September 17, 2024
September 17, 2024
We’re launching the public beta phase of our CellGuard iOS app. It supports all iPhones running iOS 14 or newer. You can contribute to an optional study that helps us to improve detection algorithms. Read more & download CellGuard at https://t.co/uGic16gNOj
— Lukas Arnold (@lukasarnld) September 16, 2024
Our paper about the initial research conducted with CellGuard, iOS tooling for Qualcomm basebands, and Apple Location Services has been accpeted for @RAID_Conference. Read a preprint at https://t.co/5JY3KPQBoqhttps://t.co/HjDnM1qYD9
— Lukas Arnold (@lukasarnld) September 16, 2024
Attacking PowerShell CLIXML Deserialization : https://t.co/PbnSZmIRm0
— Binni Shah (@binitamshah) September 16, 2024
Related :
How to Break Out of Hyper-V and Compromise your Admins : https://t.co/yaQ2rvlK5v pic.twitter.com/bTpVhi7MSu
Several weeks ago German media (WDR, NDR, SZ) received a leak of internal files from the biggest Russian disinformation contractor, Social Design Agency, often referred to as Doppelganger. "Western security officials" confirmed authenticity. First story by @FlorianFlade et al https://t.co/NTSa0vy2RB
— Thomas Rid (@RidT) September 16, 2024
🔥💀 Here is the "Real" writeup and exploit for the
— SinSinology (@SinSinology) September 16, 2024
pre-auth deserialization RCE I reported to Ivanti
CVE-2024-29847
Apparently, folks at horizon3 tried to write about my bug before me but they did it wronghttps://t.co/Df8lIDYNRH
Direct System Calls For Hackers (EDR Evasion) : https://t.co/rY41o0Wdzv
— Binni Shah (@binitamshah) September 16, 2024
These things keep reappearing. Twenty years ago I wrote a paper with Eugene and Jamie that covered many of these techniques.
http://www.phrack.org/archives/issues/62/5.txtHow EDR really works: https://t.co/kF6dNLal54
— ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) September 17, 2024
azet: ".@HalvarFlake@mastodon.social's fuzzing talk is v…" - chaos.social
Attached: 1 image
.@HalvarFlake@mastodon.social's fuzzing talk is very interesting on history, adoption and evolution. as well as how fuzzing was seen by the scene as at the time & how that changed dramatically with improvements in technique, reliability & software.
slides: https://docs.google.com/presentation/d/1vw9lywrMnNojiOIu-xU5KXZz7WzE0MYNQF6V7n6vyY8/mobilepresent?slide=id.g2768ca7ef44_0_65
Technological developments and the use of such cyber operations, AI, autonomous weapons systems and propaganda operation are going out of control. I analyse the recent @ICRC Challenges report (notably: cyberattacks can kill). We must find a steering wheel. https://t.co/D2PvqcrYxf pic.twitter.com/lEiJnfJIAr
— Lukasz Olejnik (@lukOlejnik) September 17, 2024