Posts
2527
Following
646
Followers
1461
"I'm interested in all kinds of astronomy."
"an amazing 325 page google strategy document quietly unsealed buried in google antitrust docket. It's gonna take a long thread but I have pulled out the gems. It's from 2017 planning, no doubt Google will just say these were only ideas but many will look very familiar." #adtech

https://threadreaderapp.com/thread/1821554841786683554.html
0
1
0
repeated

Happy birthday @openstreetmap !

You are simply the best, not only for providing a reliable map at home, or for guiding me when 10,000 km from to , but also for all the fun , completing and correcting details on the map! hearts

2
3
0
repeated

Is for part of the program?

Asking for a fried.

1
2
0
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!

https://blog.orange.tw/2024/08/confusion-attacks-en.html?m=1&s=09

Latest by Orange Tsai!
0
10
6
repeated

boB Rudis 🇺🇦 🇬🇱 🇨🇦

W00t! @hdm / @runZeroInc made sshamble public (took forever for BH/DC to get here).

https://github.com/runZeroInc/sshamble

SSHamble is research tool for SSH implementations that includes:

— Interesting attacks against authentication
— Post-session authentication attacks
— Pre-authentication state transitions
— Authentication timing analysis
— Post-session enumeration

Gorgeous website for it too: https://www.runzero.com/sshamble/

1
5
0
repeated

FTX settles complaint from the CFTC with $12.7 billion payout

August 8, 2024
https://www.web3isgoinggreat.com/?id=ftx-cftc-settlement

0
2
0
repeated

"Question regarding you hacking my webserver?"

It is time again.

https://bagder.github.io/emails/2024/2024-08-07.html

3
1
0
A new post by #CrowdStrike refutes some claims I amplified earlier:

https://www.crowdstrike.com/blog/tech-analysis-addressing-claims-about-falcon-sensor-vulnerability/

Some notes:
- seems CS can't update through middleboxes. This is an unusual design but makes sense IMO (screw middleboxes!)
- "Before loading the channel file from disk, the Falcon sensor verifies that the file contents match the expected hash to detect any local modifications of the file." Sounds like a TOCTOU, but that's just a wild guess
0
0
1
repeated
Edited 11 months ago

Thrilled to announce that, after roughly 4 years of dedicated collaboration between Mozilla and Google's WebDriver automation teams, Firefox is now officially supported in Puppeteer, thanks to the new WebDriver BiDi protocol!

This significant milestone allows seamless testing of websites in Firefox, using tools that were previously exclusive to Chrome.

Please share your thoughts and feedback, let us know what works and what features you'd like to see!

https://fosstodon.org/@planetmozilla/112921805158708461

0
2
0
repeated

Protip: You can also make a phone call by holding it up to your ear and speaking into it directly at a low volume.

2
8
1
repeated

Thanks to @jmc for setting it up, there's a new mailing list for those interested in all aspects of illumos on SPARC

https://illumos.topicbox.com/groups/sparc

Nothing there yet, but I thought I would give those interested a chance to join before starting up some conversations

0
3
0
repeated

💫DID YOU KNOW💫
that if you move a mouse cursor fast enough, you can get persistence of vision and, say...
*run a game of Pong inside your mouse's firmware*
🕹️🕹️🕹️🕹️🕹️🕹️🕹️🕹️🕹️

2
14
1
repeated
Edited 11 months ago

ClownStrike.lol now says has falsely blocked the domain as "phishing" and is giving them the runaround about appealing it. This domain is demonstrating all of the cybersecurity industry's problems. https://clownstrike.lol/crowdmad/

0
4
0
repeated

CPU bugs reached a level of yikes that speculation side channels can only dream of

https://ghostwriteattack.com/riscvuzz.pdf

3
17
0
repeated
This tabloid cover feels cyberpunk in a good way #adtech
0
0
1
repeated

The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here ->
https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work

0
2
0
repeated
Edited 11 months ago

Ivanti and Fortinet have unpatched vulnerabilities in their VPN products!
Akamai, in their blog post Living off the VPN — Exploring VPN Post-Exploitation Techniques, talk about techniques that can be used by threat actors after compromising a VPN server to further escalate their intrusion. The key takeaway is that the vulnerability disclosure was published 133 days after initial notification to Ivanti and Fortinet:

  • CVE-2024-37374 (unknown CVSS score) Ivanti hard-coded key issue?
  • CVE-2024-37375 (unknown CVSS score) Ivanti MDM cleartext passwords issue?
  • Fortinet custom encryption key bypass issue (no CVE ID assigned)

Fortinet informed us that after additional consideration, they decided to not fix the custom encryption key bypass as it “does not cross a security boundary”

If the original Ivanti Connect Secure exploited zero-day fiasco hasn't scared you off of their products, this is your wakeup call. As @cadey would say: "No way to prevent this" say users of only VPN where this regularly happens

cc: @campuscodi (who else wants to be notified of issues like this?)

0
1
0
repeated

“Variant analysis is the lowest effort, highest reward activity for preventing 0days” @natashenka

0
2
0
Show older