April 9, 2024
April 9, 2024
In a shot across Microsoft's bow, @RonWyden is introducing legislation that would set a four-year deadline for the government to stop using collaboration software that isn't interoperable with competing products. https://t.co/qZHkO3wRue pic.twitter.com/L7EsFMv77e
— Eric Geller (@ericgeller) April 8, 2024
This is so cool https://t.co/MA82u1kkBr@toool #lego #lockpicking #locksport
— raptor@infosec.exchange (@0xdea) April 9, 2024
"The boom, the bust, the adjust and the unknown"
— Maor Shwartz (@malltos92) April 9, 2024
The industry around us changes at a faster pace than ever before.
This will force the different stakeholders to reevaluate their strategy and how they will decide to move forward. #Zer0Con2024 https://t.co/eTFbRL49jC
CPR recently discovered a dating app with over 10 million downloads that had vulnerabilities, allowing precise location determination of their users, even with distance display being disabled. https://t.co/6Tz81U7if9
— Check Point Research (@CPResearch) April 8, 2024
The best defence against ransowmare is to actually defend against ransowmare.
— mRr3b00t (@UK_Daniel_Card) April 9, 2024
And herein lies the problem…. The elephant in the cyber room perhaps?
Take a look here:https://t.co/vMbUrcxunj
Look the ransowmare kill chains aren’t insanely complex, they opposite. What does… https://t.co/lHDZTvhnl6
Really excellent, interesting article on #ransomware strategy from @AlexMartin @TheRecord_Media , even if I disagree with quite a lot of what’s quoted, except myself of course 😂 1/3https://t.co/W002mOEzNy
— Ciaran Martin (@ciaranmartinoxf) April 8, 2024
A simple Samsung Shannon loader - lean solution to load Exynos Modem images in IDA Pro 8.xhttps://t.co/VDZyw4r4Ud
— alx (alxhh) (@alexander_pick) April 8, 2024
It's ironic that most of the best security controls we have (well, so far as anyone can tell) are not implemented by buying magic tech add-on security stuff or hiring more expert "security" personnel but by thoughtfully but determinedly implementing classical IT measures better. https://t.co/zxUJOhzo8x
— Brian in Pittsburgh (@arekfurt) April 8, 2024
Excellent CTF challenges writeups for learning the msg_msg technique for arbitrary read and write for Linux kernel exploitationhttps://t.co/IdUyVbRATuhttps://t.co/wLXOKNdKv6#Linux #cybersecurity pic.twitter.com/WDpiefLBPu
— 0xor0ne (@0xor0ne) April 9, 2024
An espionage scandal rocks Austria, laying bare alleged Russian spying operations across Europehttps://t.co/S3ZgZRK7rd
— Dr. Dan Lomas (@Sandbagger_01) April 9, 2024
BREAKING
— H I Sutton (@CovertShores) April 8, 2024
Sea Drone (USV) found in Black Sea Is American AM-800 Boat with Massive Soviet STYX missile warhead#Ukraine #Russia #OSINT https://t.co/d51XGiVcP3
As much as the new tech is cool, the older stuff like ICMP is still useful: https://t.co/AVJ9g7wv6e
— Daniel Cuthbert (@dcuthbert) April 8, 2024
exfil via 32-byte echo requests
this is really funny if you know anything about jonas’ work
— fox 🦊🏳️🌈 (@soft_fox_lad) April 8, 2024
(he’s, IMO, one of the world’s best & most accomplished windows kernel security researchers. the tweet makes him seem like some silly guy) https://t.co/aQHdy9RxrB
guys like this are every software engineer’s worst nightmare pic.twitter.com/8PeTj8ui67
— varepsilon (@var_epsilon) April 8, 2024
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code executionhttps://t.co/mVu85fOmD2
— Simone Margaritelli (@evilsocket) April 8, 2024
https://www.hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html