Posts
3215
Following
706
Followers
1564
"I'm interested in all kinds of astronomy."
repeated
re: #music #grindcore
Show content
@swapgs I saw them first touring with Napalm Death, mind blowing performance too! https://www.youtube.com/watch?v=jXaUUvOEQ7E
0
0
1
#music #grindcore
Show content
2
1
2
@thezdi Napalm Death is prime xdev music \m/
1
0
2
repeated

TrendAI Zero Day Initiative

Confirmed! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck used two bugs (incl a CLRF injenction) in a beautiful chain to exploit the QNAP TS-464 NAS. The second round win earns them $20,000 and 4 Master of Pwn points.

1
2
0
repeated

TrendAI Zero Day Initiative

In out fist video highlight of Day Two, we see Ken Gannon (@Yogehi) bring 5 bugs and a tone of emotion to bear against the Galaxy. @P2OIreland https://youtube.com/shorts/eM9dOhHH2AA?feature=share

0
1
0
repeated

TrendAI Zero Day Initiative

Boom! It took no time at all for the Viettel Cyber Security (@vcslab) team to exploit the HP Color LaserJet Pro MFP 3301fdw printer. They head of to the disclosure room to provide all the details.

0
1
0
repeated
repeated

TrendAI Zero Day Initiative

Nice! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck successfully exploited the QNAP TS-464 NAS. They're off to the disclosure room to explain how they did it.

0
2
0
repeated

TrendAI Zero Day Initiative

Sweet! The InfoSect (@infosectcbr) team successfully exploited the Sonos Era 300 speaker. They head of to the disclosure room to divulge how they did it.

0
2
0
On a related #UX note, which genius decided that in #Akkoma ":D" should automatically translate to 🧬?
0
0
1
If the primary use-case of your app is users typing text, you shouldn't have hotkeys without at least the Ctrl modifier!

Looking at you, #thunderbird #signal !

#ux
0
1
2
repeated

Project Zero Bot

New Project Zero issue:

FASTRPC_ATTR_KEEP_MAP logic bug allows fastrpc_internal_munmap_fd to racily free in-use mappings leading to UAF

https://project-zero.issues.chromium.org/issues/42451725

CVE-2024-49848
1
1
2
repeated

TrendAI Zero Day Initiative

We have another bug collision. The Tenable Group used a stack-based buffer overflow to exploit the Lorex 2K camera, but the bug had already been used in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
1
0
repeated

ajft [SEC=&8212;haha]

Aargh

Throw the programmers in the sea

27
7
2
repeated

TrendAI Zero Day Initiative

Authenticated! dungdm (@_piers2) with Viettel Cyber Security (@vcslab) used a single Use-After-Free (UAF) bug to exploit the Era 300. The second-round win earns him $30,000 and 6 Master of Pwn points.

0
1
0
repeated

TrendAI Zero Day Initiative

The Synacktiv Team (@Synacktiv) used a combination of 3 different bug to exploit the Ubiquiti AI Bullet. All bugs were unique, so there second round win nets them $15,000 and 3 Master of Pwn points.

0
1
0
repeated

TrendAI Zero Day Initiative

Wow! Ryan Emmons (@the_emmons) and Stephen Fewer (@stephenfewer) of Rapid7 had to rewrite their exploit on the clock, but their second attempt against the Synology DiskStation DS1823xs+ succeeded! They head off to the disclosure room to provide the details.

0
2
0
repeated

TrendAI Zero Day Initiative

Confirmed! @dungnm, @dungdm, & @tunglth of @vcslab used a heap-based buffer overflow to exploit the Synology TC500. IN doing so, they earn $30,000 and 3 Master of Pwn points.

0
1
0
repeated

TrendAI Zero Day Initiative

Whew! On their second attempt, the team from STEALIEN Inc. was able to exploit the Ubiquiti AI Bullet camera. They're off to the disclosure room to explain how they did it.

0
1
0
Show older