May 18, 2024
May 18, 2024
#ICYMI: IT workers infiltrated more than 300 U.S. companies, earning millions in North Korean illicit revenue generation scheme. https://t.co/Rn6zzkB0St
— NCSC (@NCSCgov) May 17, 2024
‼️ 300+ companies hired #DPRK IT personnel - by seeding individuals in targeted companies for purposes beyond the financial aspect. They were after infrastructure knowledge, intellectual property, and more. https://t.co/FhUJk4UXTq#insiders #irm #seedinginsiders #iptheft
— Christopher Burgess (@burgessct) May 17, 2024
GitHub - stas00/the-art-of-debugging: The Art of Debugging
The Art of Debugging. Contribute to stas00/the-art-of-debugging development by creating an account on GitHub.
Exploiting CVE-2023-6241 on Pixel 8 and bypassing Memory Tagging Extension (MTE)
— 0xor0ne (@0xor0ne) May 17, 2024
Great blog post by @mmolgtmhttps://t.co/oW9d4hNGoY#android #infosec pic.twitter.com/Un3WYp4YYR
"It should be noted that no ethically-trained software engineer would ever consent to write a DestroyBaghdad procedure. Basic professional ethics would instead require him to write a DestroyCity procedure, to which Baghdad could be given as a parameter." — Nathaniel Borenstein
— andi (e/alb) (@Nexuist) May 16, 2024
✍️ A summary of techniques used to hide the backdoor in the xz incident https://t.co/4LBfnaDSYJ by Hcamael@Knownsec 404 Team
— Alex Plaskett (@alexjplaskett) May 18, 2024
2 Preauth RCE we reported on Nvidia Triton Inference Server patched this month, The current security state of AI infrastructure is fragile. https://t.co/nLvuU6jyVt
— zhiniang peng (@edwardzpeng) May 18, 2024
Creative Windows Evasion and Forensics https://t.co/Qwf0Uc0SmW
— Stephen Sims (@Steph3nSims) May 17, 2024
Checkout the new NanoMIPS plugin/blog post that aided in reverse engineering a Mediatek-based 5G modem image! https://t.co/OwlQmtbFlx #cybersecurity #infosec #tech
— NCC Group Research & Technology (@NCCGroupInfosec) May 8, 2024