Posts
2571
Following
632
Followers
1418
"I'm interested in all kinds of astronomy."
repeated

While the continue, we would like to remind everyone of two very convincing facts for the pro side:

✅ 1. Encryption can't be outlawed

✅ 2. Backdoors for the good guys only are impossible

Read our position on the ongoing crypto wars: https://tutanota.com/crypto-wars/

0
9
0
repeated
"Exploiting aCropalypse: Recovering Truncated PNGs"

My writeup on exploiting CVE-2023-21036 (un-cropping Android screenshots!)

https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html
1
18
0
repeated

"it's not like we can put the genie back in the bottle! 🤷" – VC who stands to profit massively from the release of the genie, and who has worked tirelessly to release said genie

0
12
0
repeated

Mx. Moriarty 🏳️‍⚧️ nonbinary_heart

Lol looks like JFrog finally disclosed CVE-2022-0668 [1]. @matthias_kaiser and I found that around a year ago, along with CVE-2022-0573 [2]. Coupled together we could unauth RCE Artifactory 🔥

Funny how they marked the RCE as being as severe as a blind SQLi, a “High”🤪

In neither case were we told the issues were fixed… 🙈🙉🙊

1. https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0668%3A+Artifactory+Authentication+Bypass
2. https://www.jfrog.com/confluence/display/JFROG/CVE-2022-0573%3A+Artifactory+Vulnerable+to+Deserialization+of+Untrusted+Data

0
0
0
repeated

I wonder if Microsoft should meaningfully strengthen HTA files (not with SmartApps)… (yes, they definitely should) HT @campuscodi

0
1
0
repeated
Edited 2 years ago

Two vulnerabilities I disclosed to @msftsecresponse got patched today. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415 and https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23416. Both are are RCE and given critical severity. The first is a pre-auth vuln in ICMP.

From the bulletin:

How could an attacker exploit this vulnerability?

An attacker could send a low-level protocol error containing a fragmented IP packet inside another ICMP packet in its header to the target machine. To trigger the vulnerable code path, an application on the target must be bound to a raw socket.

0
0
0
repeated

Okay so everybody get ready to preemptively suspend the domain once we know what it is

> Meta is building a decentralized, text-based social network

https://www.platformer.news/p/meta-is-building-a-decentralized

> The app is codenamed P92

> The P92 app will support ActivityPub, MoneyControl reported

2
4
0
repeated

Major win for encryption.

European Data Protection Supervisor Wojciech Wiewiórowski said the indiscriminate scanning of private communications proposed by EU’s CSAM regulation “will always be illegal under the Charter of Fundamental Rights (and probably under several national constitutional laws as well),” https://www.euractiv.com/section/law-enforcement/news/eu-watchdog-online-child-abuse-draft-law-creates-illusion-of-legality/

1
8
0
repeated

lol, a way to bypass the Microsoft account requirement in Windows 11 - type username no@thankyou.com, any password, and it bumps you to local account creation.

23
24
0
repeated

BlackLotus Shows again: Revocation lists don't work, and Code Signing is not going to save you.

1
3
0
repeated
In #Hungarian we don't distinguish between "safety" and "security", which leads to confusions. I made this meme, but I'm not sure it's right.

Can some native #English speakers take a look? (clarification in alt text)
0
0
0
repeated

Kudos to Coinbase for publishing this fantastic write-up on social engineering. Really would love to see more orgs normalizing their wins (because make no mistake about it, this IS a win).
https://www.coinbase.com/blog/social-engineering-a-coinbase-case-study

0
5
0
Edited 2 years ago
Is there a debugger I can "attach" by sideloading a DLL to the target? #antidebug #antiantidebug
1
0
1
repeated

Our (free) AWS Canarytokens have always been popular.

Today, we released the Azure alternative on our canarytokens.org server¹

Attackers who find ‘em have to use ‘em (and reveal their presence).

Check out Pieter’s blog post at:

https://blog.thinkst.com/2023/02/canarytokens-org-welcomes-azure-login-certificate-token.html

__
¹ also free

0
11
0
repeated

attackerkb published their GoAnywhere analysis. No more reasons to hold back my blog post then, I wrote days ago.

https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html

0
0
0
Show older