Posts
3144
Following
707
Followers
1555
"I'm interested in all kinds of astronomy."
repeated

dedicated to the brave reverse engineers

1
15
0
repeated

I'll end this on a more positive note by saying that https://github.com/google/binexport/pull/133 at least enables the same workflow for IDA 9.0 as the one we use for Binary Ninja and Ghidra (export first, then invoke manually). 6/N

2
1
0
repeated

If you're using @zimbra, mass-exploitation of CVE-2024-45519 has begun. Patch yesterday.

Malicious emails are coming from 79.124.49[.]86 and attempting to curl a file from that IP.

0
4
0
[RSS] Zimbra - Remote Command Execution (CVE-2024-45519)

https://blog.projectdiscovery.io/zimbra-remote-code-execution/
0
0
0
repeated

A friend of mine (@GabrielGonzalez) has written a book about "Attacking and Securing U-Boot".
https://www.amazon.com/Attacking-Securing-U-Boot-Gabriel-Gonzalez/dp/B0DJ7M2JNN

1
4
0
repeated

An awesome video of live coding 6502 asm directly in Basic to produce music, with all the explanations on the way.
https://www.youtube.com/watch?v=ly5BhGOt2vE

0
1
0
repeated

John Carmack on the value of simplicity over safetyness in C

1
1
0
repeated
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Edited 1 year ago

Pro-tip if you are searching for anything HTML, CSS or JavaScript related: add "mdn" to your query. This Mozilla project really is a work of love, maintained by hundreds of volunteers @openwebdocs and @MDN staff and contractors. https://developer.mozilla.org/en-US/docs/Learn

3
7
0
[RSS] Music production on Power: an adventure in porting

https://www.talospace.com/2024/09/music-production-on-power-adventure-in.html

:O
0
0
0
[RSS] Finding classes for exploiting Unsafe Reflection vulnerabilities in Java with Joern

https://blog.convisoappsec.com/en/finding-classes-to-exploit-insecure-unchecked-vulnerabilities-in-java-with-joern/
0
0
0
[RSS] Instrumenting an Apple Vision Pro Library with QBDI

https://www.romainthomas.fr/post/24-09-apple-lockdown-dbi-lifting/
0
0
0
repeated

I am wondering how many people and organisations genuinely have “opponent that can break into a cloud provider, steal hard disks, then extract coherent data from them outside of the cloud storage systems” in their threat model. Because I’m guessing in most cases such an adversary has easier and more effective ways to get at any at-rest data. Encrypting the drives a, for instance, RDS database is running on is not bad, but in most cases prioritising this over other security work seems like it’s driven by audit checkboxes rather than a full analysis. Do it, but fix the big ticket stuff first.

This may be an excessively cynical view.

2
5
1
repeated

Wouldn’t it be easier to make it illegal to trick, mislead, or defraud people?
https://alecmuffett.com/article/110438

0
1
0
repeated

Everyone was up in arms about the CUPS thing but this is much more serious: CVE-2024-45200 https://github.com/latte-soft/kartlanpwn

0
4
0
@malwaretech I just vented in the office about a stupid piece of client-side JS with zero dependencies, distributed as an npm module, so you either cut the damn boilerplate manually or download and execute several physical libraries worth of code to run 50 lines of the implementation you actually want.
0
0
3
repeated
Edited 1 year ago

CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog
Hot off the press! Page is now live and published on their website.

  • CVE-2019-0344 (9.8 critical) SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability
  • CVE-2021-4043 (5.5 medium) Motion Spell GPAC Null Pointer Dereference Vulnerability
  • CVE-2020-15415 (9.8 critical) DrayTek Multiple Vigor Routers OS Command Injection Vulnerability
  • CVE-2023-25280 (9.8 critical) D-Link DIR-820 Router OS Command Injection Vulnerability

1
1
0
Show older