Posts
3663
Following
724
Followers
1593
"I'm interested in all kinds of astronomy."
repeated

in linux you can use the evil bird emoticon (:>) to destroy files, eg `:> important_document.txt`

the bird will eat the file and leave it completely empty!

7
11
1
repeated

Fun stuff from my team mates Rene Rehme @renereh1, Nina Piontek and @kantorkel:

"Via a large enterprise's AI assistant, we obtained access to several million Entra identities and all chat logs including attachments β€” no prompt injection or model tricks required.”

https://srlabs.de/blog/hacking-ai-agent

https://infosec.exchange/@srlabs/116243968443532012

0
3
0
repeated

During my previous research, I identified a "Won't Fix" DoS vulnerability affecting the latest versions of Windows, including 25H2 and Server 2025.

https://cravaterouge.com/articles/null-fastmutex/

1
4
0
@chmod644 We should definitely come up with a catchy name!
1
0
0
repeated

Shall we stop calling them "social networks" and give them a more descriptive and accurate naming, like "Advertisment agregators and political view manipulative instruments".

I know, is not catchy, but at least it doesn't give the impression that you are interacting socially in a posstive and human way.

1
2
0
Cisco Talos issued a ton of TP-Link advisories, check @talosvulns for more details!

RE: https://infosec.place/objects/3c67cba4-e40f-42c2-8c4b-284816d64d00
0
0
1
Edited 5 days ago
[RSS] Qihoo 360's AI Product Leaked the Platform's SSL Key, Issued by Its Own CA Banned for Fraud

https://blog.barrack.ai/qihoo-360-ssl-key-leak-wotrus-ca-fraud/

https://crt.sh/?id=24937759962
https://crt.sh/?id=24937755996

Ouch...
0
0
1
repeated

πŸ¦€ Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! https://github.com/decoderloop/rust-malware-gallery

The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.

The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there's been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:

SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot

This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!

1
6
0
The leaked exploit toolkit for various iOS versions (Coruna)

https://github.com/khanhduytran0/coruna
0
7
7
@Viss

I may be wrong but assuming users don't know what files are helped me resolve a number of family techsupport situations.

@krypt3ia @decryption @jpm @da_667 @sassdawe
1
0
1
@schrotthaufen

SmartScreen windows got increasingly hard to unblock over time "and for a while, it was good". Then I went to a client where the sysadmin unblocked the freshly downloaded executable from the properties window so fast I had to ask him to show me once more what he just did because I couldn't follow.

Life finds a way.

@decryption @jpm @da_667 @sassdawe @Viss
0
0
1
@Viss As I see with the rise of smart phones companies successfully convinced users that files and directories are low level magic they are not supposed to know or care about. From this point doing stuff with files in a file manager is sorcery indistinguishable from copying 5 pages of sorcery into the sorcery manager. Confirmation windows never stopped any attacks because users click Yes faster than the blink of an eye.

In essence users are expected to make critical decisions about a system that is hidden from them in every other aspect of working with computers.

@sassdawe @da_667 @jpm @decryption
3
1
5
repeated
repeated

Fresh scan: "The UNIX System - a Sun Microsystems Technical Report" (1985)

https://drive.google.com/file/d/1dW6l6cFAiqTKj3bmTulynKQuOHeHMx0u/view?usp=sharing

0
4
0
repeated

I reported a bug in RenderDoc and it got fixed within 45 minutes (!!!) neocat_aww

0
2
0
repeated

TotalRecall - Reloaded.

Invested some time again into Windows Recall. Microsoft redesigned the entire architecture with VBS enclaves after the original TotalRecall. Took a closer look at the new defenses. This time going through MSRC.

0
4
0
repeated

The dream of a fast and reliable binary analysis framework is now a reality.

Today, we’re open sourcing http://VulHunt.RE πŸŽ‰
code: https://github.com/vulhunt-re/vulhunt
docs: https://vulhunt.re/docs

A huge kudos to the entire REsearch team!
https://bird.makeup/users/matrosov/statuses/2025997688437874893

0
5
0
Show older