November 30, 2022
It's a well-known fact that steam engines can be bloody dangerous, what with being powered by water in its angriest phase and all, so rejoice in its replacement with something safer.
[checks notes]
Engines powered by boiling gasoline.
We're going to need a thread here...
-
Screenshots: the 4-page summary of "China Security Report 2023: China's Quest for Control of the Cognitive Domain & Gray Zone Situations", published by the Japanese National Institute for Defense Studies.
Matthijs R. Koot @mrkoot
-
-
More car hacking!
Earlier this year, we were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car.
Here's how we found it, and how it works:
-
A privilege to have worked on this study with Lieutenant General Mykhaylo Zabrodskyi, Oleksandr V. Danylyuk and Nick Reynolds for @RUSI_org. An incomplete, but hopefully useful baseline for learning lessons in conventional warfighting from Ukraine:
-
-
-
Not the onion.
San Francisco police clarified that it would not arm robots with guns. Instead, they would be equipped with explosives.
-
-
-
Call it the 21st century authoritarian paradox.
The more repressive a system is with political signs, symbols and forms of expression, the more anything can BECOME a sign or symbol etc.
Symbolism never dies. It just moves to the next best thing. 12/
-
https://infosec.exchange/@cyentiainst/109388194072970615#secops is undoubtedly challenging, but our analysis of detection policies/rules vs the usefulness of alerts suggests many organizations are making it even harder on themselves. Full study: https://www.securonix.com/resources/quantifying-siem-effectiveness/
-
https://vulncheck.com/blog/xiongmai-iot-exploitation https://infosec.exchange/@albinolobster/109428990805099502Recently, I was developing RCE exploits for Xiongmai NVR/IPC. I was focused on 7 vulnerabilities published between 2017 and 2022 (a couple of which had no CVE). Based on my research, I put together a write-up explaining why Xiongmai devices are interesting, shared thoughts on exploit dev, and shared some caught-in-the-wild exploitation.
-
Every Victorian novel should come with a set of fabric samples bound in at the back. Then when we read about worsted or crape or cambric or bombazeen we could flip to the textile glossary, run our eyes and hands over a little swatch, and actually grasp the textures of that world.
-
- Windows Malware Analysis Series by @ale_sp_brazil - Windows Internals Blog Series by @yarden_shafir Check it out here: vx-underground.org/archive.html
Don't miss what's next. Subscribe to the grugq's newsletter: