Posts
3049
Following
513
Followers
1219
A drunken debugger

Heretek of Silent Signal
repeated
repeated

Anyone can Access Deleted and Private Repository Data on GitHub ◆ Truffle Security Co.
https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github

0
2
0
EU MEP accusing #Hungary for trying to infect his phone with spyware:

https://www.politico.eu/newsletter/brussels-playbook/orban-critic-mep-targeted-with-spyware/

Hungarian news talk about Pegasus, but this seems wrong as the Politico article mentions #Candiru (tech journalism at its best...).

Also the accusation is not supported by evidence, and frankly I wouldn't expect that even our gov is this stupid.
1
0
2
repeated

Congrats @nachoskrnl for being nominated @pwnieawards for his 3-episode research work on Windows paths - well deserved (yes, I nominated it:)).
https://x.com/PwnieAwards/status/1815894380789592298

https://bird.makeup/@pwnieawards/1815894380789592298

0
1
0
In case you don't feel like untangle the #CrowdStrike post-mortem, this is the gist of it:

"Based on the testing performed before the initial deployment of the Template Type (on March 05, 2024), trust in the checks performed in the Content Validator, and previous successful IPC Template Instance deployments, these instances were deployed into production."

In other words they simply didn't do e2e tests on the problematic update data that triggered the bug in their parser, because prev updates worked fine.

We still don't know how the malformed Template Instances were produced.
2
2
7
repeated

Amazon sold a half billion[1] Trojan horses into households, workplaces, and other places around the world, and couldn’t make a profit off them

https://arstechnica.com/gadgets/2024/07/alexa-had-no-profit-timeline-cost-amazon-25-billion-in-4-years/

[1] Who knows how many Alexa devices are actually in use but even 1% of the number sold is still 5 million. Holy shit that’s a lot of microphones

1
3
0
repeated

Something I've had on my list for quite some time and finally got around to now: updating the HowFuzzilliWorks document: https://github.com/googleprojectzero/fuzzilli/blob/main/Docs/HowFuzzilliWorks.md

Besides a number of smaller changes (e.g. new mutators), the design of the HybridEngine has changed considerably since the document was initially written.

Happy fuzzing!

0
4
0
repeated

that the uses something called a „COBRA seal“ to seal relevant objects against manipulation. One type of these seals works by using a multi-core optical cable. When the seal is locked a random number of cores are cut. This creates a unique optical pattern that can be verified simply by shining a light into the cable and can’t be recreated.

2
8
0
repeated
repeated

Do I know anyone with a mail address on a mail server managed by barracuda networks who would help me with something? I'd like to test a few things (just sending you a few test mails and see if they arrive).

0
1
0
repeated

Wild, true story from the security awareness and training company KnowBe4 that details how they inadvertently hired a North Korean hacker who was posing as a Western tech worker.

Kudos to them for publishing this. If it can happen to a security awareness company, it can happen to anyone (full disclosure: they've been an advertiser on my site for ages).

https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us

4
21
0
repeated

I've published a little blog on binary patching Golang produced assembly to alter the stdlib net/http functionality. and frens maybe interested! https://pulsesecurity.co.nz/articles/golang-patching

0
2
0
repeated

We're proud our testing helps ensure the security of Thinkst's OSS Canary Tokens! As part of their transparency efforts, you can read the results of our latest round of testing here:

https://www.doyensec.com/resources/Doyensec_ThinkstCanaryTokensOSS_Report_Q22024_WithRetesting.pdf

1
4
1
[RSS] Micropatches Released for Windows MSHTML Platform Spoofing (CVE-2024-38112)

https://blog.0patch.com/2024/07/micropatches-released-for-windows.html
0
0
0
repeated
Edited 1 month ago

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press! CISA adds two vulnerabilities to the KEV Catalog:

  • CVE-2012-4792 (CVSSv2: 9.3 "high") Microsoft Internet Explorer Use-after-free vulnerability
  • CVE-2024-39891 (5.3 medium) Twilio Authy Information Disclosure Vulnerability

cc: @iagox86 h/t: @hrbrmstr

0
1
0
repeated
repeated
New assessment for topic: CVE-2024-29824

Topic description: "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. ..."

"Ivanti Endpoint Manager (EPM) versions 2022 SU5 and prior are vulnerable to SQL injection and a patch has been released, as described in the official [advisory](https://forums.ivanti.com/s/article/Security-Advisory-May-2024) and the related [KB article](https://forums.ivanti.com/s/article/KB-Security-Advisory-EPM-May-2024) ..."

Link: https://attackerkb.com/assessments/721f9e58-f1a2-4da1-9bdc-21a2c2e0a139
0
1
0
[RSS] Summercon 2024 Slides - Modern ColdFusion Exploitation and Attack Surface Reduction

https://www.hoyahaxa.com/2024/07/summercon-2024-slides-modern-coldfusion.html
0
2
0
Show older