August 20, 2024
August 20, 2024
The time has come, and with it your reading material for the week.
— Phrack Zine (@phrack) August 19, 2024
Phrack #71 is officially released ONLINE! Let us know what you think!https://t.co/BRnK9lnGjI pic.twitter.com/jVHd7kurE5
Windows API Function Cheat Sheet by @7etsuo: https://t.co/aWjrz3j656
— ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) August 20, 2024
Been trying to catch up on all the research coming out of Vegas this month.
— Matt Johansen (@mattjay) August 19, 2024
Saw this TechCrunch article by @zackwhittaker that I think is a good list: pic.twitter.com/6lhiTDj6rU
The best hacks and security research from Black Hat and Def Con 2024 | TechCrunch
Here is a look back at the top security research from the annual hacker conferences, Black Hat and Def Con 2024.
One young man tried to spy on a NATO base.
— Organized Crime and Corruption Reporting Project (@OCCRP) August 20, 2024
Another, nicknamed 'The Kid' for his youthful looks, went to Kyiv to commit arson. Both failed.
But they had been hired by Russian agents. And their cases, though a bit tragicomic, shed light on a bigger story.https://t.co/PzvdWe63JC
This is a thorough report from @RANDCorporation on historical analogues to inform AI governance. The section on encryption mirrors what I’ve been communicating to policy makers and publicly for over a year now. Like cryptography, AI + cyber is a fundamentally dual use technology.… https://t.co/U0B4Uki1gi pic.twitter.com/c62Fa5DrH9
— chrisrohlf (@chrisrohlf) August 19, 2024
Algorithms and Data Structures for Massive Datasets (https://t.co/1dm2oqrz54) is such a gem, I'm halfway through but I love everything in it so far.
— Piotr Sarna (@sarna_dev) August 19, 2024
Best Laid Plans: Iranian threat actor TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset https://t.co/rru4USxRcI @proofpoint
— 780th Military Intelligence Brigade (Cyber) (@780thC) August 20, 2024
In our upcoming OOPSLA paper (https://t.co/zAC0ZsC5YT), we used LLM together with static analysis to find bugs in the Linux kernel and other targets. We had the same observation that LLM works the best in a selective & targeted fashion, when paired with static analysis.
— Zhiyun Qian (@pkqzy888) August 9, 2024
OBS heap overflow vulnerability in parsing GIF image: https://t.co/Zf7InKR9Y1
— 1ce0ear (@1ce0ear) August 19, 2024