November 5, 2022
#Qatar #Potemkin #WorldCup
"Fans paid to be ‘spies’ at World Cup "
Free flights, apartments £60 a day etc.
Expected to sing and chant and wave flags during the opening ceremony.
George Mann 🫧⚒️🫧 @sgfmann
-
-
Today with @FedorovMykhailo we're announcing we will extend tech support free of charge for Ukraine through 2023. This ensures gov’t, critical infrastructure, and other sectors in Ukraine can continue to serve citizens through the Microsoft Cloud.
-
“No person ever audits the same code twice. For it is not the same code, and you are not the same person.”
(In response to accidentally checking out a slightly older version of code for a vuln, but the older version didn’t have the vuln, it was added in a newer version…)
-
A detailed analysis of a Samsung in-the-wild exploit, attributed by TAG to a commercial surveillance vendor. All 3 bugs were 0-day at the time of the discovery of the sample. 1/3
googleprojectzero.blogspot.com/2022/11/a-very…
-
-
You know what, British Museum cataloguer? Maybe this artist was doing their best. Maybe it was their first go at dolphins. Maybe they've never even SEEN a dolphin up close. Maybe painting dolphins onto a pot is harder than it looks. God, everyone's a critic.
-
🚨 Daniel Duggan, the former US military pilot recently arrested in Australia, listed the same Beijing address as Stephen Su aka Su Bin, a 🇨🇳 businessman jailed in the US for a hacking case involving theft of US military aircraft designs by 🇨🇳 military. reuters.com/world/exclusiv…
-
The 2022 Microsoft Digital Defense Report is now live. #NationStates are coupling cyber and physical attacks and #influenceoperations are on the rise, while criminal actors are increasing speed and volume. Link to report in the blog post below.
-
We’re happy to announce our new blog series called “Plugin Focus” where authors of some of the most useful plugins will introduce them and provide some valuable insights. We start with HRDevHelper 🌐 hex-rays.com/blog/plugin-fo…
#PluginFocus #IDAPro #IDAPython #IDAPlugin
-
-
Want to get into || improve in vulnerability research & exploit dev? My suggestions:
1.Pick a recent CVE in an open source target that interests you
2. Study the code until you thoroughly understand the issue (write it up)
3. Write a repro PoC
4. Try to write an exploit for it
🧵
-
RC4 Is Still Considered Harmful
// by @tiraniddo
googleprojectzero.blogspot.com/2022/10/rc4-is…
Exploitation without Interception (CVE-2022-33679) PoC
// by @Bdenneu
-
When the Bank of England forecasts depression, does it factor into the forecast the impact of a forecast by the Bank of England predicting depression? I try to un-muddle our relationship with forecasting.
-
Can privacy-enhancing technologies (pets), like zero-knowledge proofs and fully homomorphic encryption, solve the internet’s privacy problem?
-
-
-
@SarahTaber_bww I note that the acquisition and sudden implosion of freenode is a great model for understanding twitter's takeover, but mostly only open source guys noticed: see lwn.net/Articles/85654… and lwn.net/Articles/85714… and theregister.com/2021/05/26/fre… and so on.
-
Don't miss what's next. Subscribe to the grugq's newsletter: