September 11, 2024
September 11, 2024
Photos released in Aug. 2024 reportedly showing US Special Forces training on CNE/CNA operations to disrupt and/or gain access to their target's devices (WiFi, IoT/cameras, smartlocks, etc.) for covert infiltration.
— Spy Collection (@SpyCollection1) September 11, 2024
Source: https://t.co/nA6vX1WheC pic.twitter.com/fqHzuPO0j7
Green Berets Hijacked WiFi To Control Home Security System Then Vanish In Mock Raid
Green Berets also used electronic warfare gear to eliminate evidence of their activities during the realistic infiltration and raiding exercise.
Nice tutorial on Linux kernel exploitation. For the record, ignore anyone saying you don't need to learn C for cybersecurity. Not knowing C will seriously hamstring you in many ways in Linux and general cybersecurity. You don't need to be a C wizard, but basic understanding is a… https://t.co/FJcbOUxT09
— Craig Rowland - Agentless Linux Security (@CraigHRowland) September 10, 2024
Beginners intro to Linux kernel exploitation (env setup and ret2usr)
— 0xor0ne (@0xor0ne) September 10, 2024
Part 1: https://t.co/0gZAvBeESl
Part 2: https://t.co/n9xCkOwOR3#Linux #cybersecurity pic.twitter.com/dz4e8Te5Pr
My first thought was "Wow malware is scraping images". Then I opened iPhoto and typed a few words that appeared in photos. Like "Stream Deck" pulled up a picture of my desk.
— ippsec (@ippsec) September 10, 2024
My guess is malware is just reading from the OS's photo index database and not doing any scraping at all.… https://t.co/KCRAMqZJp4
.@bunsofwrath12 shared some incredibly useful PowerShell scripts with us for working with @thor_scanner in a forensic lab settinghttps://t.co/Jj8nU7rmmS pic.twitter.com/dyDDzcwSs3
— Florian Roth (@cyb3rops) September 10, 2024
A new Pwndbg release is here with features showing regs/mem values in disasm context via emulation, Binary Ninja integration, dumping Go info, glibc UAF heap tracker and more!
— Disconnect3d (@disconnect3d_pl) September 10, 2024
Changelog on https://t.co/WhcMZugrso
Also ships with portable archives for ARM64, RISC-V and ARMv7
IPA : GUI analyzer for deep-diving into PDF files (Detect malicious payloads, understand object relationships, and extract key information for threat analysis) : https://t.co/nG4qzPA0Ls pic.twitter.com/zOyeJB1YC6
— Binni Shah (@binitamshah) September 10, 2024
My daughter told me there is a small get together at school on Friday.
— єℓαιηє (@elainesim28) September 10, 2024
I asked her, "How small?"
She replied,
"Just you, me, and the principal.
Microsoft Says Windows Update Zero-Day Being Exploited to Undo Security Fixes - CVE-2024-43491 - https://t.co/CYrcg0G0fy
— SecurityWeek (@SecurityWeek) September 10, 2024
Just Released: The Technique Inference Engine (TIE) uses machine learning to predict likely adversary activities based on observed techniques. Learn more: https://t.co/BrRPZm3glU #threatinformeddefense #cybersecurity #machinelearning
— MITRE Engenuity (@MITREengenuity) September 10, 2024
New blog post on our server side RCE project! 👀 https://t.co/PWLzN9olj0
— 那个饺子🦆(JJ) (@thatjiaozi) September 10, 2024