March 7, 2023
@IanColdwater I curated an list from my past experience that included all the best videos. I recommend A-Z of B & E from the late eighties!
-
A big shout out to all the organizers for making this happen! Keeping my fingers crossed for all fuzzers including AFLSmart++, which is my extension of #aflsmart. I hope it will outperform its original version to achieve my design goals. Regarding its final ranking, who knows? ;)
DonggeLiu @Alan32Liu
-
Hats off to the forward thinking hackers posting tons of broken code in lots of different places for LLMs to parse and remember as suggestions years from now.
-
-
āOccurred on November 4, 2022 / Manchester, Ohio, USA We had contracted a demolition company to set off explosives on a controlled demolition. The contract was only to control blast 4 towers but as the 4th tower started to fall it switched directions and took out the scrub towerā
-
-
This sounds like a hackers dream. I can think of several scenarios these features could be used maliciously. @0xcharlie is probably thinking, challenge accepted. #Vulnerability #hacking #cybersecurity #infosec
TheBlaze @theblaze
-
Introducing "Untidy," a newsletter where I make sense of big claims about cybersecurity. First up, a look at Jonathan Scott's report on spyware in Morocco.
-
Some parts of Twitter may not be working as expected right now. We made an internal change that had some unintended consequences. Weāre working on this now and will share an update when itās fixed.
-
TIL Building entry devices to allow emergency response crews to access buildings during a fire or similar conditions have Bluetooth support .
š¤Øš§
Lol what's better is apparently this box holds a key fob to access the building.
However the box doesn't prevent me reading the keyfob stored inside it.
Just took a flipper zero around the box and was able to get the fob to be read.
šššš
Greg Linares (Mantis) @Laughing_Mantis
-
-
Atlantic Council had a group of experts mark up the new 2023 US National Cybersecurity Strategy. The group included: Maia Hamin, Trey Herr, Danielle Jablanski, @webjedi @loomisoncyber @thedarktangent @likethecoins @marcwrogers Stewart Scott & @WeldPond
-
https://infosec.exchange/@hdm/109979752192232352I love crypto research that demonstrates practical attacks. The paper `A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm` by Nicky Mouha and Christopher Celi demonstrates RCE (!) through controlled memory corruption in the final-round update of the Keccak code used by SHA-3. This implementation bug affected Python, PHP, and the SHA-3 Ruby package: https://eprint.iacr.org/2023/331
Bonus points for dropping a Metasploit reverse TCP payload!
-
-
https://t.co/yjAHeVkgYl https://t.co/6QVURpHagc-
well I for one just went on an etymological adventure
Anne ThƩriault @anne_theriault
-
German government plans to ban the use of Huawei and ZTE components in the 5G network since dependency on these 'unwelcome' producers poses incalculable risks. Already installed parts are to be ripped out and replaced. @thegrugq @ciaranmartinoxf
-
https://www.wired.com/story/welfare-state-algorithms/ https://mstdn.social/@JorisMeys/109976797433224542The city of Rotterdam used an " AI " algorithm to flag people for possible social fraud. Wired et al figured out how this algorithm mostly flagged the most vulnerable people: young single moms with a low income and only basic knowledge of Dutch.
-
Don't miss what's next. Subscribe to the grugq's newsletter: