October 26, 2024
October 26, 2024
After 2.5 years 4 REvil case defendants sentenced in RU
— Oleg Shakirov (@shakirov2036) October 25, 2024
Zaets & Malozemov got 4.5 & 5 years for illegal turnover of payment means (art 187 of the Criminal Code)
Puzyrevskiy & Khansvyarov got 5.5 & 6 years on art 187 & use/distrib. of malware (art 273)https://t.co/nc1Zz03B7J
"Majority of affected orgs targeted were Government of Canada departments .. and includes federal political parties, the House of Commons and Senate. They also targeted ... democratic institutions, critical infrastructure, the defence sector, media orgs, think tanks and NGOs." https://t.co/RBDuxXzSDk
— Dan Black (@DanWBlack) October 26, 2024
Today Namecheap launched the new TLD .locker
— vx-underground (@vxunderground) October 25, 2024
They state it is for people involved in Bitcoin, DeFi apps, and online gaming. In other words, it is perfect for ransomware groups.
Very cool. https://t.co/tpCf2h2SY9
Before you buy a domain name, first check to see if it's haunted
a domain name is “haunted” when something in its past gives it a poor reputation among search engines, affecting its ability to rank in search results, even after it changes ownership.
Before you buy a domain name, first check to see if it's haunted | Bryan Braun - Frontend Developer
In mid-2022 I bought a new domain name.
This is conceptually very interesting. What happens when reputation is tied to a domain name (which is how we do things), but domain names are transferable.
It is related, I think, to that case from a few years back where a father sent pictures of a rash on his son’s genitals to a doctor. Google banned his account for CSAM and then the police said he was innocent. But Google had no process to rehabilitate an account that they’d banned for CSAM.
The idea of reversing the previous judgement on an identifier is something that will become more important going forward. Domain names will be reused and repurposed, and accounts will need to be rehabilitated.
The internet does not have a final state.
I think this is surprisingly important and certainly something that will not get enough attention by the academic crowd that looks at public-private partnerships and cyber policy in general. https://t.co/6vww9iPyuS
— Dave Aitel (@daveaitel) October 25, 2024
Does anyone know if North Korea is also offering offensive cyber support to Russia ? Is this something our current web of threat intelligence companies would be able to pick up? https://t.co/U6wAO2fF02
— Dave Aitel (@daveaitel) October 25, 2024
Not sure it’s their sort of thing…. how much crypto does Ukraine have to steal anyway?
— thaddeus e. grugq (@thegrugq) October 26, 2024
Me when I have to understand a semi-QCD model describing hadronization of quark-gluon plasma in ultra high energy proton-proton collisions, but it is written in Fortran 90. https://t.co/eMz56JhUik
— Anir Von (@anir1uph) October 26, 2024
At some point there will be “computer classicists” who learn ancient languages like C just to read the original sources.
— thaddeus e. grugq (@thegrugq) October 25, 2024
“C is a dead dead language
As dead as it can be
It killed the ancient UNIX
And now it’s killing me
— some computer classics scholar, probably
How do you explain to normal people that modern exploits are actual pieces of art?
— Rio (@0x09AL) October 25, 2024
Welp! slaps knees while getting out of bed The fresh horrors aren’t going to face themselves
— David Johnston (@dl_johnston) October 24, 2024
How do you explain to normal people that modern exploits are actual pieces of art?
— Rio (@0x09AL) October 25, 2024
After the first safari -> root chain we landed, I just sat there running it over and over in awe
— itszn (@itszn13) October 25, 2024
It’s very difficult to express that feeling, seeing months of complexity compressed down into a single moment….
When I took LSD as a teenager and broke out of my shell, I realized my life's purpose was collecting granular insights to enhance market penetration and strengthen brand equity in a crowded landscape
— HARVEYDENT (@HARVEY__DENT) October 25, 2024
GHSL-2024-297_GHSL-2024-298: Remote Code Execution in Plenti leading to arbitrary file write and arbitrary file deletion - CVE-2024-49380, CVE-2024-49381 https://t.co/B4GR8MkbQ4
— GitHub Security Lab (@GHSecurityLab) October 25, 2024
"we would look at xrefs to strcpy() and write a highly reliable exploit by the end of the day" pic.twitter.com/9VEebVCHln
— b1ack0wl (@b1ack0wl) October 14, 2024
"we would look at xrefs to strcpy() and write a highly reliable exploit by the end of the day" pic.twitter.com/9VEebVCHln
— b1ack0wl (@b1ack0wl) October 14, 2024