July 19, 2022
My keynote presentation on the Russian cyberwar in Ukraine.
-
How an Unqualified Sex Worker Allegedly Infiltrated a Top Air Force Lab
the woman “engaged in acts of prostitution”… with other scientists from the Air Force Research Laboratory, the warrant says. One,… paid the woman “approximately $20K a year to clean his residence in the nude and then perform oral sex on him,” according to the warrant.
two weeks before Roy was set to fire her, the woman told Roy she was resigning to take a job at Spectral Energies’ main competitor, Innovative Scientific Solutions Incorporated (ISSI), the warrant says.
They [the investigators] also reviewed the spreadsheet [of sex workers] Gord previously revealed to Roy, according to the warrant.
“Many of the 27 women listed on the Excel document were foreign nationals from countries considered U.S. National Security concerns,” it states.
This lady is an absolute legend.
How an Unqualified Sex Worker Allegedly Infiltrated Air Force Research Lab at Wright-Patterson AFB
When the scheme fell apart, senior research scientist Dr. James Gord threatened to kill the woman’s supervisor and himself, according to a search warrant.
-
-
-
-
This 40yr old Polish animation short is… I guess you just have to watch it.
Agrotechnology - 35mm.online
An erotic episode about farming in the world of robots. Cuttings do not want to undergo mechanical stimulation. A space inspector is the only one who can change their opinion.
-
Sybil Attacks on Airdrops
Sybil Attacks on Airdrops
Sybil attacks occur when networked systems get gamed by a small number of accounts, creating multiple identities. Proof-of-stake and Proof-of-work mechanisms on blockchains provide Sybil resistance against attacks. These mechanisms prevent a single user from spinning up a large number of nodes to influence the network (economic costs). There's a different flavor of Sybil attacks that occur on blockchains now. Many chains or web3 applications have used airdrops as a growth mechanism (whether or
-
-
-
-
-
-
-
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band.
[2207.07413] SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band. The Serial ATA (SATA) is a bus interface widely used in modern computers and connects the host bus to mass storage devices such as hard disk drives, optical drives, and solid-state drives. The prevalence of the SATA interface makes this attack highly available to attackers in a wide range of computer systems and IT environments. We discuss related work on this topic and provide technical background. We show the design of the transmitter and receiver and present the implementation of these components. We also demonstrate the attack on different computers and provide the evaluation. The results show that attackers can use the SATA cable to transfer a brief amount of sensitive information from highly secured, air-gap computers wirelessly to a nearby receiver. Furthermore, we show that the attack can operate from user mode, is effective even from inside a Virtual Machine (VM), and can successfully work with other running workloads in the background. Finally, we discuss defense and mitigation techniques for this new air-gap attack.
-
Busting browser fails: What attackers see when they hack your employees’ browser - Detectify Blog
What Attackers See When Hacking Browsers - Blog Detectify
David Jacoby outlines why a browser is so vital in the cybercrime ecosystem and what CISOs can do to protect employees against browser hacks
-
A meta thread - Plz RT for reach
#identitysecurity