Jan 31, 2023
SH1MMER53 is an exploit capable of completely unenrolling enterprise-managed Chromebooks.
-
Yandex ‘leak’ reveals 1,922 search ranking factors
reviewing this document may provide some useful insights to better help you understand how search engines, such as Google, work from a technological standpoint.
Analysis on how search at Yandex is done
https://russiansearchnews.com/articles/yandex-data-leak-what-weve-learned-about-the-search-algorithms/-
-
EU has some genius ideas about mandating that software be secure. It is gonna kill open source if they don’t change it.
https://blog.nlnetlabs.nl/open-source-software-vs-the-cyber-resilience-act/-
My Year Of Dicks (2022)
-
Man...those cows know how to party!-
Runa:
https://techcrunch.com/2023/01/27/digital-data-roe-wade-reproductive-privacy/ https://mastodon.social/@runasand/109763026717020372I looked at a bunch of court records to learn more about how police in the U.S. use digital data to prosecute abortions. Here’s what I found.
-
A paralegal has been going after the AI-lawyer company “DoNotPay.” She is destroying them, and the CEO is looking worse and worse the longer it goes on. It’s glorious!
-
-
What's your excuse? https://t.co/yc24hOiGtq-
https://infosec.exchange/@raptor/109783172507630600Let’s continue our tour of my public @github@infosec.exchange projects.
https://github.com/0xdea/tactical-exploitationEven though I’m a prolific #exploit #developer, I’ve always been a big proponent of a tactical approach to #pentesting and #redteaming that does not focus on exploiting known software vulnerabilities, but relies on #oldschool techniques such as information gathering and brute force.
While being able to appreciate the occasional usefulness of a well-timed #0day, as a veteran penetration tester I favor an exploit-less approach. #Tactical #exploitation provides a smoother and more reliable way of compromising targets by leveraging process vulnerabilities, while minimizing attack detection and other undesired side effects.
Sooner or later I’ll present my talk on this subject: “Empty Phist Style - Hacking Without Tooling” (h/t @thegrugq@infosec.exchange for the title) 🤘
-
-