March 29, 2023
Cannot recommend this highly enough
Grateful to @IISS_org for the opportunity to share some thoughts around the success of Ukraine’s cyber defense. At this stage of the war, Ukraine has decisively won the adaptation battle in cyberspace.
-
-
In 2018, this sophisticated bug was found inside a CryptoPhone used by WikiLeaks in London, around the time of the Snowden Revelations. In this article we analyse the bug:
-
Senate Bill 686, The Restrict Act, wants to put you in jail for 20 years for using a VPN for using a website or app is operated by a “foreign adversaries.” These are the foreign adversaries btw
-
Sam Bankman-Fried directed $40M in cryptocurrencies to one or more 🇨🇳 government officials in order to influence them to unfreeze $1B worth of assets in FTX sister firm Alameda Research’s trading accounts on two of China’s largest cryptocurrency exchanges. decrypt.co/124747/sam-ban…
-
BreachForum affidavit
https://storage.courtlistener.com/recap/gov.uscourts.vaed.535542/gov.uscourts.vaed.535542.2.0.pdf-
Parsing the .DS_Store file format
https://0day.work/parsing-the-ds_store-file-format/-
1/ Various russian Telegram channels share a video that allegedly shows Ukrainians stopping a car with a woman and a child (the child is not seen), engaging in a verbal alteration, and then shooting at the car. This looks like a staged video, for the following reasons:
The story takes an unexpected turn. Russian famous telegram channel, with over 300,000 subscribers, has admitted that the video is fake:
"The video is fake, our crooked exercise. In conducting such information operations, there is still much for us to learn and improve upon."
-
THE EV TRANSITION IS HARDER THAN ANYONE THINKS
This is good analysis. It’s off topic, but the approach is solid and comprehensive. I like it.
https://spectrum.ieee.org/the-ev-transition-explained-2659602311-
However, the meatball is not yet fit for human consumption, the company said, adding that since it is an "extinct protein" it will take more time to determine whether Mammoth meat is safe." loading="lazy">-
-
If you want to read more about problems with this kind of forensic image analysis, might I recommend ...
Forensic scientists have estimated perps' heights in crime scene photos for generations. They contributed to countless prison sentences. In a new study by Hany Farid and @SBarrington_, the experts' results were inaccurate and erratic.
-
"Exploitation of CVE-2023-23397 leaves very few forensic artifacts to discover in traditional endpoint forensic analysis"
Ryan Naraine @ryanaraine
-
After hacking into the email of a Russian airforce colonel, the hackers, posing as an officer in the unit, then convinced the colonel’s wife to coordinate photos of all of the unit’s wives posing in uniform jackets showing all medals. This revealed names and service details
InformNapalm @InformNapalm
-
Just published a new post in my "Writing a debugger from scratch in Rust" series! In this one, we implement some basic memory commands for reading bytes and strings from the target process.
-
It’s always “we live longer our retirement age should be higher” and never “our productivity per hour is multiplying we should retire earlier”
-
Challenge 1: What is a good feedback in hardware? Branch coverage not meaningful.
Challenge 2: what are good mutators?
Challenge 3: How to deal with this extremely slow execs per second?
Check out HeteroFuzz [FSE'21]:
-
ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks bit.ly/3LW8gQl<<< Cool research by @hoxhunt
-