The draw is complete and now the schedule is out! You can check out the full schedule showing all four days of #Pwn2Own Ireland madness at https://www.zerodayinitiative.com/blog/2024/10/22/pwn2own-ireland-the-full-schedule #P2OIreland
Here is my recent DEF CON talk on Anom, the encrypted phone secretly ran by the FBI. All about the phone, the network, how Anom was structured, who used it, what this means for Signal, Telegram, more https://www.youtube.com/watch?v=uFyk5UOyNqI
The next blog post in the Active Directory hardening series just posted, focusing on SMB signing. https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/active-directory-hardening-series-part-6-enforcing-smb-signing/ba-p/4272168. You can do this yourself and it makes a difference.
We can finally run Doom in Quake! https://www.youtube.com/watch?v=tVOYmYUWkmE #doom
Now that the drawing is complete, @TheDustinChilds and Zed have a few thoughts about the upcoming #Pwn2Own Ireland contest. https://youtube.com/shorts/6l3BW94xH8E #P2OIrleand
By default, Kagi Image Search downranks images from websites with a high proportion of AI-generated content.
You can also use the AI images filter to completely exclude websites with AI-generated images from your image search results.
More info: https://help.kagi.com/kagi/features/exclude-ai-images.html
Somehow, I don't think that 2024's richest man in the world, who also is an immigrant, would ever think of using his money to create something like this.
https://www.npr.org/2013/08/01/207272849/how-andrew-carnegie-turned-his-fortune-into-a-library-legacy
Currently trying to repair this device. Can you deduct or guess what it is? #NameThatWare
As always, hide your replies behind a CW to not spoil others.
Tired of using outdated languages for #Ghidra scripting or a REPL that you can't even properly paste into? @tmr232 and I wrote a plugin to embed a #Jupyter #Kotlin kernel for a full Notebook environment alongside your GUI.
https://github.com/GhidraJupyter/ghidra-jupyter-kotlin
Internet Archive breached again through exposed access tokens https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-exposed-access-tokens/?utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓
I have no idea how many of my readers even remember what a Z80 is (the very first computer I used had one), anyway here's a font for you:
“This font converts sequences of hexadecimal lowercase characters into disassembled Z80 instructions, by making extensive use of OpenType's Glyph Substitution Table (GSUB) and Glyph Positioning Table (GPOS).”