January 29, 2024
January 29, 2024
I looked through attacks in my access logs. Here's what I found
I looked through attacks in my access logs. Here's what I found
I've been self-hosting for over a decade. It's freeing because I own my data, and do not depend on any platform other than my cloud host, which I can easily switch off. Self-hosting gives much insight into what it takes to run a cloud service. Anyone who's had some practice
I thought the specifics of what people are scanning for kind of interesting.
NSA director Nakasone admits that his agency is buying commercially available netflow data from both American and foreign internet traffic for both foreign intelligence and cybersecurity purposes:https://t.co/VdKDp1zH6r
— Electrospaces (@electrospaces) January 28, 2024
(CVE-2023-6200)[linux][net][ipv6] Race conditions given how expires is managed on a fib6_info in relation to gc start->UAF(adding the entry to the gc list and setting the timer value)->pre-auth RCE https://t.co/tLvrE8J9HPhttps://t.co/JhZiDBaC2T@wmliang @thezdi
— xvonfers (@xvonfers) January 28, 2024
Less than an hour ago someone posted some docs on the Eurofighter and they all had in bold letters NATO RESTRICTED.
— NonCredibleDefense Unofficial (@NonCRDDefence) January 28, 2024
Well done boys, first of the year. pic.twitter.com/Ubc3K0C7n9
chaoticMagic https://t.co/lJXThqzsDQ pic.twitter.com/lLzwXSojmR
— Programmer Humor (@PR0GRAMMERHUM0R) January 28, 2024
Ukraine Claims Destruction of 280 Russian Servers, 2 Petabytes Lost https://t.co/tgagl5VFlL
— switched (@switch_d) January 28, 2024
Exclusive: Tatjana Zdanoka, a Latvian member of the European Parliament, has been an agent of Russian intelligence for at least twenty years, @the_ins_ru can reveal, based on emails we obtained between Zdanoka and two of her FSB handlers. https://t.co/Jf2cIKZS2N pic.twitter.com/nAUeuZvAVw
— Michael Weiss (@michaeldweiss) January 29, 2024
Thread by @michaeldweiss on Thread Reader App – Thread Reader App
@michaeldweiss: Exclusive: Tatjana Zdanoka, a Latvian member of the European Parliament, has been an agent of Russian intelligence for at least twenty years, @the_ins_ru can reveal, based on emails we obtained betwe...…
this graph kills me every time I see it pic.twitter.com/jLuqO36L6L
— root beer in th cowboy heel 💚 (@maneymonday) January 24, 2024
Interesting blog post introducing process tracing tools like eBPF and Perfetto
— 0xor0ne (@0xor0ne) January 28, 2024
Credits @trishumehttps://t.co/kDKudewgk3#Linux #tracing #infosec pic.twitter.com/0TZdoNqm8X
Russia is clamping down on server hosting providers (as well as it's society as a whole) and the details are pretty alarming. If you enjoy having "bulletproof" providers, those days could be coming to an abrupt end very soon. New laws, called "Yarovaya Law", appears to go as far… pic.twitter.com/nFlGurq4AR
— uɐpʇou@ ✸ (@notdan) January 28, 2024
Quick preview of my ETW write-up that I did on the 'Microsoft-Windows-DotNETRuntime' Provider. Here I'm showing how certain EDR vendors are using this telemetry to build detections when .NET assemblies are reflective loaded from byte arrays. pic.twitter.com/JoW6Sz00Cm
— DebugPrivilege (@DebugPrivilege) January 28, 2024
Top 19th century diplomatic tradecraft here. If you think your diplomatic bag is being intercepted, fill with lead the hollow of the lion’s tail in the Royal Arms on the official seal - so that the lion is tail-less in the wax impression. Then ask your recipient to check the tail pic.twitter.com/6psgsExBsO
— David Clay (@dave_clay) January 28, 2024
No one ever talks about how 1% of the South Americans control 99% of the elevation https://t.co/TtexjFQVts
— Pinboard (@Pinboard) January 29, 2024
South America elevation tile map. pic.twitter.com/om6jUvoePT
— Epic Maps 🗺️ (@Locati0ns) January 28, 2024
And they look down on the rest of us!
— Robert Balicki (👀 @IsographLabs) (@StatisticsFTW) January 29, 2024
Curious about last year's Google #Chrome vulnerability exploit?
— Theori (@theori_io) January 26, 2024
Our vulnerability research team managed to bypass #V8 #sandbox protection using raw pointers in #WebAssembly.
Check out the details on our blog!https://t.co/HxEagTz9By#Theori #티오리 #Blog #research https://t.co/3i8F1HABiy
Official WinDBG TTD Live Recording API has arrived. Load TTDLiveRecorder.dll and call APIs from within the traced process. Add custom metadata and events. The docs aren't really indexed, well, here's a link to the interface docs for the LiveRecorder https://t.co/qZABrkemka https://t.co/bxElh7GR6k
— Richard Johnson (@richinseattle) January 27, 2024
Do you wish Time Travel Debugging was faster and more lightweight? Our latest version lets you decide exactly what you want recorded! Select modules to record or use the API for full control. Get your recording just the way you like it. Crusts optional. https://t.co/PyeQjyNcGX pic.twitter.com/eKj5fEG8d5
— Ken Sykes (@KensyAtMS) January 27, 2024
China's ICBC is the 3rd-largest bank in the world.
— Daniel Feldman (@d_feldman) January 29, 2024
Their entire network was taken over by ransomware.
But they got back online quickly -- because their trading system used a Novell Netware server that the ransomware didn't understand. pic.twitter.com/PV9WWKkQjE
ICBC Partners Wary to Resume Trading With Bank After Cyberattack - BNN Bloomberg
Industrial & Commercial Bank of China Ltd., the world’s largest lender by assets, has been unable to convince some market participants that it’s safe to reconnect their computer networks to the bank’s US unit after a ransomware attack disrupted its systems, according to people familiar with the matter.
Extreme brainstorming questions to trigger new, better ideas
We know, "no idea is a bad idea," but brainstorming is often unsuccessful. These prompts actually work. They could even lead to a unique business model.
Supremely handy guide on drone identification here from @faineg and @konrad_it — two people I would trust most to id any flying object. https://t.co/mcUOs7yxVB
— Jane Lytvynenko (@JaneLytv) January 29, 2024
1. Kamikaze #drones is a nightmare scenario brought to you by the internet of things (IoT). Although many folks warned of the dangers of IoT, being hunted by drones carrying high-explosives was not on their lists. What sequence of events enabled this? pic.twitter.com/ADb3xizvZE
— DanielR (@DanielR33187703) January 17, 2024