đ´ Check out our presentation at @passthesaltcon:
Path Of rev.ng-ance: From Raw Bytes To CodeQL On Decompiled Code (30 minutes)
Uncoordinated Vulnerability Disclosure: After more than a decade of CVD, has it benefited vendors or researchers more? Have the number of bugs increased to where vendors simply cannot cope with CVD? @TheDustinChilds has some thoughts - & lots of questions. https://www.zerodayinitiative.com/blog/2024/7/15/uncoordinated-vulnerability-disclosure-the-continuing-issues-with-cvd
Seiko Originals: The UC-2000, A Smartwatch from 1984
Link: https://www.namokimods.com/en-ca/blogs/namokitimes/seiko-originals-the-uc-2000-a-smartwatch-from-1984
Discussion: https://news.ycombinator.com/item?id=40969808
Yesterday I wrote a script for #Diaphora for cases in which you want to disable a set of heuristics for the current two binaries being diffed for whatever reason. Here is the example script:
https://github.com/joxeankoret/diaphora/blob/master/doc/examples/hooks/exclude_heuristics.py
i'm excited to share Collateral Damage, a kernel exploit for SystemOS on Xbox One/Series consoles! this initial release is mostly intended for developers, but i hope people will enjoy playing around with it! writeup and more updates in the near future :) https://github.com/exploits-forsale/collateral-damage
At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still havenât set up their new accounts. Experts say malicious hackers learned they could commandeer any migrated Squarespace accounts that hadnât yet been registered, merely by supplying an email address tied to an existing domain.
From the story:
"...an analysis released by security experts at Metamask and Paradigm finds the most likely explanation for what happened is that Squarespace assumed all users migrating from Google Domains would select the social login options â such âContinue with Googleâ or âContinue with Appleâ â as opposed to the âContinue with emailâ choice.
Taylor Monahan, lead product manager at Metamask, said Squarespace never accounted for the possibility that a threat actor might sign up for an account using an email associated with a recently-migrated domain before the legitimate email holder created the account themselves.
âThus nothing actually stops them from trying to login with an email,â Monahan told KrebsOnSecurity. âAnd since thereâs no password on the account, it just shoots them to the âcreate password for your new accountâ flow. And since the account is half-initialized on the backend, they now have access to the domain in question.â
It has been a while since Iâve written about Avast, so today I give you âHow insecure is Avast Secure Browser?â
https://palant.info/2024/07/15/how-insecure-is-avast-secure-browser/
Note: This isnât a vulnerability disclosure, merely an overview of problematic design decisions.
TL;DR from the article: I wouldnât run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.
Some highlights:
Enjoy!
We love Open Source contributors.
If you are a significant contributor to an Open Source project, DM us, and we will give you a full briefings pass to BlackHat USA (absolutely free).
__
* Tickets handed out totally at our discretion;
** We only have a few tickets left;
fq 0.12.0 released 𼳠nothing fancy, REPL and jpeg fixes otherwise mostly update of dependencies.
Spent the last four days coordinating incident response for the Squarespace domain hijackings with @tay and @AndrewMohawk. Now that it seems to be resolved, we wrote a little postmortem/retrospective
Starting from v0.10 (the next version), HyperDbg uses @keystone_engine as its assembler. â¤ď¸
Thanks to our new team member @AbbasMasoumiG for adding it.
The following commands are added to assemble virtual and physical memory:
Clever & fun technique to dump #Windows LSA secrets bypassing #EDR by @sensepost
Dumping LSA secrets: a story about task decorrelation
https://sensepost.com/blog/2024/dumping-lsa-secrets-a-story-about-task-decorrelation/
Introduction to the Wild West of Proof of Concept #Exploit Code (#PoC) aka SSHing the Masses
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Everyone complains about meetings, but rarely anybody puts time before the meeting to do the work needed for the meeting to be useful.
CCC researchers had live access to 2nd factor SMS of more than 200 affected companies - served conveniently by IdentifyMobile who logged this sensitive data online without access control.
You had one job.
Does anyone have a technical reference (assuming it is public) for the hardware additions to ARMv8 which Apple made in Apple Silicon to support Rosetta 2?
âAdmiral Grace Hopperâs landmark lecture is found, but the NSA wonât release it â: https://www.muckrock.com/news/archives/2024/jul/10/grace-hopper-lost-lecture-found-nsa/
(I heard her speak at Chapel Hill when I was in grad school. Sadly, she did not hand out nanoseconds at that talk.)
"adhd is a new thing" is very funny to me, you used to be able to buy amphetamines over the counter, anyone with it could self medicate
much like erdĹs did, heh
a close friend bet him $500 he couldn't last a month without them. he did
"you have set mathematics back by a month"
gambling is the only non-substance addiction disorder recognized in the American Psychiatric Associationâs DSM-5 đ¤ good thing modern smartphone use is totally unlike gambling in any way whatsoever