December 5, 2024
December 5, 2024
Me reverse engineering: Haha fuck yeah!!! Yes!!
— Battle Programmer Yuu (@netspooky) December 3, 2024
Me engineering: Well this fucking sucks. What the fuck.
NEW: An independent review board will launch its investigation of an unprecedented Chinese hack of global telecom systems later this week, @CISAJen said Wednesday.
— Martin Matishak (@martinmatishak) December 4, 2024
The 1st meeting of the Cyber Safety Review Board on Salt Typhoon happens Friday.https://t.co/agTV2XmFcb
For anyone interested in detection and prevention methods against Salt Typhoon intrusions targeting communication providers, here is a comprehensive guide:https://t.co/SSPd5YbIax pic.twitter.com/jiuMexTwMl
— Rob Joyce (@RGB_Lights) December 4, 2024
Rob Joyce was one of the leading proponents to create more backdoors, which could have jeopardized millions of Americans’ privacy. Thankfully, @JoshuaSteinman stopped him. https://t.co/Plu1wzHRYM
— Ezra A. Cohen (@EzraACohen) December 4, 2024
You are confusing me with someone else Ezra. https://t.co/Rw727FOr1A
— Rob Joyce (@RGB_Lights) December 4, 2024
Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesses the Russian nation-state actor we track as Secret Blizzard has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.
— Microsoft Threat Intelligence (@MsftSecIntel) December 4, 2024
Good for them. Hack smarter, not harder
great, now I am really stuck in vim https://t.co/zSCZdep0Lz
— ThePrimeagen (@ThePrimeagen) December 4, 2024
Once inside, it’s almost impossible to remove intruders without some downtime. They probably know the networks better than legit sysadmins and no one wants to break anything. They’re inside and here to stay. https://t.co/52RKIw65KR
— x0rz (@x0rz) December 4, 2024
Update: Fuzzing 5G with with SignalSDR Pro. Video soon. pic.twitter.com/TAdyW9qjwS
— signalens (@signalensradio) December 5, 2024
https://bsky.app/profile/eliothiggins.bsky.social/post/3lchzioecc22l
In breaking news, water is wet, the sky is blue, and owning/pwning telco infrastructure is valuable for intelligence gathering.
— Dino A. Dai Zovi (@dinodaizovi) December 5, 2024
It's been a strategic mistake to keep our society vulnerable by fighting e2e encryption rather than embracing it and promoting democratized use of it.
This is funny. But I can’t believe this is still used? Binary replacement root kits must be dead, no?
In this video I demonstrate a backdoor technique seen in the wild where attackers replace /sbin/nologin with a valid shell on Linux. This gives persistent access to what you think are disabled accounts. Watch how it works and how to look for it below. https://t.co/PRCqGk4vPB
— Craig Rowland - Agentless Linux Security (@CraigHRowland) December 4, 2024