February 24, 2024
February 24, 2024
Every. Single. New. Google. Product. pic.twitter.com/7XAaKknrOQ
— Marcos Besteiro 👧🏻👶🏻 (@MarcosBL) February 23, 2024
Secure By Default: I don't know why all of a sudden lawyers seem to think the Common Weaknesses taxonomy is somehow strong enough to hang liability on, except to say: that is absolutely insane. pic.twitter.com/vJFJ0eZSxf
— Dave Aitel (@daveaitel) February 23, 2024
Wow the #MonikerLink bug even won a rare bounty under MSRC's very strict Office bug bounty program - bypassing attachment restrictions. The amount is not big but this is a rare Office bug bounty!:)
— Haifei Li (@HaifeiLi) February 23, 2024
I'm attaching my original email here so you know more why this bug is risky. pic.twitter.com/jYC0wUy7U3
Introduction by @linode to Linux red teaming basic techniques
— 0xor0ne (@0xor0ne) February 23, 2024
Exploitation: https://t.co/kKRI3SHW9F
Escalation: https://t.co/WRAmKTsx4t
Persistence: https://t.co/pEtfWHrSnE#Linux #cybersecurity pic.twitter.com/Kr0tmw9Mlb
The reason nobody found this problem in dnssec before now is that, as they say, the fundamental design flaws were completely hidden by the superficial design flaws. https://t.co/bvMc5ZF3qb
— apenwarr (@apenwarr) February 23, 2024
Nevada's attorney general filed for a restraining order and prelim injunction against Meta this week to prevent it from pushing out end-to-end encryption as default on Messenger for users in Nevada who are under 18. The brief is here: https://t.co/rLj6X7FOqW
— Kim Zetter (@KimZetter) February 23, 2024
(h/t @Riana_Crypto) pic.twitter.com/ch1dp9CYJ7
Pittsburgh Weekly Gazette, Pennsylvania, August 16, 1905 pic.twitter.com/h1HWudPGQn
— Yesterday's Print (@yesterdaysprint) February 24, 2024
RCMP Network breached in a “cyber event”.
— Ian Boyle (@IanWBoyle) February 23, 2024
Working with international partners to assess the damage to national security.
This does not look good. Not long ago DND and GoC were hit with a big breach. https://t.co/21AENCifMH
NEW: Illia Vitiuk, cyber chief at Ukraine’s Security Service, told me that Russia is “becoming more vigorous” in its cyber operations, including stationing APT groups on the front lines to more easily access captured equipment. For Pros here: https://t.co/ssm7LETh41
— Maggie Miller (@magmill95) February 23, 2024
When you wield God-like abilities, people come to you with humble requests like this and within seconds you just blow their mind -- alternate introduction: "what can you do with bpftrace on Linux?" Let's go …
— FreeBSD Frau (@freebsdfrau) February 23, 2024
Thread by @freebsdfrau on Thread Reader App – Thread Reader App
@freebsdfrau: When you wield God-like abilities, people come to you with humble requests like this and within seconds you just blow their mind -- alternate introduction: "what can you do with bpftrace on Linux?" Let...…
Repeat from a couple days ago.
This is the craziest paper I've read this week:
— LaurieWired (@lauriewired) February 23, 2024
"PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound" pic.twitter.com/EGjfx79mZA
Link to the paper:https://t.co/74ZUa96Gi1
— LaurieWired (@lauriewired) February 23, 2024
🧵From a secret letter to Vice Admiral M. A. Usatov, deputy head, First Chief Directorate, #KGB, May 1979.
— Filip Kovacevic (@ChekistMonitor) February 22, 2024
How Lithuanian KGB planned to spy on NATO:
1. Using its foreign agents to conduct visual surveillance, make contacts with officials and employees of NATO facilities, and pic.twitter.com/bHZgg4Yy2J
Thread by @ChekistMonitor on Thread Reader App – Thread Reader App
@ChekistMonitor: 🧵From a secret letter to Vice Admiral M. A. Usatov, deputy head, First Chief Directorate, #KGB, May 1979. How Lithuanian KGB planned to spy on NATO: 1. Using its foreign agents to conduct visual sur...…
The thrust of the Secure by Design legal theory as presented on LawfareBlog seems to be having CISA take CWE and distill from it a set of unpardonable errors that now define a standard that makes software manufacturers liable. This is not a good idea, to put it mildly.
— Dave Aitel (@daveaitel) February 23, 2024
this is such an interesting time to be alive. we concreted the internet as our second equal and primary reality but it's full of ghosts now
— .chantal//RYAN ➡️ GDC (@thoughtrise) February 23, 2024
we try to talk to them and they pass right through
it's a haunted world of dead things who look real but don't really see us pic.twitter.com/VpqcDTeE60
Great writeup by @0vercl0k on pwning a TP-Link AC1750 (Pwn2Own 2021)
— 0xor0ne (@0xor0ne) February 23, 2024
Couple years old but still a good read for anyone interested in consumer routers securityhttps://t.co/nqPXaGFUtj#iot #cybersecurity pic.twitter.com/zC1UWIdmQY
you cannot convince me this isn't the funniest fucking humans vs robots video to come out in our time https://t.co/IwVTSvvmV9 pic.twitter.com/JtPtQP70Vd
— Wade (in Tarnation) (@watn_tarnation) February 23, 2024
will never stop laughing at the video where SFPD is trying to get a driverless car to not run over a firehouse and they start yelling at it like a bad dog while waiving a flare around to scare it
— Wade (in Tarnation) (@watn_tarnation) February 23, 2024
New Blog! Lessons from the iSOON Leakshttps://t.co/wE4gdXrkDq pic.twitter.com/dUxh1inm6q
— Will (@BushidoToken) February 22, 2024
After infiltrating LockBit's systems, we gathered a lot of information about their criminal activity and those who worked with them.
— National Crime Agency (NCA) (@NCA_UK) February 23, 2024
Including their network of 194 hackers or 'affiliates' who we'll be in touch with very soon.
Until then, we hope they have a nice day 🙂#Cronos pic.twitter.com/dDOHaWxWit
Predictable claims by PRC spokesperson. If my report below is any guide to China’s coming response, we may soon see fresh allegations of US hacking against targets in China. H/t @snlyngaas https://t.co/LZ2Yl48E0b pic.twitter.com/G2zsJ19XKp
— Dakota Cary (@DakotaInDC) February 23, 2024
Rajat Khare wants you to know that "he did not engage in conspiracy to or complicity in murder." Ooooookay. https://t.co/bDsZk5QJcO
— Eva (@evacide) February 24, 2024
WHO COULD HAVE FORESEEN AGE VERIFICATION MECHANISMS ARE THE SAME THINGS HACKERS ARE AFTER
— Shoshana Weissmann, Sloth Committee Chair 🦥 (@senatorshoshana) February 22, 2024
Face off: Attackers are stealing biometrics to access victims’ bank accounts https://t.co/HxeDwR5Kth
COUGH COUGH https://t.co/xAtKD4AmLD
I managed to extract and compile i-Soon (aka Anxun) IOCs from the screenshots of the documents. Thanks to @BushidoToken @AzakaSekai_ @RussianPanda9xx
— ctiyeewesley (@ctiyeewesley) February 21, 2024
Stay informed and stay safe.#ISOON #IOC #CTI #Leaks #threatintelligence #CyberSecurity pic.twitter.com/9jn5x6v4CW
Damn...
— The XSS Rat - Uncle Rat ❤️ (@theXSSrat) February 23, 2024
"Microsoft Azure Hit With The Largest Data Breach In Its History; Hundreds Of Executive Accounts Compromised"https://t.co/0dFtfVdFat
Fast forward to 4.5 years later: https://t.co/8b4riSGaOC https://t.co/sbz2RIaz18
— 🎻 Eric Lawrence (@ericlaw) February 23, 2024
Well, lookie here. When you install @avast_antivirus, it secretly injects this into Chrome's environment block. pic.twitter.com/oSTtCLC51f
— 🎻 Eric Lawrence (@ericlaw) August 9, 2019