October 7, 2024
October 7, 2024
Collection of write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitationhttps://t.co/g2cERXRyeY#infosec #cybersecurity pic.twitter.com/uXxYHydlZu
— 0xor0ne (@0xor0ne) October 6, 2024
AI + Cyber and the Security Dilemma
— chrisrohlf (@chrisrohlf) October 6, 2024
I wrote down some thoughts on AI + Cyber and the impact it may have on the security dilemma between states in the coming years.https://t.co/jOEjKeuubQ https://t.co/l3hu2WvJfU
Here are the slides for my lightning talk at @hexacon_frhttps://t.co/bImbdk1GEG
— Nils Ole Timm (@Firzen14) October 6, 2024
Was tons of fun. Not sure if it was recorded.
If you are interested in exploiting. Net check outhttps://t.co/68bzICh9Ck and https://t.co/AA6i5bHM9w
During a #redteam at @mod0 we discovered a limited but neat bypass for #printnightmare. I talked to @itm4n about it and he had an indepth look. Read about it here:https://t.co/2NGYFPbhSh#itsec
— parzel (@parzel2) October 5, 2024
Pro tip for hackers who accidentally get IP banned by Akamai or Cloudflare on their home IP:
— Jason Haddix (@Jhaddix) October 6, 2024
Many ISPs will requisition a new public IP if they detect new network hardware installed in a house. If you get banned, unplug your cable or DSL modem.
Then go into your router…
New video! This time we present a Chinese cyber espionage operation from Dec. 2015 targeting an official from Uzbekistan. https://t.co/P1FzvGEajU
— Spy Collection (@SpyCollection1) October 7, 2024
Behold! My magnum opus! The inaugural blog post!
— Tim Schumacher (@t1mschumi) October 5, 2024
And... it's the fourth one to be posted?
Turns out, developing a bootloader on retail embedded hardware is more difficult than first imagined.https://t.co/oAczq8UYTz
https://www.synnergy.net
Any Axis IP Cameras visible in your Pentests? If you get valid administrative credentials, you can persist or get initial access via RCE. My latest blog describes an alternative to the already known technique published by Tenable in 2018. Fun project!🙂https://t.co/ali2WIDFeo pic.twitter.com/52OdlT3CvM
— S3cur3Th1sSh1t (@ShitSecure) October 7, 2024
Major Russian state media are down following to a cyberattack. "Online broadcasting and internal services are not working, there is no Internet or telephony". Reports of data destruction (including backups) and expectation of long down-time. Rossia 1 and Rossia 24 (TV), in…
— Lukasz Olejnik (@lukOlejnik) October 7, 2024