June 18, 2024
June 18, 2024
Hackers who stole Ticketmaster data from Snowflake account appears to have accessed data through a contractor named EPAM Systems. EPAM has workers in Belarus, Ukraine and, before war, Russia. Hacker told me they breached an EPAM worker in Ukraine. https://t.co/2c6mOHsBoy
— Kim Zetter (@KimZetter) June 17, 2024
đź“ŁOfficial statement: the new EU chat controls proposal for mass scanning is the same old surveillance with new branding.
— Meredith Whittaker (@mer__edith) June 17, 2024
Whether you call it a backdoor, a front door, or “upload moderation” it undermines encryption & creates significant vulnerabilitieshttps://t.co/g0xNNKqquA pic.twitter.com/3L1hqbBRgq
Strong post by @gavinbwilde off platform pic.twitter.com/G9uFlmFG1d
— Thomas Rid (@RidT) June 17, 2024
Yes. That is correct.
The manufacturers of commercial spyware Pegasus argued in a court filing that it is appropriate for its global clients to target any high-ranking official with the technology because their jobs categorically make them “legitimate intelligence targets.” https://t.co/E25SOSeKR6
— The Record From Recorded Future News (@TheRecord_Media) June 17, 2024
We have to keep remembering that these policies are not an attack on "encryption": they are an attack on confidentiality - your ability to have a private conversation. Governments have lost the argument about breaking encryption, so now they want the data before it's encrypted. https://t.co/ZIGK00UGUk
— R Wilton https://freeradical.zone/@futureidentity (@futureidentity) June 17, 2024
Three people convicted of spying for Russia in Poland avoid prison – Polish media outlet https://t.co/Bxkr38JKH7
— Dr. Dan Lomas (@Sandbagger_01) June 17, 2024
I got an email this morning, supposedly from Warner Media. I'm sure it's a scam, but I got a belly laugh out of it. Here's the first paragraph:
— Jeff Duntemann (@JeffDuntemann) February 28, 2024
"Your published material 'x64 Assembly Language Step-by-Step' was recommended to us for review and our company - WarnerMedia would…
https://www.cyberscarecrow.com
Every Way To Get Structured Output From LLMs
[2406.08719] TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution
ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aiming to detect memory corruption vulnerabilities. The low overhead of MTE makes it an attractive solution to mitigate memory corruption attacks in modern software systems and is considered the most promising path forward for improving C/C++ software security. This paper explores the potential security risks posed by speculative execution attacks against MTE. Specifically, this paper identifies ne...
for sale:
— shy watson (@formermissNJ) June 17, 2024
sex rope,
never used https://t.co/9yl6Ohv1RW