Posts
2916
Following
693
Followers
1518
"I'm interested in all kinds of astronomy."
repeated

Trend Zero Day Initiative

Sadly, the Neodyme (@neodyme) team could not get their exploit of the Lexmark CX331adwe printer working within the time allotted.

0
1
0
repeated

Trend Zero Day Initiative

We have another collision. The DEVCORE Research Team (@d3vc0r3) successfully exploited the Lorex 2K camera, but they used a bug previously seen in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
1
0
repeated

I thought I understood the extent to which the broad availability of mobile location data has exacerbated countless privacy and security challenges. That is, until I was invited along with four other publications to be a virtual observer in a 2-weeek test run of Babel Street, a service that lets users draw a digital polygon around nearly any location on a map of the world, and view a time-lapse history of the mobile devices seen coming in and out of the area.

The issue isn't that there's some dodgy company offering this as a poorly-vetted service: It's that *anyone* willing to spend a little money can now build this capability themselves.

I'll be updating this story with links to reporting from other publications also invited, including 404 Media, Haaretz, NOTUS, and The New York Times. All of these stories will make clear that mobile location data is set to massively complicate several hot-button issues, from the tracking of suspected illegal immigrants or women seeking abortions, to harassing public servants who are already in the crosshairs over baseless conspiracy theories and increasingly hostile political rhetoric against government employees.

https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/

16
23
1
repeated

Yes- I’m looking at you!

0
1
0
repeated
I think to be true to myself next time I should only boost failing entries (that had the same work and thought put into them as winning ones) from #Pwn2Own.

#failnight
0
0
1
repeated

Trend Zero Day Initiative

As a reminder - you can find all of the results from Day Two of Ireland at https://www.zerodayinitiative.com/blog/2024/10/23/pwn2own-ireland-2024-day-two-results

0
1
0
repeated
repeated

Trend Zero Day Initiative

Confirmed! PHP Hooligans / Midnight Blue (@midnightbluelab) used a command injection bug to get code execution on the Synology BeeStation BST150-4T. They earn $40,000 and 4 Master of Pwn points.

0
1
0
repeated
#music #grindcore
Show content
2
1
2
repeated

Trend Zero Day Initiative

Confirmed! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck used two bugs (incl a CLRF injenction) in a beautiful chain to exploit the QNAP TS-464 NAS. The second round win earns them $20,000 and 4 Master of Pwn points.

1
2
0
repeated

Trend Zero Day Initiative

In out fist video highlight of Day Two, we see Ken Gannon (@Yogehi) bring 5 bugs and a tone of emotion to bear against the Galaxy. @P2OIreland https://youtube.com/shorts/eM9dOhHH2AA?feature=share

0
1
0
repeated

Trend Zero Day Initiative

Boom! It took no time at all for the Viettel Cyber Security (@vcslab) team to exploit the HP Color LaserJet Pro MFP 3301fdw printer. They head of to the disclosure room to provide all the details.

0
1
0
repeated
repeated

Trend Zero Day Initiative

Nice! Chris Anastasio (@mufinnnnnnn) & Fabius Watson (@FabiusArtrel) of Team Cluck successfully exploited the QNAP TS-464 NAS. They're off to the disclosure room to explain how they did it.

0
2
0
repeated

Trend Zero Day Initiative

Sweet! The InfoSect (@infosectcbr) team successfully exploited the Sonos Era 300 speaker. They head of to the disclosure room to divulge how they did it.

0
2
0
On a related #UX note, which genius decided that in #Akkoma ":D" should automatically translate to 🧬?
0
0
1
If the primary use-case of your app is users typing text, you shouldn't have hotkeys without at least the Ctrl modifier!

Looking at you, #thunderbird #signal !

#ux
0
1
2
repeated

Project Zero Bot

New Project Zero issue:

FASTRPC_ATTR_KEEP_MAP logic bug allows fastrpc_internal_munmap_fd to racily free in-use mappings leading to UAF

https://project-zero.issues.chromium.org/issues/42451725

CVE-2024-49848
1
1
2
Show older