April 10, 2024
April 10, 2024
Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF.
— stacksmashing (@ghidraninja) April 9, 2024
I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁 https://t.co/hGzdCSvn93 pic.twitter.com/C88NaJH8rU
Attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark)
— 0xor0ne (@0xor0ne) April 9, 2024
Interesting white paper (2022) by @Josep_Pi (@IOActive)
White paper link: https://t.co/zmJ1Bhx9c4 #automotive #cybersecurity pic.twitter.com/oZNV1U0M5M
In 2016, @dagrz gave one of the greatest cloud security talks ever, filled with new techniques that have been rediscovered repeatedly in the years since. I've remastered it from video obtained from an audience member and the slide deck. https://t.co/o0sMXeZPiw
— Scott Piper (@0xdabbad00) October 17, 2021
"A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat" is a talk presented by Sunoo Park at RWC 2024. https://t.co/bVjSja26zg
— Aristotle Tzafalias (@Aristot73) April 9, 2024
Slides here: https://t.co/mcZHP10q8v
ZDI blog: " This is the largest Patch Tuesday release from Microsoft of all time."https://t.co/GHcXhZEb3j
— Ryan Naraine (@ryanaraine) April 9, 2024
you: i use Claude 3 Opus for coding
— Mert (@mertdumenci) April 10, 2024
me: i use the Amazon Shopping app for coding pic.twitter.com/OMeOmFvQpK
📌The EXPMON system is mainly a #sandbox-based system but with static analysis modules. Unlike all the other sandboxes that I know, EXPMON is specifically designed and built for detecting advanced file-based #exploits.
— Ring3API 🇺🇦 We Are Fighting For Our Land (@ntlmrelay) April 9, 2024
➡️[blog]https://t.co/ZSBTm8mqwC… pic.twitter.com/zQtYU6cyMC
Scraping onion sites across Tor hidden services in an automated way -- quick crash course on some of the command-line tools or Python libraries that can help you create your own custom monitoring tools for cybercrime: https://t.co/M5zpzHf6Fq pic.twitter.com/E9wHzwFom3
— John Hammond (@_JohnHammond) April 9, 2024
"When Russia unleashed its war on Ukraine, the DGSE had the same technical information as its American partners ... The problem is then how you exploit and analyse that information and the way in which you think an event will or won’t take place".https://t.co/9lyGTzwYQC
— Dr. Dan Lomas (@Sandbagger_01) April 9, 2024
https://archive.is/CGHxf
Are these Crowdstrike or Microsoft threat actor names? https://t.co/yiCBT2cwB8
— Shane Huntley (@ShaneHuntley) April 9, 2024
Spearmint Rhino is suing the Peppermint Hippo
— Las Vegas Locally 🌴 (@LasVegasLocally) April 9, 2024
A thread of the variety of products on ships that allow remote monitoring of critical systems on ships.
— Cybergibbons 🚲🚲🚲 (@cybergibbons) April 9, 2024
Just really want to put to bed the idea that systems are always air gapped.
Kongsberg offer multiple systems allowing remote monitoring of ICMS.https://t.co/QFdDdeZnWm pic.twitter.com/Xf8hUtXM9d