Einstein's revolutionary paper describing the equivalence of matter and energy, "Does the Inertia of a Body Depend upon its Energy-Content?", arrived at the editorial offices of the journal "Annalen der Physik" #onthisday in 1905 [1,2].
Interestingly, in Einstein’s first derivation of his famous result he did not express it with the equation E = mc². Instead, Einstein concluded that if an object, which is at rest relative to an inertial frame, either absorbs or emits an amount of energy L, its inertial mass will correspondingly either increase or decrease by the amount L/c² [3].
Why was Einstein's result so mind-blowing? Well, AFAICU in Newtonian physics inertial mass is construed as an intrinsic property of an object; it measures the extent to which an object resists changes to its state of motion. OTOH, Einstein showed that the inertial mass of an object changes if the object absorbs or emits energy. This was indeed a revolutionary idea.
References
--------------
[1] "Ist die Trägheit eines Körpers von seinem Energieinhalt abhängig?", http://info.phys.unm.edu/~alandahl/phys262f06/Einstein_Emc2paper1905.pdf
[2] "Does the Inertia of a Body Depend upon its Energy-Content?", https://www.fourmilab.ch/etexts/einstein/E_mc2/www/
[3] "The Equivalence of Mass and Energy", https://plato.stanford.edu/entries/equivME/
Wow, Specter bypassed XOM and broke the PS5 hypervisor. Awesome work.
"Byepervisor: How We Broke the PS5 Hypervisor".
#ps5 #xom #hypervisor #byepervisor
https://hardwear.io/netherlands-2024/speakers/specter.php
@thedarktangent SunOS was pseudo closed source, in that of an established customer could purchase a copy. Acquiring a copy was nice, one could trade for let's say a zero day or something. CALEA was one of the "benefits" of this type of trading.
I remember hackers breaking in to CALEA lawful intercept boxes to spy on each other over 20+ years ago..
IIRC They were default SunOS servers connected direct to internet, no patches or updates applied over the years. Once you mapped them you could wait for a known vulnerability and visit them again.
It’s always been terrible, and always been known. I want it to be taken seriously.
Edit: It may be closer to 30 years than 20, but “a long time ago”
Republicans,
Democrats,
Third party voters
People driven by totally incompatible political and religious ideologies,
Pineapple on pizza people,
People who hate pineapple on pizza and are incorrect,
🤜🏻🤛🏾 hating whomever hacked the Internet Archive
If people loosing access to their books when the vendor goes out of business was already bad, now the same thing is happening to cars: https://arstechnica.com/cars/2024/10/connected-car-failure-puts-kibosh-on-sale-of-3300-fisker-oceans/
I know, it is happening all over the place, merely with pieces of technology not quite as expensive. Maybe, just maybe, having basic functionality depend on external components isn’t such a great idea?
And since I don’t see “the market” ever discovering this, maybe some regulation is in order? Just so the next tech startup going out of business (or merely unwilling to support “outdated” hardware) isn’t an occasion to throw away tons of products in perfect working order.
Mozilla Firefox exploited zero-day: Security Advisory 2024-51 Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
CVE-2024-9680 (critical severity) Use-after-free in Animation timeline
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.
See related @BleepingComputer reporting: Mozilla fixes Firefox zero-day actively exploited in attacks
#zeroday #vulnerability #firefox #mozilla #cve #CVE_2024_9680
Hang on to your seats, because this one's a wild ride. Literally.
Lamborghini Carjackers Lured by $243M Cyberheist
The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later — while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.
https://krebsonsecurity.com/2024/10/lamborghini-carjackers-lured-by-243m-cyberheist/
More than 2 months after Elastic Security Labs has described LNK Stomping (and many years after the exploits have been seen in the wild), the LNK that pops calc.exe still has zero detections on VirusTotal.
https://www.virustotal.com/gui/file/a688c1f260fefd4cb071d268dde451fd36a7b43a92d8ee1bc5c415174f61c2d5
Maybe because it's "just" calc.exe, AV is ignoring it? How about a CVE-2024-38217 exploit LNK with a payload that runs code from a remote server?
That gets 2 whole hits out of 64 on VT.
https://www.virustotal.com/gui/file/0f3fe93c037a07d9301abfa581ad42da8c96dfd6e189c02af75533a3e320c468?nocache=1
Either way you look at it, none of the engines on VT are detecting this technique of exploiting CVE-2024-38217. While plenty of AV-related security products claim to detect exploits for vulnerabilities, it'd be good to have a healthy amount of skepticism for what the products actually do.
Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:
Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.
#paloaltonetworks #expedition #vulnerability #CVE #vulnerabilityanalysis