January 13, 2025
January 13, 2025
Academic work on honeypots and deception are often kinda disappointing, but this paper by @debi_ashenden and Reeves is worth the skim (especially since it confirms lots of our @ThinkstCanary takes 😉)
— haroon meer (@haroonmeer) January 12, 2025
tl;dr : Canaries work, Use ‘em.
—
¹ https://t.co/LAAJdbsBZk pic.twitter.com/1LOeMUbEVw
This image is a perfectly analogy for most enterprise compromises — a "sophisticated attacker" was NOT a state-sponsored Threat Actor. It was just a fat cat. pic.twitter.com/r3jY2JPCRr
— vx-underground (@vxunderground) January 11, 2025
OK so Razzlekhan (@HeatherReyhan) just dropped a new music video before her prison sentence starts later this month. The song is titled "Razzlekhan vs. The United States"
— Haseeb >|< (@hosseeb) January 11, 2025
It's... a lot. pic.twitter.com/lgsWtXDyhS
Vulnerabilities analysis from patch diffinghttps://t.co/mOMWazUL3Q
— 0xor0ne (@0xor0ne) January 12, 2025
Credits @suidpit and @Th3Zer0#embedded #cybersecurity pic.twitter.com/NvvYdcAhVR
Work smart, not hard? 😂https://t.co/8bCfnexrhf pic.twitter.com/PUFrYsM3B2
— Patrick Wardle (@patrickwardle) January 11, 2025
Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
As we saw in our previous blogpost, we fully analyzed Ivanti’s most recent unauthenticated Remote Code Execution vulnerability in their Connect Secure (VPN) appliance. Specifically, we analyzed CVE-2025-0282. Today, we’re going to walk through exploitation. Once again, however, stopping short of providing the world with a Detection Artifact
ACE up the sleeve: Hacking into Apple's new USB-C Controller
ACE up the sleeve: Hacking into Apple's new USB-C Controller
- media.ccc.de
With the iPhone 15 & iPhone 15 Pro, Apple switched their iPhone to USB-C and introduced a new USB-C controller: The ACE3, a powerful, ver...
This is where the intersection of AI + cyber will be consequential. Not in the doomsday scenario of zero shot 0-day exploits, but in the exponential growth of attack surface vulnerable to simple scaleable attacks.
— chrisrohlf (@chrisrohlf) January 12, 2025
I wrote about this 3 years ago https://t.co/bftjYY0we2 https://t.co/adqnLLVrXS