Posts
2467
Following
559
Followers
1265
A drunken debugger

Heretek of Silent Signal
"Honest Achmed’s Used Cars and Certificates welcomes Sectigo’s interpretation of uniqueness. As such, Achmed intends on rebranding as 'Sectigo'."

https://bugzilla.mozilla.org/show_bug.cgi?id=1917405#c15
2
4
5
repeated

Now this is interesting, Windows 11 24H2 allows you to connect to an SMB server with an arbitrary TCP port. Could come in handy ;-)
https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-alternative-ports-now-supported-in-windows-insider/ba-p/3974509

2
2
1
[RSS] Misunderstanding the "Prevent access to registry editing tools" policy

https://devblogs.microsoft.com/oldnewthing/20241001-22/?p=110330
0
0
0
[RSS] Java Ring: One Wearable to Rule All Authentications

https://hackaday.com/2024/10/01/java-ring-one-wearable-to-rule-all-authentications/
0
0
1
[RSS] NSO Group indicates rare agreement with Apple over dismissal of lawsuit

https://cyberscoop.com/nso-group-court-filing-apple-lawsuit/
0
0
0
@dcoderlt disobedient animals become glue y'know...
0
0
1
repeated
if ($animal1 == $animal2 ){
if ($animal1 !== $animal2){
echo "you are not equal enough, sry";
}
}

#orwell #php
1
1
4
repeated

bert hubert 🇺🇦🇪🇺

Edited 1 month ago

I love this part also. The regulation proposal is full of how it is all great for privacy, and then it hits you with this. Apparently this is scanning of all OUR photos, not of theirs: https://www.patrick-breyer.de/wp-content/uploads/2024/10/2024-10-01-conseil-hu-csam-proposition-approche-generale-24-septembre.pdf

2
7
0
repeated

The second article in our new series on research and is out!

Exploiting atdcm64a.sys arbitrary pointer dereference - Part 2:
https://security.humanativaspa.it/exploiting-amd-atdcm64a-sys-arbitrary-pointer-dereference-part-2/

This time, @ale98 covers how to craft PoCs for the arbitrary MSR read and arbitrary pointer dereference vulnerabilities described in his previous article, with step-by-step advice for debugging with .

Enjoy... and stay tuned for the third and last article next week.

0
2
0
repeated

My TamaGo talk at the recent @osfc_io is now online, if you are interested check it out!

https://www.osfc.io/2024/talks/tamago-bare-metal-go-for-arm-risc-v-socs/

0
2
0
repeated

dedicated to the brave reverse engineers

1
16
0
repeated

I'll end this on a more positive note by saying that https://github.com/google/binexport/pull/133 at least enables the same workflow for IDA 9.0 as the one we use for Binary Ninja and Ghidra (export first, then invoke manually). 6/N

2
1
0
repeated

If you're using @zimbra, mass-exploitation of CVE-2024-45519 has begun. Patch yesterday.

Malicious emails are coming from 79.124.49[.]86 and attempting to curl a file from that IP.

0
4
0
[RSS] Zimbra - Remote Command Execution (CVE-2024-45519)

https://blog.projectdiscovery.io/zimbra-remote-code-execution/
0
0
0
repeated

A friend of mine (@GabrielGonzalez) has written a book about "Attacking and Securing U-Boot".
https://www.amazon.com/Attacking-Securing-U-Boot-Gabriel-Gonzalez/dp/B0DJ7M2JNN

1
4
0
Show older