I need to do a blog post on this, but it seems like a lot of old tricks have been lost over the years. One thing I was thinking about is all the ways to obscure an executable name in command prompts. For example, and I'm not sure how many of them are documented, but all of these work:
BlackHoodie will be back at @_ringzer0 Bootcamp on March 21st with a training about Compiler Internals for Security Engineers, brought to you by.. me 😊 Registration is open, please tell your friends and hacker family, alternatively Shares appreciated 😁 https://blackhoodie.re/Ringzer0_Bootstrap_2025/
My team designed and is maintaining Enclaves. Good article here :-)
Two seemingly blockbuster stories published on Friday that reported that the Trump admin had ordered US Cyber Command and CISA to "stand down" on their work to detect and counter Russian cyber threats. But new info has come out to contradict the stories or qualify them. I dug into what we know and don't know. As always, if anyone has any additional information related to these stories, please contact me on Signal at KimZ.42.
New blog post: Electronic signing in Collabora Online https://vmiklos.hu/blog/cool-esign.html
CP/M Users: Looking for a copy of Avocet XASM85 for a resurrection project. #retrocomputing
🎉 KeePassXC 2.7.10 is out! 🥳
The most prominent changes in this release are the addition of a Proton Pass importer and (due to popular request) a new setting for changing the application font size. You can find the full list of changes on our website:
https://keepassxc.org/blog/2025-03-04-2.7.10-released/
𝗝𝗼𝗶𝗻 𝗼𝘂𝗿 𝗹𝗶𝘃𝗲 𝘄𝗲𝗯𝗶𝗻𝗮𝗿 𝗼𝗻 𝗠𝗮𝗿𝗰𝗵 𝟲𝘁𝗵!
Discover how to eliminate debugging inefficiencies and accelerate vulnerability research with time travel analysis.
Register now 👇
https://www.linkedin.com/events/exploitingaroutervulnerabilityw7299810055170805761/
#cybersecurity #webinar #vulnerability #malware #reverseengineering
I wonder what the person who took that famous photo of the Doge Shiba Inu makes of all this now?