set off the NTLM hash leak.

This makes it a strong software for attackers looking for to compromise community safety via pass-the-hash assaults or offline NTLM hash cracking.

Technical Rationalization

  1. Automated File Processing: Upon extraction from a compressed archive, Home windows Explorer and the SearchProtocolHost.exe service routinely course of the .library-ms file. This includes opening the file, studying its contents to extract metadata, and querying file data. These operations happen with none express person interplay and might be noticed utilizing instruments like Procmon.
  2. SMB Communication: The extraction course of triggers SMB communication makes an attempt. Utilizing Wireshark with an SMB filter, researchers can seize the SMB2 Negotiate Protocol Request and the SMB2 Session Setup Request, which clearly present the initiation of an NTLM authentication handshake between the sufferer’s system and the attacker-controlled SMB server.

Proof of Idea (PoC)

A Proof of Idea (PoC) for CVE-2025-24071 has been launched on GitHub.

It demonstrates how attackers can exploit this vulnerability to seize NTLM hashes by making a specifically crafted .library-ms file and embedding it inside a RAR or ZIP archive.

The PoC might be executed utilizing Python, requiring minimal enter such because the goal file identify and the attacker’s IP handle.

python poc.py

# Enter file identify: your_file_name

# Enter IP: attacker_IP

CVE-2025-24071 is reportedly being exploited within the wild. Based on data from boards like xss.is, risk actors are using this vulnerability for credential theft.

The risk actor often called “Krypt0n” is linked to its exploitation and has developed malware often called “EncryptHub Stealer.”

The vulnerability’s potential for exploitation is underscored by its provide on the market on darkish net boards, additional emphasizing the urgency of patching affected programs.

Mitigation and Patch

Microsoft addressed CVE-2025-24071 in its March Patch Tuesday replace. Customers are suggested to make sure their Home windows programs are up to date with the most recent safety patches to forestall exploitation.

Because the vulnerability is actively being exploited, quick motion is essential to guard towards potential community spoofing assaults.

The invention and exploitation of CVE-2025-24071 spotlight the continued challenges in securing Home windows programs towards subtle threats.

By understanding how vulnerabilities like this one are exploited and taking proactive steps to patch and defend programs, customers can considerably cut back the chance of falling sufferer to such assaults.

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get dwell Entry with ANY.RUN -> Begin Now for Free. 

Is Generative AI a Blessing or a Curse? Tackling AI Threats in Examination Safety

0


Because the technological and financial shifts of the digital age dramatically shake up the calls for on the worldwide workforce, upskilling and reskilling have by no means been extra vital. Because of this, the necessity for dependable certification of latest abilities additionally grows.

Given the quickly increasing significance of certification and licensure checks worldwide, a wave of providers tailor-made to serving to candidates cheat the testing procedures has naturally occurred. These duplicitous strategies don’t simply pose a risk to the integrity of the talents market however may even pose dangers to human security; some licensure checks relate to vital sensible abilities like driving or working heavy equipment. 

After companies started to catch on to standard, or analog, dishonest utilizing actual human proxies, they launched measures to stop this – for on-line exams, candidates started to be requested to maintain their cameras on whereas they took the take a look at. However now, deepfake expertise (i.e., hyperrealistic audio and video that’s usually indistinguishable from actual life) poses a novel risk to check safety. Available on-line instruments wield GenAI to assist candidates get away with having a human proxy take a take a look at for them. 

By manipulating the video, these instruments can deceive companies into pondering that a candidate is taking the examination when, in actuality, another person is behind the display (i.e., proxy testing taking). Standard providers enable customers to swap their faces for another person’s from a webcam. The accessibility of those instruments undermines the integrity of certification testing, even when cameras are used.

Different types of GenAI, in addition to deepfakes, pose a risk to check safety. Giant Language Fashions (LLMs) are on the coronary heart of a world technological race, with tech giants like Apple, Microsoft, Google, and Amazon, in addition to Chinese language rivals like DeepSeek, making large bets on them.

Many of those fashions have made headlines for his or her capacity to move prestigious, high-stakes exams. As with deepfakes, unhealthy actors have wielded LLMs to use weaknesses in conventional take a look at safety norms.

Some corporations have begun to supply browser extensions that launch AI assistants, that are laborious to detect, permitting them to entry the solutions to high-stakes checks. Much less subtle makes use of of the expertise nonetheless pose threats, together with candidates going undetected utilizing AI apps on their telephones whereas sitting exams.

Nonetheless, new take a look at safety procedures can supply methods to make sure examination integrity towards these strategies.

The right way to Mitigate Dangers Whereas Reaping the Advantages of Generative AI

Regardless of the quite a few and quickly evolving purposes of GenAI to cheat on checks, there’s a parallel race ongoing within the take a look at safety business.

The identical expertise that threatens testing may also be used to guard the integrity of exams and supply elevated assurances to companies that the candidates they rent are certified for the job. Because of the always altering threats, options should be inventive and undertake a multi-layered method.

One modern means of lowering the threats posed by GenAI is dual-camera proctoring. This system entails utilizing the candidate’s cell system as a second digicam, offering a second video feed to detect dishonest. 

With a extra complete view of the candidate’s testing atmosphere, proctors can higher detect using a number of screens or exterior gadgets that is likely to be hidden exterior the standard webcam view.

It could actually additionally make it simpler to detect using deepfakes to disguise proxy test-taking, because the software program depends on face-swapping; a view of all the physique can reveal discrepancies between the deepfake and the particular person sitting for the examination.

Refined cues—like mismatches in lighting or facial geometry—turn out to be extra obvious when put next throughout two separate video feeds. This makes it simpler to detect deepfakes, that are usually flat, two-dimensional representations of faces.

The additional benefit of dual-camera proctoring is that it successfully ties up a candidate’s cellphone, which means it can’t be used for dishonest. Twin-camera proctoring is even additional enhanced by means of AI, which improves the detection of dishonest on the dwell video feed.

AI successfully gives a ‘second set of eyes’ that may always give attention to the live-streamed video. If the AI detects irregular exercise on a candidate’s feed, it points an alert to a human proctor, who can then confirm whether or not or not there was a breach in testing rules. This extra layer of oversight gives added safety and permits hundreds of candidates to be monitored with further safety protections.

Is Generative AI a Blessing or a Curse?

Because the upskilling and reskilling revolution progress, it has by no means been extra vital to safe checks towards novel dishonest strategies. From deepfakes disguising test-taking proxies to using LLMs to offer solutions to check questions, the threats are actual and accessible. However so are the options. 

Happily, as GenAI continues to advance, take a look at safety providers are assembly the problem, staying on the reducing fringe of an AI arms race towards unhealthy actors. By using modern methods to detect dishonest utilizing GenAI, from dual-camera proctoring to AI-enhanced monitoring, take a look at safety companies can successfully counter these threats. 

These strategies present companies with the peace of thoughts that coaching applications are dependable and that certifications and licenses are veritable. By doing so, they will foster skilled development for his or her staff and allow them to excel in new positions. 

After all, the character of AI signifies that the threats to check safety are dynamic and ever-evolving. Due to this fact, as GenAI improves and poses new threats to check integrity, it’s essential that safety companies proceed to spend money on harnessing it to develop and refine modern, multi-layered safety methods.

As with every new expertise, individuals will attempt to wield AI for each unhealthy and good ends. However by leveraging the expertise for good, we will guarantee certifications stay dependable and significant and that belief within the workforce and its capabilities stays robust. The way forward for examination safety is not only about maintaining – it’s about staying forward. 

Sorry, Elon, However “Conservatives” Will Not Pull Your Toes Out Of The Hearth



Join day by day information updates from CleanTechnica on e-mail. Or comply with us on Google Information!


Final Up to date on: nineteenth March 2025, 12:25 am

A current article right here at CleanTechnica (written by an creator I respect and like, to be clear) obtained a response from Elon Musk. Elon used to comply with us on Twitter, and we used to get reactions to our content material on a regular basis, however when he began veering to the laborious proper, disagreements over his dealing with of LGBT points led to him unfollowing and later sending hordes of flying monkeys to discredit us. As of late, it’s very uncommon for him to love something we write.

The explanation he favored the article was for a similar motive he used to love our articles: it was favorable to him. Like all narcissists, Elon Musk can’t deal with criticism and disagreement. I figured this out sooner than most writers right here after I noticed the indicators of narcissism and abusiveness in late 2019, however that’s solely as a result of I’m a girl who has been in a relationship with a narcissistic, abusive man and knew what to search for. Because it turned obvious what we had been coping with, attitudes and protection by different writers modified and a few who couldn’t deal with the reality left.

Particularly, Elon beloved the article (or a minimum of clicked a coronary heart about it) as a result of it raised hopes that conservatives had been going to bail Tesla out.

The Dangerous Spot Tesla Is In

Electrical autos have lengthy been favored by folks shopping for them for environmental causes, and that is unusual amongst conservatives and their additional proper allies. With Elon Musk going all in on supporting the Trump Regime and main efforts that a number of judges have discovered to be unlawfully dismantling the federal government, liberals and lefties are rightfully pissed off. In an try to knock Elon Musk out of the sport, a few of them are protesting at Tesla retail areas. Some folks (who might or might not be among the many protesters, we don’t know for certain) are coming again after darkish to graffiti partitions, set Teslas on fireplace, and even do drive-by shootings.

EVs aren’t only for “libs” although. The tire-shredding torque, the truth that Teslas are made in America, and the flexibility to contribute to American power independence are all nice conservative promoting factors. With Elon becoming a member of MAGA and shredding the federal authorities aside, that’s simply extra upside for conservatives to purchase.

Whereas curiosity is certainly up, the rise in gross sales to conservatives are minuscule in comparison with losses within the left-leaning buyer base. With steep declines in Tesla gross sales amid all of this unhealthy press, the inventory has declined precipitously. Automobiles are stacking up in unguarded storage heaps, which have been simple targets for additional vandalism.

Elon Musk’s web value and the worth of his belongings are falling, which reduces his capability to borrow cash and proceed working full-time for the Trump Regime. So, Trump not too long ago tried to bail him out by holding a Tesla infomercial on the White Home. Because the article identified, conservative celebrities (unhealthy cosmetic surgery and make-up and all) have been exhibiting their Teslas off. Search engine curiosity has taken off, too.

What The Article Didn’t Get Proper About Elon and Trump’s Scenario

There have been a few claims primarily based on unhealthy knowledge that the article relied on.

First, Elon Musk and Donald Trump usually are not standard figures. There are just a few unhealthy polls that may be misinterpreted to come back to the conclusion that all the things is ok in Magatland, however Gallup polling tells a really completely different story. At this level in a presidential time period, presidents common about 61% assist, and U.S. presidents common 52% general. Donald Trump is doing barely higher than he did throughout this level of his first time period (he’s at 45% approval, in comparison with 42% in 2017), however he’s positively accredited of by a minority and is under common general. To name him “standard” can be inaccurate at greatest.

Extra particularly to Elon and his faux DOGE company, Individuals approve even much less. The newest polling from Quinnipiac College (a college not recognized for biased polls) confirmed that 54% of respondents agreed that DOGE is doing “extra injury than good.” Solely 36% assist the large cuts to federal jobs. Just like the Gallup polling, Quinnipiac discovered that Trump was disapproved of by a small majority.

Lastly, I believe it’s very a lot debatable that Tesla makes one of the best EVs. This largely boils right down to style, however there are a rising variety of EV fashions which have higher specs (together with 800-volt architectures) and a comparable or higher driving expertise in comparison with Tesla’s autos. These different manufacturers have entry to a lot of Tesla’s Supercharger community, in order that benefit isn’t a factor anymore. Whereas there’s no method to quantify style and elegance, holding out Tesla’s EVs is an opinion and never a truth in 2025.

With declining assist for Elon Musk, DOGE, and the Trump administration, getting conservatives on board isn’t a slam dunk for saving the corporate. 

What Can Really Save Tesla

Whereas I don’t like Tesla’s design language and I’ve critical disagreements with the CEO, I don’t personally hope that the corporate goes underneath. I’d actually wish to see it succeed sooner or later and maintain pushing the auto trade to maintain going electrical.

However I don’t see how that may occur with Elon Musk on the helm. There are particular issues an individual can do to completely flip folks off to having something to do with them. For me, Elon Musk has repeatedly crossed that line. I’ve members of the family within the LGBT group who’ve been attacked by Trump with Elon’s help, and I’m personally involved for my very own security and rights as an intersex individual caught within the crossfire. I’ve household in Mexico, and I can see the racism within the actions of the Trump administration. I’m deeply involved that Elon Musk and Donald Trump are aiding authoritarian regimes all over the world, and are abandoning allies globally. One place that’s particular to me as a result of I lived there’s Taiwan.

For my very own sanity, I’ll must forgive Elon and Trump once they’re not in energy and have stopped wrecking issues I care about. However that doesn’t imply I’ll ever belief both of these scoundrels once more. Idiot me as soon as, disgrace on you. Idiot me twice, disgrace on me!

Taking a look at polls and sentiment on the web, I’m removed from the one one who feels this fashion. Some individuals who voted for Trump remorse it as a result of both themselves or members of the family misplaced their jobs. Non-criminal undocumented immigrants have been deported, regardless of having lived within the U.S. for many years and being married to residents. One citizen youngster recovering from mind most cancers was reportedly deported as a result of her dad and mom had been right here towards the foundations. You possibly can’t construct up that form of sick will and count on folks to need to do enterprise with you!

If Tesla goes to make it, Elon has to go. He must resign from his place and promote sufficient inventory to not management the corporate. Solely then are folks going to cease associating the corporate with him. Merchandise will seemingly enhance with skilled adults with out OCD and different psychological problems operating the present. Elon can then go put money into different issues that don’t make him susceptible to activists if he’s sensible in any respect.

Featured picture: a screenshot from Google Shares.

Whether or not you’ve gotten solar energy or not, please full our newest solar energy survey.



Chip in just a few {dollars} a month to assist assist unbiased cleantech protection that helps to speed up the cleantech revolution!


Have a tip for CleanTechnica? Need to promote? Need to counsel a visitor for our CleanTech Speak podcast? Contact us right here.


Join our day by day publication for 15 new cleantech tales a day. Or join our weekly one if day by day is simply too frequent.


Commercial



 


CleanTechnica makes use of affiliate hyperlinks. See our coverage right here.

CleanTechnica’s Remark Coverage




New Advert Fraud Marketing campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Adverts

0


Mar 18, 2025Ravie LakshmananAdvert Fraud / Cell Safety

New Advert Fraud Marketing campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Adverts

Cybersecurity researchers have warned a few large-scale advert fraud marketing campaign that has leveraged lots of of malicious apps printed on the Google Play Retailer to serve full-screen adverts and conduct phishing assaults.

“The apps show out-of-context adverts and even attempt to persuade victims to present away credentials and bank card info in phishing assaults,” Bitdefender mentioned in a report shared with The Hacker Information.

Particulars of the exercise had been first disclosed by Integral Advert Science (IAS) earlier this month, documenting the invention of over 180 apps that had been engineered to deploy infinite and intrusive full-screen interstitial video adverts. The advert fraud scheme was codenamed Vapor.

Cybersecurity

These apps, which have since been taken down by Google, masqueraded as authentic apps and collectively amassed greater than 56 million downloads between them, producing over 200 million bid requests day by day.

“Fraudsters behind the Vapor operation have created a number of developer accounts, every internet hosting solely a handful of apps to distribute their operation and evade detection,” the IAS Risk Lab mentioned. “This distributed setup ensures that the takedown of any single account would have minimal impression on the general operation.”

By mimicking seemingly innocent utility, health, and way of life functions, the operation has been capable of efficiently dupe unwitting customers into putting in them. The marketing campaign stays ongoing, with the most recent malware-laced app printed within the Google Play Retailer within the first week of March 2025.

New Ad Fraud Campaign

One other vital facet is that the menace actors have been discovered using a sneaky method known as versioning, which entails publishing to the Play Retailer a purposeful app sans any malicious performance such that it passes Google’s vetting course of. The malicious performance is launched in subsequent app updates, changing the authentic options with ways to maximise advert income by way of video adverts.

What’s extra, the adverts hijack the machine’s complete display screen and forestall the sufferer from utilizing the machine, rendering it largely inoperable. It is assessed that the marketing campaign started someday round April 2024, earlier than increasing at first of this yr. Greater than 140 bogus apps had been uploaded to the Play Retailer in October and November alone.

The most recent findings from the Romanian cybersecurity firm present that the marketing campaign is larger than beforehand thought, that includes as many as 331 apps that racked up greater than 60 million downloads in complete.

In addition to hiding the app’s icon from the launcher, a number of the recognized functions have additionally been noticed making an attempt to gather bank card information and consumer credentials for on-line companies by displaying faux pages. The malware can also be able to exfiltrating machine info to an attacker-controlled server.

One other method used for detection evasion is using Leanback Launcher, a sort of launcher particularly designed for Android-based TV units, and altering its personal title and icon to impersonate Google Voice.

Cybersecurity

“Attackers discovered a solution to disguise the apps’ icons from the launcher, which is restricted on newer Android iterations,” Bitdefender mentioned. “The apps can begin with out consumer interplay, regardless that this shouldn’t be technically potential in Android 13.”

It is believed that the marketing campaign is the work of both a single menace actor or a number of cybercriminals who’re making use of the identical packing device that is marketed on the market on underground boards.

“The investigated functions bypass Android safety restrictions to start out actions even when they don’t seem to be working within the foreground and, with out required permissions to take action, spam the customers with steady, full-screen adverts,” the corporate added. “The identical habits is used to serve UI parts that includes phishing makes an attempt.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.