Holy fuck folks. Like Kapersky and their ties to the Russian government suck, yes. Them being banned from doing business in the US probably needed to be done. But folks, them installing UltraAV and uninstalling Kapersky was announced weeks ago. Paying customers got emailed about it weeks ago. Just because people don't pay attention doesn't mean it's time to engage in low effort journalism (like so many outlets are doing.)
My citation for reference. https://www.zdnet.com/article/one-million-us-kaspersky-customers-to-be-migrated-to-this-lesser-known-alternative/
#antivirus #kapersky #security #infosec #cybersecurity #malware
AWS Nitro Enclaves offer strong isolation for sensitive workloads but require careful security implementation. We cover key areas to help developers avoid common pitfalls and harden their enclave deployments. https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/
Today on no one should ever use yaml for anything:
Today is your last chance to register to my Windows Kernel Exploitation training delivered at #hexacon in Paris/France https://www.hexacon.fr/trainer/halbronn/
one of the biggest problems, if not THE biggest problems in the 'security industry' is that nobody seems to mind "a person with zero technical background, with no experience with technical anything" to self-label themselves as an expert and just start chucking advice around.
nobody should "want to switch careers to security".
security shouldnt be "its own career".
it should be "becoming so good at the thing you are already good at, that you can perform security on that thing - like develoment, or SRE, or networking, or intelligence work". Eventually you get so good, you 'become security'.
which is why security has never, and will never be a 'starter career'. folks should get promoted into a security role from another role, like sysadmin/dev/network/etc.
Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy!
Finally, the second part of the blog post where we go from Windows Paged Pool Overflow to SYSTEM shell starting from Low Integrity https://3sjay.github.io/2024/09/20/Windows-Kernel-Pool-Exploitation-CVE-2021-31956-Part2.html have a great weekend everyone ;)
Starting Thursday, Kaspersky deleted its anti-malware software from computers across the United States and replaced it with UltraAV's antivirus solution without warning.
Safe C++: https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2024/p3390r0.html
By the author of Circle, a C++ standards proposal that essentially plops a copy of Rust onto C++. Starting with lifetimes and borrow checking and unsafe blocks, but then: A new kind of reference type. A new kind of move constructor. A whole new standard library, which borrows some of Rust's naming conventions (‘send', 'sync') and even renames ‘shared_ptr’ to ‘arc’. Enums (‘choice types’) and pattern matching. Slice types.
I like it.
One of the funny bits that didn't make it into our sshamble talks in Las Vegas: OpenSSH for Windows writes to the event log, but no longer filters dodgy characters, so you can troll your local admins:
(recent webcast version at https://www.youtube.com/watch?v=G5yRpdNbdBs)
You have MacOS? You hate that you can't copy/paste in Citrix? You love hacky scripts that might break any time? I made something for you:
[floyd.ch blog post]
Citrix copy/paste circumvention on MacOS, CitrixCopyPasta
https://www.floyd.ch/?p=1401