February 23, 2024
February 23, 2024
cat is the most misused thing by programmers new to linux. I cringe every time someone uses it wrong in a bash script. Thread below with proper uses of cat only
— Arian van Putten (@ProgrammerDude) February 22, 2024
Thread by @ProgrammerDude on Thread Reader App â Thread Reader App
@ProgrammerDude: cat is the most misused thing by programmers new to linux. I cringe every time someone uses it wrong in a bash script. Thread below with proper uses of cat only Use cat to check...
Wrote an article about turning a ThinkPad X1 Carbon 6th Gen laptop into a programmable USB device by enabling the xDCI controller 😯
— Andrey Konovalov (@andreyknvl) February 22, 2024
Now I can emulate USB devices from the laptop without external hardware, including via Raw Gadget or even Facedancer 😁https://t.co/B46Su8Wu9C
░AND░YOU░MAY░FIND░YOURSELF░
— Alice Lia Maro (@slimelia) February 21, 2024
░IN░A░BEAUTIFUL░BIO░
░WITH░A░BEAUTIFUL░BOT░
░AND░YOU░MAY░ASK░YOURSELF░
░WELL,░WHERE'S░THE░PUSSY?░ pic.twitter.com/f9JCt0IuA1
Impact: FTC is fining cybersecurity company Avast $16.5 million. This is in response to mine and @Michael_Kan's investigation based on internal documents that revealed Avast was using its AV to harvest browsing data and then sell it at a massive scale https://t.co/MEI0a2VDt1
— Joseph Cox (@josephfcox) February 22, 2024
Worldwide #OSINT Tools map
— Cyber Detective💙💛 (@cyb_detective) February 22, 2024
747 links (50 new) - national registries, phone books, yellow pages, cadastral maps and much more.
Almost 300 countries, cities, states and regions.https://t.co/lnthwyQyXV pic.twitter.com/o4UuLSWoj7
I read it, now I can't get the title out of my head:
— Dino A. Dai Zovi (@dinodaizovi) February 23, 2024
"Nobody Ever Gets Credit for Fixing Problems that Never Happened: Creating and Sustaining Process Improvement"https://t.co/T1de70BMVu
— EvilMog (@Evil_Mog) February 22, 2024
Reverse engineering of AES protected USB flash drives
— 0xor0ne (@0xor0ne) February 22, 2024
Excellent research @matthiasdeeg https://t.co/aAkowTOfh3https://t.co/Xgrl5gpnh8#hardware #infosec #aes pic.twitter.com/6PyBaau8vm
Cyber policy ppl: it's worth looking at the history of how exploits are actually written by crews , which this article does very well in the prelude and you don't need a lot of technical depth https://t.co/yhynKN68BB
— Dave Aitel (@daveaitel) February 22, 2024
I think it is now acceptable to reveal who wrote this paper: Nicolas Brito aka Sauron aka Modem. R.I.P. my friend. Missing you every day.
— Julien Vanegue (jvanegue@mathstodon.xyz) (@jvanegue) February 23, 2024
Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
— 0xor0ne (@0xor0ne) February 22, 2024
Credits Thomas Imbert (@Synacktiv)https://t.co/BIymI52HJ5#cybersecurity #reverseengineering #binaryninja pic.twitter.com/s6vMgwbg4O
Banking trojan steals faces. "Unsuspecting users are tricked into giving up personal IDs and phone numbers and are prompted to perform face scans. These images are then swapped out with AI-generated deepfakes that can easily bypass security checkpoints" https://t.co/yKgO8lv6Y3
— Kim Zetter (@KimZetter) February 22, 2024
The code worked differently when the moon was full - Scott Hanselman's Blog
I love a good bug, especially ones that are initially hard to explain but then ...
I think ppl in infosec & .gov do not understand the horrifically insecure shit customers request of software vendors.
— Kelly Shortridge (@swagitda_) February 22, 2024
eg at one company, a large customer asked us to, in effect, build a remote access trojan (RAT) into the product.
I refused, for what I hope are obvious reasons https://t.co/DzPTSWpLRz
in the spirit of transparency, here’s what @rpetrich & I wrote in response to @CISAgov’s RFI on Secure by Design: https://t.co/xwj5faCL7e
— Kelly Shortridge (@swagitda_) February 21, 2024
we believe Secure by Design can & should align with biz goals like velocity, dev productivity, and reliability
blog: https://t.co/945xTb2KAC
This old article on web application performance and garbage collection is a very valuable resource for people thinking about Security By Design: https://t.co/Bda9xLMXui
— Dave Aitel (@daveaitel) February 22, 2024
if i won the lottery i wouldn’t tell anyone
— Jack Forge (@TheJackForge) February 22, 2024
but there would be signs… pic.twitter.com/n6fxXQDTkw