Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
[RSS] Ghost in the PPL Part 3: LSASS Memory Dump

https://itm4n.github.io/ghost-in-the-ppl-part-3/
0
0
0
repeated

Microsoft Security Response Center (MSRC) corrected CVE-2024-43461 (8.8 high) Windows MSHTML Platform Spoofing Vulnerability, marking it as both exploited and publicly disclosed based on evidence of exploitation from ZDI Hunting Team (see parent toot). This is the fifth zero day of September 2024 Patch Tuesday!
cc: @TheDustinChilds @campuscodi @briankrebs @todb @goatyell @ntkramer @hrbrmstr

1
3
0
repeated

Google Security Blog: A new path for Kyber on the web

  • Chrome 131 will switch from supporting Kyber post-quantum algorithm to Module Lattice Key Encapsulation Mechanism (ML-KEM).
  • Chrome will not support Kyber and ML-KEM at the same time.
  • Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC)
  • The PostQuantumKeyAgreementEnabled flag and enterprise policy will apply to both Kyber and ML-KEM
  • Chrome will no longer support hybrid Kyber (codepoint 0x6399)

0
1
0
@fesshole and if your team is incompetent and takes 2x time to produce 2x buggy code, you get 4x the money because in agile invoicing by time is the norm. Brilliant idea for a business actually!
0
0
1
repeated
Edited 9 months ago

My response when people ask me about the state of computer security:
(Modified from https://xkcd.com/2030/)

1
3
0
iFixit (and AliExpress) rocks!

#RightToRepair
0
0
2
repeated
repeated

🔥 The initial schedule for is now public! The CFP is still open, but we may only accept now if you are fine submitting them for the “Online Sunday” in video format. https://radare.org/con/2024/

🎟️ Conference tickets and other details will be made available soon. Stay tuned, we will meet us all again in less than two months!

0
7
0
repeated
CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability

https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29847-deep-dive-ivanti-endpoint-manager-agentportal-deserialization-of-untrusted-data-remote-code-execution-vulnerability/
0
1
0
(You see, I'm very insightful today)
0
1
1
If it's stupid, but it works, it's not stupid.
It's technical debt.
1
4
8
Twitter account of note:

https://x.com/Fortibitch
0
0
1
repeated
Edited 9 months ago

SolarWinds: SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-28991)
CVE-2024-28991 (9.0 critical, disclosed 12 September 2024) SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution.
Reported by Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative. No mention of exploitation.

EDIT: Piotr states that CVE-2024-28991 can be chained with CVE-2024-28990 (6.3 medium) SolarWinds Access Rights Manager (ARM) Hardcoded Credentials Authentication Bypass Vulnerability for pre-authenticated remote code execution.

2
2
0
repeated

I talk to the press largely to *combat* AI hype. It's beyond frustrating to be misquoted in ways that contribute to it instead.

New newsletter post:

https://buttondown.com/maiht3k/archive/correcting-the-record/

1
4
0
Show older