Posts
3537
Following
721
Followers
1583
"I'm interested in all kinds of astronomy."
repeated

TrendAI Zero Day Initiative

Confirmed! In the penultimate attempt of Day 2, @daankeuper, @xnyhps, and @notkmhn from @sector7_nl combined 4 bugs, including a command injection and a path traversal to going from the QNAP QHora-322 to the TrueNAS Mini X. They earn $25,000 and 10 Master of Pwn points.

0
2
0
[RSS] Pluralistic: You should be using an RSS reader (16 Oct 2024)

https://pluralistic.net/2024/10/16/keep-it-really-simple-stupid/
0
0
0
repeated

TrendAI Zero Day Initiative

Unfortunately, the Viettel Cyber Security (@vcslab) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
repeated

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-37383 (6.1 medium( RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
  • CVE-2024-20481 (5.8 medium) Cisco ASA and FTD Denial-of-Service Vulnerability

0
2
0
repeated

An idea I recently heard on a parenting podcast really resonated with me. Tech has created a generation of people used to instant gratification.

Hungry? Open an app. Want to listen to music? Open an app. Bored? Open an app.

However a lot of needs in life can’t be gratified instantly and we now have many people, both adults and kids, who simply don’t know how to handle that. We now have entire subcultures whose main dysfunction is they can’t just get what they want without work and they’re mad.

4
3
0
[RSS] LibRaw: Uninitialized memory disclosure via LibRaw_buffer_datastream::read

https://github.com/google/security-research/security/advisories/GHSA-cmhf-chvw-6c7j

<3 these :)
0
0
1
[RSS] DTLS ClientHello Race Conditions In WebRTC Implementations

https://packetstormsecurity.com/files/182303/webrtc-hello-race-conditions-paper.pdf
0
0
0
repeated

After I refused a bribe to remove a @web3isgreat post about alleged crypto pyramid scheme co-founder Roman Ziemian, I’ve now received a fraudulent copyright claim aimed at forcing me to take it down

18
18
0
OH: "We had a problem. We thought we'd solve it with the cloud. Now we have a horizontally scalable set of problems."
0
10
21
Edited 1 year ago
Anyone remembers that research about using compromised AV/EDR management consoles as C2 servers?

I remember someone was working on it but I don't remember seeing it released.
1
1
1
repeated

The Irish Data Protection Commission fines LinkedIn €310M over using personal data for behavioral analysis and targeted ads under GDPR, after a 2018 complaint (Ian Curran/The Irish Times)

https://www.irishtimes.com/business/2024/10/24/microsoft-owned-linkedin-fined-310m-by-irish-data-protection-commission/
http://www.techmeme.com/241024/p13#a241024p13

0
3
0
repeated

TrendAI Zero Day Initiative

Our first collision of Day Three: the group from STEALIEN Inc. successfully popped the Lorex camera, but the bug they used had already been demonstrated in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
2
0
repeated

TrendAI Zero Day Initiative

Unfortunately, Sina Kheirkhah (@SinSinology) and Enrique Castillo (@hyprdude) of Summoning Team (@SummoningTeam) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
Exception Junction - Where All Exceptions Meet Their Handler

https://bruteratel.com/research/2024/10/20/Exception-Junction/

"to understand why the ‘ntdll!NtProtectVirtualMemory’ is being called, I decided to reverse the entirety of the ntdll!RtlAddVectoredExceptionHandler’ API call"

#Windows #ReverseEngineering
0
0
1
repeated

TrendAI Zero Day Initiative

We're ready for Day Three of Ireland! We’ve already awarded $874,875, & we have 15 attempts left to go. Will we hit the $1,000,000 mark or will all remaining attempts end up in bug collisions? Follow along with the results here and on our blog: https://www.zerodayinitiative.com/blog/2024/10/24/pwn2own-ireland-2024-day-three-results

0
1
0
[RSS] Windows User Space Emulator

https://github.com/momo5502/emulator
0
0
1
[RSS] Multiple vulnerabilities in the Realtek card reader driver. Affects Dell, Lenovo, etc

https://zwclose.github.io/2024/10/14/rtsper1.html

"CVE-2022-25476 wasn%27t fully patched until the July-August fix, which also addressed CVE-2024-40431 and CVE-2024-40432"
0
0
2
repeated

TrendAI Zero Day Initiative

One of our final attempts of Day 2 ends in a collision. The InfoSect (@infosectcbr) group successfully got a shell on the Lorex camera, but they used a bug previously seen in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
3
0
repeated

❗ Fortinet has issued an advisory for FortiManager confirming CVE-2024-47575 is being actively exploited in the wild. This extremely critical vulnerability has a CVSS score of 9.8.

⚠️ This vulnerability can enable RCE upon connecting to a FortiManager instance with a valid Fortinet device certificate and could lead to total compromise of the vulnerable system.

⏱️ Shoutout to @rk for the quick work on this Rapid Response!

👉 Launch runZero now to pinpoint assets that could be affected -- no rescanning or credentials required:

https://www.runzero.com/blog/how-to-find-fortimanager-instances-on-your-network/

0
1
0
Show older