September 20, 2024
September 20, 2024
Most of cryptography research is developing a really nice mental model for what’s possible and impossible in the field, so you can avoid wasting time on dead ends. But every now and then someone kicks down a door and blows up that intuition, which is the best kind of result.
— Matthew Green (@matthew_d_green) September 19, 2024
New from 404 Media: a police report we obtained shows a Starship food delivery robot abruptly changed direction, ran into a person, and knocked her down/injured her. Robot then headed in her direction again. Company offered victim promo codes as apology https://t.co/nMXr1WMJ2r
— Joseph Cox (@josephfcox) September 19, 2024
Researchers have a new/interesting way to unmask criminals: data harvested from infostealer infections. Infostealers often distributed in pirated software. Criminals download it, all emails/passwords published on Telegram. Researchers use to unmask https://t.co/W7o0eK044H pic.twitter.com/M0S7LK5SbQ
— Joseph Cox (@josephfcox) September 19, 2024
1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my efforts which have helped lead to multiple arrests and millions frozen. pic.twitter.com/dcY1e9xsPd
— ZachXBT (@zachxbt) September 19, 2024
Thread by @zachxbt on Thread Reader App – Thread Reader App
@zachxbt: 1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my effort...…
The insane irony of this is that each one of these failed multiplications requires performing trillions of successful multiplications https://t.co/XuykIg2PkU
— Colin Fraser (@colin_fraser) September 19, 2024
In my latest blog post, Reversing VMCrack, I document the process of reverse engineering and devirtualising a binary protected with virtualisation obfuscation and various anti-debugging techniques.https://t.co/1ky5KtNJ4t
— ben (@bensbck) September 18, 2024
A couple of interesting blog posts on hiding Linux processeshttps://t.co/w3KHP7K9zQhttps://t.co/gxrLCUEMHl
— 0xor0ne (@0xor0ne) September 19, 2024
Credits Stephan Berger and Hal Pomeranz#Linux #Cybersecurity pic.twitter.com/zIkpqtiSV3
A multi hop network tunneling tool.
Stowaway/README_EN.md at master · ph4ntonn/Stowaway · GitHub
👻Stowaway -- Multi-hop Proxy Tool for pentesters. Contribute to ph4ntonn/Stowaway development by creating an account on GitHub.
Creative way to sneak a phishing attempt into my inbox pic.twitter.com/ZPqw733229
— Florian Roth (@cyb3rops) September 19, 2024
I mean this is just incredible OSINT pic.twitter.com/WOcjUHQH1S
— AJ (formerly Wade) 🥥🌴🤠 (@watn_tarnation) September 19, 2024
My thoughts on how States may want to address risks to civilians posed by the “cyber attack” and “data as an object” debates; discussed them at the @ismllwbe @ISMLLW annual conference in Bruges yesterday. https://t.co/Io8PhXPvvi
— Mike Schmitt (@Schmitt_ILaw) September 19, 2024
https://lieber.westpoint.edu/policy-approach-addressing-cyber-attacks-data-object-debates/
A good read, although the current norm from Russia is wipers on everything they can touch? https://t.co/JiraNEiDW8
— Dave Aitel (@daveaitel) September 19, 2024
I'm never deleting this app... pic.twitter.com/JhlppB7bGi
— Nate Codes (@Nateemerson) September 18, 2024
This kid stole millions of dollars; used it to buy a Lamborghini and Chanel purses for his crush. She literally replies “I have a boyfriend” lmao https://t.co/y6Fd2eCl9Y pic.twitter.com/51iyrVy8mm
— comet (@cometcalls) September 19, 2024