January 31, 2025
# January 31, 2025
a 2005 study found an autistic reindeer herder in siberia that didnt like being around people but memorized the entire genealogical and medical history of all his 2600 reindeer, which made him a respected elder in his community https://t.co/vT0qUzJpoH
— THEObr🌞mic (@theobromic_) January 30, 2025
-
Thanks for your attention,
— Ange (@angealbertini) January 30, 2025
it was fun!
I crafted a working Doom polyglot :
Dos executable, Portable executable and PDF.https://t.co/mUz2JsPQm0 pic.twitter.com/C5hCNvitaE
-
C2 Tracker: Live Feed of C2 servers, tools, and botnets https://t.co/K8ZghIvDMa
— Nicolas Krassas (@Dinosn) January 30, 2025
-
https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/-
If you like solving crypto CTF challenges, check out our writeups for ZKHack! https://t.co/NNmxCSCEyI pic.twitter.com/1Max55Oc74
— cts🌸 (@gf_256) January 29, 2025
-
Windows CLFS heap-based buffer overflow analysis (CVE-2024-49138) – Part 1 : https://t.co/ilXqU01GRt credits @MrAle_98 pic.twitter.com/6mgqU0tioS
— Binni Shah (@binitamshah) January 29, 2025
-
## RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces
https://enck.org/pubs/bennett-ccs24.pdf
-

NCSC
A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.
-
EXCLUSIVE: An inside look at North Korea’s efforts to exploit US businesses, funding its WMD + ballistic missile programs.
— Sasha Ingber (@SashaIngber) January 26, 2025
This 23-year-old gave me images, audio, video. With help from the North Koreans, he got a job offer from a US government contractor.https://t.co/f4Uot1jq7z pic.twitter.com/WLF0gLhX3K
-
The first episode of Where Warlocks Stay Up Late is out! https://t.co/nBczMJooVL
— HD Moore (@hdmoore) January 31, 2025
>Digital Jesus/o.0, aka Matt Harrigan, turned a telecommunication product release into a 0-day, tipped off drug dealers about government surveillance, and emerged as a cybersecurity founder/CEO
-

Add F*cking to Your Google Searches to Neutralize AI Summaries
Google will probably close this loophole soon enough.
-
Just updated our documentation on using Timesketch to analyze Hayabusa results:https://t.co/PA2CFd48Wp
— Yamato Security Tools (@SecurityYamato) January 31, 2025
It includes an overview of the main features you want to use in your investigations.