July 3, 2024
July 3, 2024
We’re honoured to welcome the new team to the Gecko family 🦎 https://t.co/VJPAyEhQVD
— Binary Gecko (@Binary_Gecko) July 2, 2024
Today @RecordedFuture released a research paper on using malware infostealer logs to identify CSAM consumers.
— vx-underground (@vxunderground) July 2, 2024
RecordedFuture identified over 3,000 individuals purchasing CSAM. All users were reported to their respective law enforcement agency.https://t.co/0uz5jPAJfS
Regarding the SSH bug 1) First OpenSSH vuln discovered in almost 20 years - wow 2) Bug was (re)introduced almost 4 years ago. So remote root in OpenSSH for 4 years and nobody found it? 3) Exploit takes hours/days to run. Watch your logs!
— Charlie Miller (@0xcharlie) July 1, 2024
Whilst I have your attention: we got Mark Dowd on SCW about exploit markets(!). I had a whole list of HN grudges to settle teed up, but was 7 minutes late to the recording trying to level up an ER character for the DLC and was too flustered to pull it off. https://t.co/xMItU4V3X9
— Thomas H. Ptacek (@tqbf) June 27, 2024
Security researcher @raghav127001 believes he may have identified a host actively exploiting CVE-2024-6387. However, they're not sure (and neither are we).
— vx-underground (@vxunderground) July 3, 2024
We've archived the binaries before the identified host nukes them.
Possible CVE-2024-6387: https://t.co/jBGYCACUr8
This is just so fascinating.
— Ravi Nayyar (@ravirockks) July 3, 2024
cc: @thegrugq https://t.co/rD8x9j4vg2
https://x.com/ryanruby/status/1808235119427440902
use-after-free vulnerability due to the interaction between Unix garbage collection (GC) and the io_uring Linux kernel componenthttps://t.co/HZ9FQrpitt
— 0xor0ne (@0xor0ne) July 3, 2024
Credits Shoily Rahman (@Oracle)#Linux #cybsersecurity pic.twitter.com/hzqj9deEwa
I guess some of those vulnerabilities were probably fixed in the Samsung July update.
— Anderson Nascimento (@andersonc0d3) July 3, 2024
Out of bound write in the heap in 2G (no auth)https://t.co/289D398jRg
Out of bound of a heap buffer in SIM Proactive Commandhttps://t.co/gm81IpT2yz
Out of bound write in the heap in 2G (no… https://t.co/3FBkH5Bttj
I'm very excited to finally share the first part of the research I did into Ghostscript. This post details the exploitation of CVE-2024-29510, a classic format string bug, which we abuse to bypass the SAFER sandbox and gain RCE.https://t.co/gym3XltBpe
— Thomas Rinsma (@thomasrinsma) July 2, 2024
Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF.https://t.co/sex6fR0xHS
— Thomas Rinsma (@thomasrinsma) May 20, 2024
#GitHub actions #exploitation series by @Synacktiv https://t.co/SO5Os4sGCP https://t.co/vvvjTzJ62r
— raptor@infosec.exchange (@0xdea) July 3, 2024
Virtual Escape; Real Reward: Introducing Google’s kvmCTF https://t.co/2ERM5V3AKV
— Anderson Nascimento (@andersonc0d3) July 2, 2024