January 3, 2023
January 3, 2023
On the outside, it's just any old briefcase. 💼
— GCHQ (@GCHQ) January 2, 2024
But on the inside, it's a secure telephone system used for delivering top secret messages to the then Prime Minster.
Find out how the Brahms was made and subsequently hand-delivered ⬇️https://t.co/xQsFeKcewX pic.twitter.com/2aM6VMC7cQ
Best get ready for the cyber Pearl Harbour, @ciaranmartinoxf. pic.twitter.com/UuI3KimdOO
— Dr. Dan Lomas (@Sandbagger_01) January 2, 2024
https://posixcafe.org/blogs/2024/01/01/0/
A monumental #vulnerability #research deep dive in 8+ parts by @Claroty ✊
— raptor@infosec.exchange (@0xdea) January 3, 2024
OPC UA Deep Dive: A Complete Guide to the OPC UA Attack Surfacehttps://t.co/uaDDdl7BTjhttps://t.co/qSEMCyqEtN
Burma Watch
300 scam centers taken down, over 40,000 people sent back to China as a result of Operation 1027; MNDAA commander Peng Deren’s New Year speech also notes that 3BHA has taken 1000+ POWs, and MNDAA is doubling down on its commitment to topple the military dictatorship. pic.twitter.com/AcYpGMqNMo
— Jason Tower (@Jason_Tower79) January 2, 2024
New from 404 Media: a 13 year old has become the first person in the world to beat the NES version of Tetris. They reached Tetris’ Kill Screen; previously only an AI had achieved this.
— Joseph Cox (@josephfcox) January 2, 2024
“I can’t feel my hands,” he said at one point. https://t.co/WrLLKFgJja pic.twitter.com/OD4oiovEGk
Someone reported a #QuestDB bug in a binary search algo.
— Jaromir Hamala (@jerrinot) January 2, 2024
The report links to an article by @joshbloch: https://t.co/4uHxHCFGEO
It's almost 20 years old and I still find the story fascinating.
tl;dr:auto mid = (low + high) / 2;
may overflow. it's rare -> it goes unnoticed⏱️💣
The 2024 edition of our State of #Ransomware report is out. To add to the excitement, it includes commentary from @uuallan and @GossiTheDog. https://t.co/aMQUsuIlg8
— Brett Callow (@BrettCallow) January 2, 2024
As foretold - LLMs are revolutionizing security research: https://t.co/HfvHKclm4r
— lcamtuf (@lcamtuf@infosec.exchange) (@lcamtuf) January 2, 2024
2024 will be the year of linux on the desktop
— John Hammond (@_JohnHammond) January 2, 2024
Possibly my favorite "WW2 US industrial might" story yet.
— Sly Tea Jar (@JayGSlater) January 2, 2024
Plane a little dinged up after a mission? Bulldoze it off the side of the carrier/airbase and get a shiny new one. pic.twitter.com/PXtEnT0y7W
Your wifi is public property! 😂😂 pic.twitter.com/2kzSbFp1ZA
— Alvin Foo (@alvinfoo) January 1, 2024
In April 2017 a KHL hockey coach from Russia found this wireless covert listening device installed in their room at Ice Palace in Saint Petersburg, Russia.
— Spy Collection (@SpyCollection1) January 3, 2024
Source: https://t.co/Tlg3XdtIg3#Espionage #Surveillance #Bug #Spy #Russia pic.twitter.com/SMM7dRdRMJ
KHL coaches find listening device hidden in room after playoff game
In the most delightfully cliché scandal in recent hockey history, coaches from a Russian hockey team found a spy device hidden in their room. According to Sport-Express, a listening device was allegedly discovered by coaches from Metallurg Magnitogorsk inside their coaches’ room at Ice Palace in Saint Petersburg. Metallurg is in a Gagarin Cup series against SKA Saint Petersburg, losing 2-1 on Friday night.
‘Stakes are really high’: misinformation researcher changes tack for 2024 US election | US politics | The Guardian
Kate Starbird says attacks have made research difficult, and claims of bias arise because of prevalence of lies from the right
I’m not sure how best to present this chain of quote tweets. I’ve decided to put them in chronological order, as that most coherently presents the conversation.
THIS is an APT. No "cmd /c net user", just technical capability that's almost indistinguishable from magic pic.twitter.com/ruEhr0Zuaa
— Josh (@passthehashbrwn) December 28, 2023
This is more likely work of an intelligence agency, not an APT. APT is contractor service organized or reporting to the intelligence agencies of a nation-state or an OCG and does not have the same level of bureaucracy with payload delivery. The selective targeting gives it away. https://t.co/uWssWM30hd
— hackerfantastic.x (@hackerfantastic) December 30, 2023
This is a meaningless distinction. In-the-wild discovery and observability don’t entail a difference. Perfect information or leaks tell when we are dealing with a high-end contractor or an in-house shop but the difference in intent or m.o. is not inherent in the positioning. https://t.co/fm09KVltW9
— J. A. Guerrero-Saade (@juanandres_gs) January 3, 2024
APT was literally coined for Chinese military intelligence cyber operations. It describes a type of threat class — those who are capable and mission driven. Thats it.
— thaddeus e. grugq thegrugq@infosec.exchange (@thegrugq) January 3, 2024
They are capable (“advanced”)
They have purpose/mission (“persistent”)
They are active (“a threat”) https://t.co/ecvDfusydH
By combining #Frida with an enhanced version of #Tenet, #Frinet facilitates the study of large programs, #vulnerability #research and root-cause analysis on iOS, Android, Linux, Windows, and most architectures. 🤩 https://t.co/xW5yWciHk8https://t.co/O5t0IaolUU
— raptor@infosec.exchange (@0xdea) January 2, 2024
i have never been so disappointed in all of my life pic.twitter.com/iQmNz4IIRV
— Uncle Duke (@UncleDuke1969) May 26, 2021
The fact that people today feel comfortable looking back at Y2K and laughing is because enough people took the problem seriously and fixed it before anything catastrophic could occur.
— Librarianshipwreck (@libshipwreck) January 1, 2024
It was a real problem, fixing it took real work. Even if many just remember it as a joke. 🧵
Thread by @libshipwreck on Thread Reader App – Thread Reader App
@libshipwreck: The fact that people today feel comfortable looking back at Y2K and laughing is because enough people took the problem seriously and fixed it before anything catastrophic could occur. It was a real pr...…
GitHub - vu-ls/Crassus
Contribute to vu-ls/Crassus development by creating an account on GitHub.
The third edition of my Security Engineering texbook will be freely available for download later this year, 42 months after publication. We did that with the first and second editions too, and in each case it increased sales of the paper book! https://t.co/PSnvpt1ivv https://t.co/pKX2NbZaUR
— Ross Anderson (@rossjanderson) January 1, 2024
Basic introduction to patch diffing in Ghidra by @qkaiser
— 0xor0ne (@0xor0ne) January 2, 2024
(Cisco RV110W)
Part 1: https://t.co/V75JrLhRUl
Part 2: https://t.co/xarGXBnfMd#reverseengineering #patch #cybersecurity pic.twitter.com/yDLzZ86giZ
Excellent introduction to Linux kernel exploitation by @k3170Makan
— 0xor0ne (@0xor0ne) January 2, 2024
Debugging with QEMU: https://t.co/MFkoXhjCXP
Stack Overflows: https://t.co/E6meVjl5ub
RIP control: https://t.co/mIdgQs4F0f#cybersecurity #Linux pic.twitter.com/cHg2xiFGFg
I wrote a long piece on how ransomware & the response to it is evolving. Western states, seemingly led by Five Eyes countries, are making more aggressive use of sanctions and offensive cyber operations against ransomware groups. What effect is that having? https://t.co/ydxfOgDYwA
— Shashank Joshi (@shashj) January 1, 2024
A CourtWatch & @404mediaco scoop - ‘The alleged mastermind of a massive, nationwide Airbnb scam whose exploits were first detailed in a viral article which then led to sweeping policy changes at company has been charged, according to court records. https://t.co/FB4nM9C0L9
— Seamus Hughes (@SeamusHughes) January 2, 2024
#redteamtips pic.twitter.com/Zzvr1dJu72
— spencer (@techspence) January 2, 2024
The rumour mill in the elite circle is that senior PLAARF officers gave the US the entire Chinese strategic weapon blueprint and battle plans.
— (@ReturnYueFei) January 2, 2024
This is estimated to have set the Chinese back 20 years and hundreds of billions of dollars at a time they can least afford it. https://t.co/gAwpkl5XdP
When Charles II tried to ban coffeehouses in 1675, he was correct that they were facilitating new information flows which were exploitable by threat actors against national security.
— davidad 🎇 (@davidad) January 2, 2024
In 1688, the Dutch used this vuln to persuade lords to politely invite them to invade England. https://t.co/iu40ajeNNK pic.twitter.com/I2OlFBPbGr
Here's the story of another technology that faced massive backlash in its time that will sound very familiar to today's battles over #AI.
— Daniel Jeffries (@Dan_Jeffries1) December 31, 2023
Coffee.
a thread. pic.twitter.com/RqUm4qwCGS
Thread by @Dan_Jeffries1 on Thread Reader App â Thread Reader App
@Dan_Jeffries1: Here's the story of another technology that faced massive backlash in its time that will sound very familiar to today's battles over #AI. Coffee. a thread. You might not think of coffee as technology...â¦
Kid has taken her rings off to eat mcnuggets. My line "it's like someone killed a hedgehog" has not been well received. pic.twitter.com/MavvCY8zzv
— 2024 edition (still pointless) (@DismalChips) January 2, 2024
this platform remains undefeated pic.twitter.com/sHQ3lfOlGg
— gaut (@0xgaut) January 2, 2024
Welcome to my 2023 Irreverant Red Team TTP Wrap Up (Trends, Trolls, Predictions)
— Jason Lang (@curi0usJack) January 2, 2024
It's likely some of these will ruffle feathers, but hackers break things right? 😁
🧵👇
Thread by @curi0usJack on Thread Reader App – Thread Reader App
@curi0usJack: Welcome to my 2023 Irreverant Red Team TTP Wrap Up (Trends, Trolls, Predictions) It's likely some of these will ruffle feathers, but hackers break things right? 😁 🧵👇 1. SIEMs are being replaced by XDRs...…
There is an orchid called the Gomesa Jiaho Queen Orchid, and this is what it looks like pic.twitter.com/wDnffuGHBZ
— Science girl (@gunsnrosesgirl3) January 1, 2024
As promised: Here's the first $10,000 @Intel bug (aka CVE-2022-33942) that allows to bypass the authentication of Intel's DCM by spoofing Kerberos and LDAP responses.
— Julien | MrTuxracer 🇪🇺 (@MrTuxracer) November 23, 2022
Exploit inside, enjoy 🥳https://t.co/PmK0Xq2T4o#BugBounty #security
kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices: https://t.co/wR7MSxdQ5L
— p0up0u (@p0up0u) July 21, 2023
I’m in Wensleydale and I’d like to show you the most amazing water bottle pic.twitter.com/7VqwvjBz7x
— Duncan McKay (@DuncMcKay) January 2, 2024
Hidden gem in @DonnchaC's #37C3 talk on Predator spyware: state actors could generate @letsencrypt certificates for any website by using their MitM capabilities at ISP level to complete verification challenges (both HTTP and DNS I expect).
— Ivan Kwiatkowski (@JusticeRage) January 2, 2024
CT may be the only way to detect this.
Welcome OpenVoice! 🎙️
— Vaibhav (VB) Srivastav (@reach_vb) January 2, 2024
A versatile voice cloning approach that requires only a short audio clip from the reference speaker to replicate their voice and generate speech in multiple languages.
Open access weights 🔥
It enables granular control over voice styles, including… pic.twitter.com/iyCx3tABu8
After the discovery of child abuse imagery within AI training data, my new piece for Tech Policy Press suggests that policymakers & the media aren’t listening to the right people when defining the risks of generative AI: https://t.co/9EERVE4e59 #ai #policy
— Eryk Salvaggio (@e_salvaggio) January 2, 2024