October 3, 2023
October 3, 2023
π§ββοΈ CISO Story Time
β Jason Haddix (@Jhaddix) October 2, 2023
This is not exaggeration.
I have a good friend. He's a CISO of a multinational organization in the technology sector. We talk often.
Market trends, sales, and business regulations had the business decide to open an facility in China.
a 𧡠π
Thread by @Jhaddix on Thread Reader App β Thread Reader App
@Jhaddix: π§ββοΈ CISO Story Time This is not exaggeration. I have a good friend. He's a CISO of a multinational organization in the technology sector. We talk often. Market trends, sales, and business regulations had t...β¦
Gone in 61 seconds.
β Denis Laskov (mastodon.social/@it4sec) (@it4sec) October 2, 2023
The keys were left near the front door. pic.twitter.com/2GSr7qjvrn
βWe first sent to a Nature journal, and within 24 h, they rejected it as an incremental contribution. I started learning English only at university, so I had to look up the meaning of the word incremental!β
β A.M. (@bhalomanush) October 2, 2023
Katalin KarikΓ³, in 2021, on her paper that led to a Nobel Prize today.
Here's a short new blog from @_minipli on the results of our exploit review applied to a recently-described in-the-wild Android kernel exploit.
β grsecurity (@grsecurity) October 2, 2023
It shows how we use our compiler-based defenses to land security improvements for customers quickly: https://t.co/baiM2DwJEn
Not sure if you noticed, but as of yesterday, the UK only had one coal-fired power station remaining
β Simon Evans (@DrSimEvans) October 2, 2023
UK coal use is now the lowest it's been since 1757https://t.co/N9odr1x3wG pic.twitter.com/q2iZ78NeCf
See, you donβt need a backdoor in encryption, you just change your phone every time. Jobs a good βun
β Daniel Cuthbert (@dcuthbert) October 3, 2023
Logs? What logs? https://t.co/SCFx8mwZMr
A group of young Vietnamese people quit their jobs at the company and established a full-time bug bounty group and this is the group's 1-month performance. Very Impressive ππ―π₯ https://t.co/mFVoy1uehz
β Tuan Anh Nguyen π»π³ β‘οΈ (@haxor31337) October 2, 2023
In the war between fentanyl and AI, it appears as though fentanyl has the early lead pic.twitter.com/cKmlM3jPJa
β prayingforexits π΄ββ οΈ (@mrexits) October 2, 2023
Friends - I hope youβll check out my new article in the AHR. It explains how the international arms trade empowered and connected the American Revolution, the Haitian Revolution, and the Spanish American Wars for Independence. (π§΅1/7) https://t.co/Dw6HSS9fq4
β Brian DeLay (@BrianDeLay) October 2, 2023
This is exactly what late stage empires do. https://t.co/G0e2eDTtDZ
β Gritty is the Way (@Gritty20202) October 1, 2023
This tweet should be taught in textbooks on story writing https://t.co/3E5d0nHSog
β Ty Rushing (@Rushthewriter) October 2, 2023
Great docs and it covers the detections against human-operated ransomeware in Microsoft 355 Defender, #XDR.
β Kijo Ninja (@kj_ninja25) October 2, 2023
Also I like the part which provides- typical #techniques and tools used by ransomware attackershttps://t.co/Ame754sIpd
Lists of Russian secret facilities were put into public domain.
β Anton Gerashchenko (@Gerashchenko_en) October 2, 2023
Every regional administration website in Russia has a document with a complicated name "List of consumers of electric energy (capacity), whose restriction of electricity consumption may lead to economic,β¦ pic.twitter.com/j9s21TZZqK
The cumulative toll of data theft from Clop's MOVEit exploitation spree is devastating and keeps getting worse. with @mattburgess1 https://t.co/MLU1BftJz8
β Lily Hay Newman (@lilyhnewman) October 2, 2023
The ongoing revelations of penetrations at the highest levels of diplomatic negotiations with Iran casts new light on prior known cyber espionage. Advantages of combined access, leveraged for influence objectives, may well turn out to have been the fundamental reason the regime⦠https://t.co/BEE4nUfhhe
β JD Work (@HostileSpectrum) October 2, 2023
Type confusion, Windows kernel exploitation, ROP chains, KASLR bypass
β 0xor0ne (@0xor0ne) October 2, 2023
Great blog post by Alexa Souza (@w4fz5uck5)https://t.co/QROCKzhnqg#windows #kernel #exploit #infosec pic.twitter.com/uyfrmkpKRm
#Sub7 fun fact: mobman used to write feature ideas in notebooks pic.twitter.com/9R0T289Xft
β α πππππππ (@xillwillx) October 2, 2023
My last three years in the IC were on a biometrics team, including an 18-month stint doing biometrics intel in Afghanistan.
β Mike Shelby | Do Your Area Study (@grayzoneintel) October 2, 2023
Post your questions about finger prints, DNA, irises, etc. and I'll answer. It's some serious shit, especially on the targeting side. https://t.co/VJLsbm1Hkj
At the Center for Military Studiesβ conference on the PLA, prof You Ji says that βto the Chinese, the lessons of Ukraine are that Russia has been successful in preventing direct Western military involvement through the threat of nuclear useβ. pic.twitter.com/SpatP5oRlC
β Olivier Schmitt (@Olivier1Schmitt) October 2, 2023
#nftables Adventures: #Bug Hunting and N-day #Exploitation (CVE-2023-31248)https://t.co/1vvanbNbuh
β raptor@infosec.exchange (@0xdea) October 3, 2023
It's very depressing that the whole world has one kind of conspiracy theory now. Putin, Modi, Bolsonaro, they all believe the same shit the average Republican believes. Bespoke, local conspiracy theories are dying
β Djinn & Tonic πΊπ¦ (@HegelwCrmCheese) October 2, 2023
Nice reading introducing tools for embedded devices firmware analysis: QEMU, Renode, Qilinghttps://t.co/IG75O7U9u5#iot #embedded #reverseengineering #infosec pic.twitter.com/tMo5ZwUeHp
β 0xor0ne (@0xor0ne) October 2, 2023
"Nuns don't work on Sunday." | Magnum P.I. - YouTube
From Season 2, Episode 13 of Magnum P.I.
I'm currently revisiting some of my old literature and cases for a book chapter I'm working on, so I thought I'd share a particularly interesting case involving the Stasi, Swedish intelligence and a double agent with you all.
β Tony Ingesson (@tonyingesson) October 2, 2023
Thread time!
1/13
Thread by @tonyingesson on Thread Reader App β Thread Reader App
@tonyingesson: I'm currently revisiting some of my old literature and cases for a book chapter I'm working on, so I thought I'd share a particularly interesting case involving the Stasi, Swedish intelligence and a d...β¦
bad apple pic.twitter.com/3rGWTEuGXV
β ctsπΈ (@gf_256) October 1, 2023
We've just opensourced all of the challenges from the Cybears CTF! You can find all of the code and walkthroughs here https://t.co/taZybdpVe8
β Cybears (@cybearsCTF) October 2, 2023
Just dropped the second blog in our #RingHopper series! Join us on our mission to acquire write-primitives within the tightly secured SMRAMhttps://t.co/9xeoGbuph6 https://t.co/URpdaZYSI0 pic.twitter.com/Ie5UvT2FNX
β Benny Zeltser (@benny_zeltser) September 25, 2023
Just finished giving my talk on scudo allocator exploitation at #BsidesCbr ! Thanks to the organizers for making iy happen!
β zac (@ItsIronicIInsis) September 29, 2023
Slides should be viewable here :)https://t.co/NAoXCaI4BD
Wrote a blog post for my company on how we implement obfuscation for our C# post-exploitation arsenal. Discussing some detection opportunities and our ways around them. Special thx to @Flangvik for his video on SharpCollection, which is our pipelines basehttps://t.co/px6kyIS7jL
β eversinc33 (@eversinc33) October 2, 2023
Reverse engineering of runtime code integrity protection of Call of Duty: Black Ops 3
β 0xor0ne (@0xor0ne) October 3, 2023
Writeup by @momo5502https://t.co/SASbsSjxX5#reverseengineering #infosec pic.twitter.com/v3OhUeyW35
Why Google Search is crap - itβs deleting your query and replacing it with an ad trigger.
β Megan Gray (@megangrA) October 2, 2023
My op-edhttps://t.co/bNs0q7UP6J https://t.co/RC4CABQcVj