August 14, 2024
August 14, 2024
Great research from my colleagues @CyberCX into a China based network attempting social media interference against the West.
— Ciaran Martin (@ciaranmartinoxf) August 13, 2024
As ever these days, the intent - & some of the glaring tradecraft weaknesses - are more interesting than any impact https://t.co/wuXOyelay6
Iran: Look at this aircraft carrier we stealthily took video of
— ✨️KaiMana!✨️🚑 @ Furrydelphia! (@CertifiedLeggi) August 12, 2024
The US Military™: This you? pic.twitter.com/DZXpvurDLM
Trail of Bits is heading to the AIxCC finals! 🏆 Our Cyber Reasoning System, Buttercup, ranked in the top 7 out of 39 teams in the @DARPA AI Cyber Challenge semifinals @defcon 2024. https://t.co/ymP73nXaDW
— Trail of Bits (@trailofbits) August 13, 2024
Thread by @trailofbits on Thread Reader App – Thread Reader App
@trailofbits: Trail of Bits is heading to the AIxCC finals! 🏆 Our Cyber Reasoning System, Buttercup, ranked in the top 7 out of 39 teams in the @DARPA AI Cyber Challenge semifinals @defcon 2024. buff.ly/4dGrdRz @DAR...…
Lots of good info in this thread from @trailofbits but this particular bit is worth highlighting. Finding bugs is not usually a bottleneck for defenders or attackers. But patching and reliable exploitation are respectively, and these have more in common than you may think!
— chrisrohlf (@chrisrohlf) August 13, 2024
Both… https://t.co/8EuCtxw8bp
Oh come on.😏 Not too many of y'all got the reference to arguably the most consequential credential phishing email attack in history.
— Brian in Pittsburgh (@arekfurt) August 13, 2024
And in a week where we're talking about hack-and-leak again too.
SMH.https://t.co/nYodDLykLP https://t.co/Rtp69qA5Or pic.twitter.com/Lq15fwTXGN
This list is worth keeping in mind when evaluating a LLM, or LLM based product, that can find/exploit vulns. Thought experiment: what proportion of vulns/exploits meets these conditions? It's empirically > 0, but is it > 10? 50? 90? https://t.co/Hv4nbSnTqK
— Sean Heelan (@seanhn) August 13, 2024
New from 404 Media: Michael Pratt was on the run from the FBI. He ran a massive trafficking ring on PornHub. No one knew where he was. So some friends decided to track him down through his love of sneakers. Here is their story told for the first time https://t.co/FKSsby8Rr0
— Joseph Cox (@josephfcox) August 13, 2024
So Microsoft has this really awesome repository with scripts we used to harden privileged workstations with
— Nathan McNulty (@NathanMcNulty) August 13, 2024
It hasn't been officially updated in years, and someone made a huge PR to address lots of issues
Nobody has looked at it for over a year... 😭https://t.co/P2Q3Ckwd4D pic.twitter.com/C1cuXcfLCa
CVE-2024-38077/One bug to Rule Them All, Exploiting a Preauth RCE vulnerability on Windows (2024_8_9 10_59_06).html at main · Wlibang/CVE-2024-38077 · GitHub
CVE-2024-38077,本仓库仅用作备份,. Contribute to Wlibang/CVE-2024-38077 development by creating an account on GitHub.
Via Daily Dave mailing list.
Why exploits prefer memory corruption
— sha1lan (@sha1lan) August 12, 2024
Thanks to @halvarflake and @chompie1337!https://t.co/Z9ZtLlsYOw
PACIBSP security | A computer security blog with an analytical bent.
A computer security blog with an analytical bent.
If you find these in your child’s room, it’s time to have a serious talk with them about the dangers of hacking pic.twitter.com/B2hWl1HC6f
— Dr. Wesley McGrew (@McGrewSecurity) August 12, 2024
A quick overview of the Research Handbook on Cyberwarfarehttps://t.co/8OTzyhbGJ1@tcstvns @josephdevanny
— Dave Aitel (@daveaitel) August 13, 2024
CyberSecPolitics: A quick research overview of the Research Handbook on Cyberwarfare
Introduction As you were reading the latest Research Handbook on Cyberwarfare (edited by Tim Stevens and Joe Devanny) you probably felt, li...
current tech trends are resistant to satire precisely because they satirize themselves. a car park of empty cars, honking at one another, nudging back and forth to drop off nobody, is a perfect image of tech serving its own prerogatives rather than humanity’s https://t.co/eYyITQfDpm
— James Vincent (@jjvincent) August 13, 2024
back when likes were public I used to use the API to scrape all the accounts that liked anti-math posts, guesstimate their location, and then sell the list to local dealerships so they could try to sell those people dodge challengers at 29% APR https://t.co/ELXfahBpiD
— andi (e/alb) (@Nexuist) August 14, 2024
Fool Kaspersky's Anti-Virus with a perl 1-liner:https://t.co/XW9oYTlK7Y pic.twitter.com/8F1eLPVJaO
— The Hacker's Choice (@thc@infosec.exchange) (@hackerschoice) August 13, 2024
The numbers are certainly open to doubt, but this is just the latest use by MSS to warn of foreign threats on WeChat, and part of a much wider trend of modern day agencies using social media.https://t.co/MB9Bv5YLZ0
— Dr. Dan Lomas (@Sandbagger_01) August 13, 2024
Our slide 'Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface' is available now https://t.co/f4syV1rADX
— kong Thank (@Thankkong) August 14, 2024
A whitepaper with detailed content will be released in the near future.@BlackHatEvents
EFF’s Concerns About the UN Draft Cybercrime Convention
EFF’s Concerns About the UN Draft Cybercrime Convention | Electronic Frontier Foundation
The proposed UN Cybercrime Convention is an extensive surveillance pact that imposes intrusive domestic surveillance measures and mandates states’ cooperation in surveillance and data sharing. It requires states to aid each other in cybercrime investigations and prosecutions, allowing the...
NIST publishes standards for next-generation cryptography (cipher, digital signature) understood as resistant to attacks with future quantum computers. Migration will not be a piece of cake, but there’s time. https://t.co/2uebDrTeJT https://t.co/XxWmDhXxM7 https://t.co/XxWmDhXxM7 pic.twitter.com/glJq8SwyCK
— Lukasz Olejnik (@lukOlejnik) August 13, 2024
New: A German intelligence service managed to monitor two servers used by Russian propaganda campaign Doppelganger. After we published our investigation into the campaign's infrastructure in July, the agency's analysts observed something interesting ... https://t.co/DeRfDqYYRv
— Max Bernhard | @mxbernhard.bsky.social (@mxbernhard) August 13, 2024
On the day our investigation published, the intelligence agency's analysts saw how someone frantically tried to log into one of the servers - getting the password and username wrong several times. When they finally got in, they quickly saved all the data from the device. pic.twitter.com/Q3X3wZQrWE
— Max Bernhard | @mxbernhard.bsky.social (@mxbernhard) August 13, 2024
Read the investigation by @alexejhock @_TimetoDiscover and I here: https://t.co/bgYXN7N1Uu
— Max Bernhard | @mxbernhard.bsky.social (@mxbernhard) August 13, 2024
And the Bavarian domestic intelligence services analysis here: https://t.co/y8iguTE7XF
Today, we make public our latest research on Doppelganger. https://t.co/LUKl4U5ItY pic.twitter.com/G6vOvNzv6q
— Qurium Media (@Qur1um) July 11, 2024