February 24, 2025
February 24, 2025
Looks like BlackHat have added the talks from USA 2024 to YouTube.
— Alex Plaskett (@alexjplaskett) February 23, 2025
Here's @robHerrera_ and my talk on Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretaphttps://t.co/WMi6ROlakE
Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War | @Trustwave examines the dozens of threat groups involved, details how they conduct their activities, the tricks and malware each leverage... https://t.co/6hc4kZoeK1
— 780th Military Intelligence Brigade (Cyber) (@780thC) February 23, 2025
More OpenSSH source code auditing for error patterns identified by Qualys:
— Open Source Security mailing list (@oss_security) February 23, 2025
Revised CodeQL query "that I think improves accuracy" https://t.co/sTJ17yfGcx
"I also did some semi-manual auditing" (2 grep commands, 2 "uninteresting" bugs found, patches for EL9) https://t.co/OcP77xRusY

It is no longer safe to move our governments and societies to US clouds - Bert Hubert's writings
The very short version: it is madness to continue transferring the running of European societies and governments to American clouds. Not only is it a terrible idea given the kind of things the “King of America” keeps saying, the legal sophistry used to justify such transfers, like the nonsense letter the Dutch cabinet sent last week, has now been invalidated by Trump himself. And why are we doing this? Convenience.
A data leak including a document with 7,000+ lines of work logs and code as well as scripts that connect to several 🇨🇳 government hostnames, academic institutions and news sites reveals that 🇨🇳 cybersecurity firm TopSec (北京天融) is likely enabling content moderation for… pic.twitter.com/FmYcgbkKIY
— Byron Wan (@Byron_Wan) February 23, 2025
https://t.co/1HtKIrsagJ This series of blog posts is amazing if you are curious about (part of) the Windows Logon process...
— Andrea Allievi (@aall86) February 23, 2025
Unexpectedly vulnerability discovered in the TCP subsystem of the Linux kernel : https://t.co/axgKxBoNL4 credits @andersonc0d3
— Binni Shah (@binitamshah) February 23, 2025
how did Bybit not realize they getting hacked...
— high_byte (@high_byte) February 23, 2025
does this answer the question? pic.twitter.com/6LFz9M2rmh
The author of this code wrote it as a result of our assembly language lessons:https://t.co/u6MKBb3Xbk
— FFmpeg (@FFmpeg) February 22, 2025
Learn assembly, write code 18x faster than C. https://t.co/K37QW2p87l
I'm pretty sure that we'll see the details of the Bybit attack line up pretty closely with the details in this full public post-mortem from @RDNTCapital on their multi-sig Gnosis Safe wallet w/ Ledger hardware wallets breach from just four months ago:https://t.co/t5d0XshbKO
— Dino A. Dai Zovi (@dinodaizovi) February 23, 2025
Front-end verification of all three multi-signature transactions showed no signs of compromise, aside from Safe App transaction resubmissions due to failures. It is important to highlight that resubmitting Safe transactions due to failures is a common and expected occurrence. Transactions submitted on the Safe front-end can fail due to gas price fluctuations, nonce mismatch, network congestion, insufficient gas limit, smart contract execution errors, token insufficiency, pending transactions, front-end synchronization issues, timeouts, or permission/signature errors in multi-signature setups. As a result, this behavior did not raise immediate suspicion.
Highlight:
https://medium.com/@RadiantCapital/radiant-post-mortem-fecd6cd38081The malicious actors exploited this normalcy, using the process to collect multiple compromised signatures over several attempts, all while mimicking the appearance of routine transaction failures.
CredMaster 2.0 passspray tool release! New features like notification alerts, advanced SOC evasion techniques, 8 new plugins and an easy config file. S/O to @ZephrFish for all his contributions in the rewrite
— Ellis Springe (@knavesec) January 23, 2023
B: https://t.co/tnWU7cGtty
G: https://t.co/JJhk097xlS pic.twitter.com/KEqC6UEF8x
GitHub - knavesec/CredMaster: Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling - knavesec/CredMaster

Three questions about Apple, encryption, and the U.K. – A Few Thoughts on Cryptographic Engineering
Two weeks ago, the Washington Post reported that the U.K. government had issued a secret order to Apple demanding that the company include a “backdoor” into the company’s end-to-e…
New video! We cover a very recent (Feb. 2025) espionage event from Ukraine that relied on a GPS tracking device we've presented in the past.https://t.co/HZsy836zm5#Ukraine #Russia #counterintelligence #surveillance
— Spy Collection (@SpyCollection1) February 24, 2025
Chrome Browser Exploitation: from zero to heap sandbox escape by @matteomalvica https://t.co/yiPi6l4YEe
— j j (@mistymntncop) February 24, 2025