August 21, 2024
August 21, 2024
One of Munich's most famous landmarks is Karlsplatz/Stachus. During the Cold War, it was a centre of intelligence services. Nowhere else in the city was the density of espionage as high as there. Even a #KGB murder plot took place there. Here is an overview 👇1/8 pic.twitter.com/rHTiJYy07x
— Le cueilleur (@LCueilleur) August 20, 2024
Thread by @LCueilleur on Thread Reader App – Thread Reader App
@LCueilleur: One of Munich's most famous landmarks is Karlsplatz/Stachus. During the Cold War, it was a centre of intelligence services. Nowhere else in the city was the density of espionage as high as there. Even a...…
How Russia and Ukraine Tracks Mobile Phones on the Battlefieldhttps://t.co/ZMqkGpvlLk
— GiamMa-based researchers SDR R&D IoT (@giammaiot2) August 19, 2024
Having covered the topic and related topics extensively here 👇 pic.twitter.com/1ktU2h45Ja
Thread by @giammaiot2 on Thread Reader App – Thread Reader App
@giammaiot2: How Russia and Ukraine Tracks Mobile Phones on the Battlefield Having covered the topic and related topics extensively here 👇 commsrisk.com/how-russia-and… Not to turn on Bluetooth(even smartwatch),turn...…
How much do you know about IIS Machine Keys and View State? Are you confident you could not only identify an exploited host but also remediate it? If not, check out my new blog post which covers exploitation, detection and remediationhttps://t.co/TjZ8Qgjz7q
— Zeroed (@Zeroedtech) July 21, 2024
A customer reached out asking for video tutorials.
— Flo Crivello (@Altimor) August 19, 2024
We obviously have a Lindy handling this, and I was delighted to see that she sent a video.
But then I remembered we don't have a video tutorial and realized Lindy is literally fucking rickrolling our customers. pic.twitter.com/zsvGp4NsGz
Oh my god, it never occurred to me that “rickrolling is deeply embedded in the training set for every LLM” is a legitimate problem that is going to make many AI teams lives miserable
— emilia ✨ (@lazerwalker) August 20, 2024
lmao. https://t.co/xhcjlpiXqT
Windows 0-day was exploited by North Korea to install advanced rootkit | Ars Technica
FudModule rootkit burrows deep into Windows, where it can bypass key security defenses.
This type of attack [kernel UAF] is both sophisticated and resourceful, potentially costing several hundred thousand dollars on the black market.
Just to be absolutely clear on this: North Korea does not buy exploits. They have their own in-house talent.
This is concerning because it targets individuals in sensitive fields, such as those working in cryptocurrency engineering or aerospace to get access to their employer’s networks and steal cryptocurrencies to fund attackers’ operations.”
lol. Concerning.
This is the most research I've done for a blog post. Ever. It's taken months, reviewing hundreds of papers, standards, RFCs, interviews, etc. I was lucky to get to talk to some people from the original P802.
— Daniel Dib (@danieldibswe) August 21, 2024
This is the History of Ethernet.https://t.co/HzxRS1KGOD pic.twitter.com/MQCm0GZMsp
Oh my god I love him, I love that 4900 years ago the artist captured the human experience: a bellybutton and existential horror https://t.co/0j78DFxkZU
— Amanda Wong (@amandawtwong) August 20, 2024