November 4, 2022
Friend: oh no, crows have read FM 3-24 Counterinsurgency
huge drama on my block rn. basically my crows got tired of the local squirrels always taking some of the food i leave out. so now, as an act of retaliation— the crows are going yard to yard, finding the squirrels’ stashes, & eating everything. squirrels are watching in horror
-
-
"Coercer: A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods."
#infosec #pentest #redteam
github.com/p0dalirius/Coe…
-
New TikTok's privacy policy (2December) is here. "information includes your device model, operating system, keystroke patterns or rhythms...". So, what's your favorite video filter on TikTok? tiktok.com/legal/page/eea…
-
-
Basically a press release from cyberint, but it’s kinda interesting to see the evolution of a criminal hacking group.
https://www.timesofisrael.com/israeli-cyber-intel-firm-shines-bright-light-on-new-shadowy-cybercrime-collective/-
"A plugin to introduce interactive symbols into your debugger from your decompiler" // by @mahal0z github.com/mahaloz/decomp…-
-
-
i was not expecting this to end with the world's richest man spending all day on twitter begging people for $8 but it's extremely funny?
Elon Musk @elonmusk
-
-
-
Beijing continues to double down on its efforts to build a more sustainable and self-reliant digital economy, and the country’s handling of data and computing infrastructure will surely prove to be an important thing to watch, writes Seaton Huang.
-
If you thought #ProxyRelay was dead with Extended Protection, think again!
Thanks to #ProxyNotShell and @irsdl’s encoding bypass it’s alive and well! 👻
Rich Warren @buffaloverflow
-
SandboxEscaper (Essbee) found her cryptographic memory corruption bugs ☺️ (she discovered the recent OpenSSL bugs). Was determined to go from logic LPE bugs to remote memory corruption; found both kernel and user 0click in < 3mo. One of the most prolific bug hunters of all time
-
-
Software companies aren't made of code. They're made of processes that produce and maintain code. And the foremost component of these processes are people.
The code is just a by-product. More of a liability than an asset.
-
Important point here.
So much of our understanding of cyber operations has been framed under conditions short of war that we are nowhere close to understanding it under conditions of war. There's much more to cyber support to military ops than wipers timed with troop movements.
Glitchy Michael 🌻 @GlitchyMichael
-
-
No identity verification, & 8 bucks for a verified account?
Get ready for the new cyber criminal playbook: use stolen credit card to buy verified Twitter account, impersonate real customer support channels, trick users into handing over account details in DM, account takeover. https://t.co/lZ9wCVSc0a
Ryan Mac 🙃 @RMac18
Want to know why this attack method works now & will work in the updated Twitter Blue scenario? Because real companies use Twitter as a customer support channel and they actually *do* ask for account details to support. When the criminals can match real world behavior, it works.
-
[first day as a doorman]
me: bye, thanks for coming
sperm bank manager: *pulling me to the side* this was literally the first thing we talked about
-
There used to be 3 cash machines at Bootle Asda. A few years ago they took 1 away and covered the hole with a metal plate. Someone has took the metal plate away last night, climbed through the hole and emptied the other 2 cash machines 😂
-
My analysis of Permissions Policy. Very useful security/privacy feature, allows granular/global disabling of access to sensitive web browser features. Helps with tech development, also compliance. Add it to the standard privacy engineering checklist! :)
-
Slides with notes from my presentation "Cyber and Information Security: have we all gone mad?" held yesterday at @CyberSecTUDelft @tudelftTBM. A reflection on how our norms and attitudes have truly been shattered since the 1990s: berthub.eu/cyber-mad/Cybe…
-
# This is a first. A mastodon link instead of Twitter. Unsupported though, so I’ll have to change my workflow if Twitter tanks.
https://infosec.exchange/@FlUxIuS/109284728102602160https://www.usenix.org/conference/usenixsecurity22/technical-sessionsUSENIX 22 video recordings are up
-
Don't miss what's next. Subscribe to the grugq's newsletter: