Just released #ghidriff v0.8.0 - Ghidra 11.3 Support + PyGhidra ๐ฅ๐
This release uses the latest PyGhidra now officially supported by Ghidra ๐ค๐ช
https://github.com/clearbluejar/ghidriff/releases/tag/v0.8.0
๐ included!
Recon 2025 Have been Annonced! 20th year Anniversary https://recon.cx June 23-29.
Picard management tip: It's okay not to know things. Practice saying "I don't know." Go ahead. Say it.
Kennt ihr #wuppiefuzz ?
Ist ein coverage-guided REST-Fuzzer und Open-Source.
Bin heute darรผber gestolpert und dacht das ist teilenswert.
Our blog site is having a moment, and @TheDustinChilds is stuck on a plane in DFW, but nothing stops Patch Tuesday. There's 2 Microsoft bugs being exploited in the wild and some things we've never seen before. Read all the details at https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review
CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog
The Zyxel stuff is not new, but since the Microsoft zero-days are part of #PatchTuesday, I'm including them in this conversation.
#cisa #kev #cisakev #KnownExploitedVulnerabilitiesCatalog #vulnerability #zeroday #eitw #activeexploitation #infosec #cybersecurity #cve
Happy #PatchTuesday from Ivanti: February Security Update
We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program.
ivanti #ivantiCSA #neurons #connectsecure #cve #vulnerability #infosec #cybersecurity
Happy #PatchTuesday from Microsoft: 4 ZERO-DAYS (2 EXPLOITED) out of 56 new CVEs
#microsoft #zeroday #cve #eitw #activeexploitation #vulnerability #infosec #cybersecurity
A demonstration of writing a simple Windows driver in Rust
https://scorpiosoftware.net/2025/02/08/writing-a-simple-driver-in-rust/
Discussions: https://discu.eu/q/https://scorpiosoftware.net/2025/02/08/writing-a-simple-driver-in-rust/
Good tools are made of bugs: How to monitor your Steam Deck with one byte.
Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming.
A Christmas gift in February, brought to you by the incredible @pwissenlit ๐ซถ
https://blog.quarkslab.com/being-overlord-on-the-steam-deck-with-1-byte.html
Happy #PatchTuesday from SolarWinds:
No mention of exploitation.
ElecticIQ: Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
EclecticIQ analysts assess with high confidence that Sandworm (APT44), a threat actor supporting Russia's Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia's invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER, a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT), enabling attackers to exfiltrate sensitive data and conduct cyber espionage.
Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145, based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm's involvement. Yara and Sigma rules, and Indicators of Compromise are listed.
#russia #sandworm #apt44 #gru #threatintel #IOC #yara #sigma #malwareanalysis #infosec #cybersecurity #cti #cyberthreatintelligence
Project: mpengine-x64-pdb 1.1.24090.11
File: mpengine.dll
Address: 75a785720
getBasicDataType
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a785720.json&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a785720.json&colors=light