November 1, 2024
November 1, 2024
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices | WIRED
Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work—and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.
NEW from me in @WIRED: In 2019, the Trump admin ordered a reluctant CIA to help overthrow Venezuelan autocrat Nicolas Maduro. Among other actions, CIA conducted a cyberattack to sabotage the digital payments system used by the Venezuelan military. https://t.co/GxYnXZkKth
— Zach Dorfman (@zachsdorfman) October 31, 2024
Dailydave: Old Infosec Talks: Metlstorm's Take on Hacky Hacking
Italian private company hired a private offensive cyber contractor to hack government systems, steal private data, including of politicians like president or prime minister. They used trojans and insiders. The data was used to blackmail businesspeople and politicians.… pic.twitter.com/yg11JX2CB4
— Lukasz Olejnik (@lukOlejnik) October 30, 2024
It's 1993 & You Startup Windows 3.11! 😮 pic.twitter.com/OndCvu4DDD
— Dark Web Informer (@DarkWebInformer) October 31, 2024
Looks like a random AI slop site based in Illinois, aided by social media, has coaxed hundreds of people on to the main street of Dublin for a Halloween parade that was never happening. https://t.co/zbu1s6iQJG
— Stephen McDermott (@Ste_McDermott) October 31, 2024
Thread by @Ste_McDermott on Thread Reader App – Thread Reader App
@Ste_McDermott: Looks like a random AI slop site based in Illinois, aided by social media, has coaxed hundreds of people on to the main street of Dublin for a Halloween parade that was never happening. This...…
Possibly the creepiest-looking space video in existence; an empty Russian Orlan spacesuit floats away from the International Space Station. The suit had been retired from use, and was fitted with a radio transmitter to make it into a temporary hand-launched satellite. https://t.co/6J8cp5pZUR pic.twitter.com/Omf5aMGm0U
— DKiS (@DKiSAerospace) October 31, 2024
Good research from @random_walker and team. Transparency and access to open model weights will only improve our understanding of their capabilities and risks. Requiring they are locked down risks a scenario where the only people who have access are few major labs and bad actors. https://t.co/dDRUFWMqSO
— chrisrohlf (@chrisrohlf) October 31, 2024
I've been wanting to write a L3 router -> socks proxy thing in Go for a long while, but the effort and time needed was never there. Fortunately someone else did, and it's really good. Any SSH client is now my C2 channel.https://t.co/VbWbDtxEsN
— Lars Karlslund - mucking around with your AD (@lkarlslund) October 30, 2024
GitHub - xjasonlyu/tun2socks: tun2socks - powered by gVisor TCP/IP stack
tun2socks - powered by gVisor TCP/IP stack. Contribute to xjasonlyu/tun2socks development by creating an account on GitHub.
This day in 1938 newspapers reported a mass panic triggered by a radio dramatization of 'The War of the Worlds'
— Pessimists Archive (@PessimistsArc) November 1, 2024
It turns out... this mass-panic never happened and was a smear against radio as a new source by newspapers threatened by a new medium... https://t.co/w1GGIcbxqJ
Sophos uncovered links to groups like Volt Typhoon, APT31, APT41, and Chinese educational institutions. Now, we’re sharing insights from our detailed "Pacific Rim" report to help others defend against these persistent attackers.
— Sophos X-Ops (@SophosXOps) October 31, 2024
Sophos' Pacific Rim: Defense Against Nation-State Adversaries
Discover Sophos' Pacific Rim defense against nation-state / Chinese hackers Volt Typhoon, APT31, and APT41 targeting critical infrastructure.
Sophos discusses their five year plan to tackle China
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats – Sophos News
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
Sophos dumps the technical details
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns – Sophos News
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
Fuzzing between the lines in popular barcode software
Fuzzing between the lines in popular barcode software | Trail of Bits Blog
By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most impo…
An excellent explanation by @MalwareTechBlog of a ridiculously complex problem which most people (even in CTI) over simplify and fail to understand. I couldn't agree more. Bravo! 👏https://t.co/NGnSm8V3KL
— visi stark (@invisig0th) October 31, 2024
Marcus Hutchins on LinkedIn: So, why does it seem like every cybersecurity company has a different name… | 34 comments
So, why does it seem like every cybersecurity company has a different name for the same threat? This is actually a question I've asked in the past too. Let me… | 34 comments on LinkedIn
Introducing bitnet.cpp: A blazing-fast open-source 1-bit LLM inference framework that runs directly on CPUs.
— Sumanth (@Sumanth_077) October 30, 2024
You can now run 100B parameter models on local x86 CPU devices with up to 6x speed improvements and 82% less energy consumption! pic.twitter.com/GG1Wf7CuAv
With all due respect to former President Trump, Taiwan did not steal the US semiconductor industry.
— Dan Nystedt (@dnystedt) October 30, 2024
-Taiwan created trillions $$$ in value for the US chip industry, helping transform it into the juggernaut it is today.
-Taiwan helped save the US chip industry from Japan.
-Taiwan…
Thread by @dnystedt on Thread Reader App – Thread Reader App
@dnystedt: With all due respect to former President Trump, Taiwan did not steal the US semiconductor industry. -Taiwan created trillions $$$ in value for the US chip industry, helping transform it into the juggernau...…
What would you do with a maxed out M4 MacBook Pro? pic.twitter.com/HeWhSZlNyZ
— Corey "👻IAM Fails Open!🙀" Quinn (@QuinnyPig) October 31, 2024
This is the system prompt for Apple Intelligence. Turns out Apple's prompt engineers are as clueless about how LLM work as all the others. pic.twitter.com/xyRQfqogyK
— Andriy Burkov (@burkov) November 1, 2024