Why chatbots are terrible for search, and why retrieval augmented generation doesn't fix that: https://buttondown.com/maiht3k/archive/information-literacy-and-chatbots-as-search/ by @emilymbender
#generativeAI
Happy #PatchTuesday from Citrix:
Please see the advisories for the prerequisites for each vulnerability.
#Citrix #NetScaler #CVE #vulnerability #infosec #cyberesecurity
Microsoft:
The BinaryFormatter type is dangerous and is not recommended for data processing... BinaryFormatter is insecure and can't be made secure.
Citrix:
We have the facts and we're voting Yes for using BinaryFormatter for processing data in our product.
CVE(s) TBD...
Micropatches Released for Remote Registry Service Elevation of Privilege Vulnerability (CVE-2024-43532)
https://blog.0patch.com/2024/11/micropatches-released-for-remote.html
Check out the Snapshot Manager (https://github.com/d0mnik/binja_snapshot_manager), the latest community-plugin (https://github.com/Vector35/community-plugins ). That brings the total plugins in the plugin manager up to 166. How long before we break 200?!
Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1 https://medium.com/@clearbluejar/everyday-ghidra-ghidra-data-types-when-to-create-custom-gdts-part-1-143fe45777eb
A few weeks ago, I sent my 1985 Swiss Army Knife back to Victorinox for a broken blade replacement.
It came back today, fully repaired, cleaned, polished, lubricated and in a new box.
Total cost: £10 + return postage.
They sent the knife back with an invoice. I didn't have to pay a penny before the job was done.
A product that's been out of production for almost 40 years, repaired at very little cost by the original manufacturer.
I'm stunned. Happy, impressed, grateful and stunned.
vArmor
vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that are ready to use out of the box.
I will present about file formats at the CCC (ten years after 31c3's "Funky file formats").
https://speakerdeck.com/ange/funky-file-formats-31c3
#China has officially unveiled its new 5th-generation stealth fighter, the J-35A, at the Zhuhai Air Show
Images show a comparison with the US F-35.
The J-35A is a customized copy of the F-35. China hacked a British defence company and stole the F-35 blueprints a number of years ago. This is the result of that.
We've just released our 2024-Q3 edition of ThinkstScapes: https://thinkst.com/ts
For this issue, we went through ~5000 info-sec research talks, papers, presentations & blogs.
The website includes PDF & ePub links (and a brief audio summary).
As always: completely free...
Amazon has confirmed a data breach impacting employee data.
The confirmation comes after a hacker claimed to leak data from a bunch of major organizations, including Amazon, which they say is linked to last year's MOVEit mass-hacks
Happy to announce the SBFT'25 fuzzing competition! Unlike previous years, we will favour fuzzers which are better at discovering novel edges and will accept existing fuzzers as submissions, so there is no excuse to not join in :^)
Register and find details here: https://sbft25.github.io/tools/fuzzing
Just Windows things: https://devblogs.microsoft.com/oldnewthing/20050715-14/?p=34923