If you are enabling an AI feature scanning all your emails, consider this will also scan the emails people have sent you. This information could include personal or otherwise legally protected information.
If this data leaks later (as it regularly happens with these systems), this could mean severe legal consequences for you down the road.
YOU are responsible for protecting the data of others under your custody.
This includes the messages and emails others send to you.
It has been a while but the latest edition of the Security Liberation Front is out!
NEW: Security researchers and CISA warn that hackers are exploiting a flaw in the Signal clone TeleMessage, which could lead to them stealing "plaintext usernames, passwords, and other sensitive data."
@h0wdy, the researcher who analyzed it said they were "in disbelief at the simplicity of this exploit."
(...) Thinking this way will teach you two things about computers: One, there's no magic, no matter how much it looks like there is. There's just work to make things look like magic. And two, it's crazy in there.
— Paul Ford
The Retro Museum in the city of Eger, Hungary 🇭🇺 is jam-packed with 20th century Hungarian and East-Bloc nostalgia, from prewar times to the late 90s.
It's small, but they have thousands and thousands of items on show, all setup with lots of love and care. Can highly recommend, it's great fun if you're into this kind of thing.
Of course it helps if you're Hungarian and recognize your childhood toys, and lots of other everyday items lost in time.
disconnect3d from Trail of Bits presents Pwndbg at #EuroPython.
Pwndbg is a Python tool that makes low-level debugging actually enjoyable for security work.
Pwndbg provides:
→ Clear context displays for assembly analysis
→ Built-in heap and stack visualization
→ Streamlined commands for exploit development
→ Python extensibility for custom analysis
Today at 10:30 at Terrace 2A. Perfect for anyone doing systems security, malware analysis, or CTF challenges.
https://ep2025.europython.eu/session/pwndbg-low-level-debugging-and-exploit-development-with-python
Exciting! @vector35 's excellent #BinaryNinja ships with built-in BinExport in the latest dev version!
Here's how to use it with #BinDiff: https://dev-docs.binary.ninja/guide/binexport.html
@REverseConf The slides for "Reconstructing Rust Types: A Practical Guide for Reverse Engineers" are also available! There is a convenient single-page HTML version if you want to use the material in the presentation as a reference, for your own reversing!
https://cxiao.net/posts/2025-02-28-reconstructing-rust-types-re-verse-2025/
https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025/
#rust #rustlang #ReverseEngineering #reversing #malware #MalwareAnalysis #infosec
@REverseConf If you ever need to find both the talk video and the slides again, they are collected in one place on my site and on GitHub, for your convenient bookmarking:
https://cxiao.net/posts/2025-02-28-reconstructing-rust-types-re-verse-2025/
https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025/
#rust #rustlang #ReverseEngineering #reversing #malware #MalwareAnalysis #infosec
Microsoft marketing: “Your data stays in Europe.”
Microsoft’s Legal Director (under oath, in French Parliament): “No, I cannot guarantee that.”
Still think Microsoft Teams is a sovereign solution?
Credit @ponceto91 for the meme
I have a friend that’s working on learning Rust, and looking for something more hands on / interactive. What’s the leading option these days?
Fuzzing Linux Kernel Modules, with Slava Moskvin
Stream by @slava_moskvin hosted by @steph3nsims about building a custom fuzzer to rediscover CVE-2025-0927 in the HFS+ filesystem implementation.
Slava started with a simple fuzzer implementation and then improved it step-by-step by adding coverage collection, proper seed generation, mutations, etc.
The source code of the fuzzer is public.
Stream: https://www.youtube.com/live/uCcsZrXyLyE
Fuzzer: https://github.com/sl4v/hfsplus-kernel-fuzzing-demo
Trail of Bits LibAFL Notes https://appsec.guide/docs/fuzzing/c-cpp/libafl/
Shop keeper Phyllis used her computer system to automate book keeping, taking the time to prepare from five hours to five minutes.
Having learned the system down to hardware level, Phyllis is now building an electronics kit. Her aim? Build a computer herself; Or as we called it an “electronic gadget”.
What Phyllis doesn’t say is she was a maths graduate from University and “#Cypher Clerk” in “Hut 5” at #BletchleyPark during the war.
The”Official Secrets Act” was in force in 1983 😂🤣☺️
#UK / WW2 / #computing / #bombe / #SigInt / #accounts / #hardware #kits / #Commodore / #PET / #RetroComputing