Posts
2505
Following
611
Followers
1347
"I'm interested in all kinds of astronomy."
repeated

The '25 program is live!

We've got 9 full papers, 3 work-in-progress papers, and 2 exciting keynotes lined up. Huge thanks to all the authors and the program committee!

Check out the details and get ready for a great event! πŸ”₯

πŸ”— https://madweb.work/#program

See you in San Diego!

0
3
0
repeated

This is a friendly reminder that anyone can contribute to the lovebyte.party!

It is a party about tiny intros, that is held online on the weekend of 15. - 16. Feb 2025.

0
2
0
Edited 1 month ago
Has anyone looked into the "Advanced Installers" (...ai.dll) distributed via Windows Updates? #ExploitWednesday
0
0
0
[RSS] Micropatches Released for Microsoft Outlook Remote Code Execution Vulnerability (CVE-2025-21357)

https://blog.0patch.com/2025/02/micropatches-released-for-microsoft.html
0
0
0
repeated

Thanks @bagder for providing the Firefox ca bundle publicly in an accessible way here: https://curl.se/docs/caextract.html

Extra kudos for the appropriate curl command-line to automatically download the latest version!

0
2
0
repeated

Just released v0.8.0 - Ghidra 11.3 Support + PyGhidra πŸ”₯πŸ‘€

This release uses the latest PyGhidra now officially supported by Ghidra πŸ€“πŸ’ͺ

https://github.com/clearbluejar/ghidriff/releases/tag/v0.8.0

πŸ”‹ included!

0
5
1
Free advice for #UX designers:

The answer to the question "Should we show a survey/questionnaire to the user?" is always NO.
0
7
11
#music #deathmetal #stevensegal
Show content
The Album Cover of the Year Contest starts off pretty strong!

I mean how would you beat Schwarzenegger teaming up with Gremlins and the Cobra Commander (and others) to mutilate the clones of Steven Segal?

https://listenable-records.bandcamp.com/album/big-trouble
0
0
1
repeated

Recon 2025 Have been Annonced! 20th year Anniversary https://recon.cx June 23-29.

1
6
1
repeated

Picard management tip: It's okay not to know things. Practice saying "I don't know." Go ahead. Say it.

1
2
0
repeated

Kennt ihr ?

Ist ein coverage-guided REST-Fuzzer und Open-Source.

Bin heute darΓΌber gestolpert und dacht das ist teilenswert.

https://github.com/TNO-S3/WuppieFuzz

0
4
0
repeated

Our blog site is having a moment, and @TheDustinChilds is stuck on a plane in DFW, but nothing stops Patch Tuesday. There's 2 Microsoft bugs being exploited in the wild and some things we've never seen before. Read all the details at https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review

0
2
0
Cisco Talos is grinding through NVIDIA nvJPEG2000, check out their vulnerability reports page for details:

https://talosintelligence.com/vulnerability_reports#disclosed

CVE-2024-0142, CVE-2024-0143, CVE-2024-0144, CVE-2024-0145
0
1
4
[RSS] Exploring a VPN Appliance: A Researcher's Journey [CVE-2024-46666, CVE-2024-46668]

https://www.akamai.com/blog/security-research/2025-february-fortinet-critical-vulnerabilities

"We%27ll go through the processes of getting the firmware, decrypting, setting up a debugger, and finally looking for vulnerabilities." -> Mad respect!
0
1
0
That's it, I unsubscribed Sonar because of their shitty RSS :P
0
0
2
repeated
repeated

Good tools are made of bugs: How to monitor your Steam Deck with one byte.
Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming.
A Christmas gift in February, brought to you by the incredible @pwissenlit 🫢

https://blog.quarkslab.com/being-overlord-on-the-steam-deck-with-1-byte.html

0
8
0
repeated

ElecticIQ: Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
EclecticIQ analysts assess with high confidence that Sandworm (APT44), a threat actor supporting Russia's Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia's invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER, a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT), enabling attackers to exfiltrate sensitive data and conduct cyber espionage.

Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145, based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm's involvement. Yara and Sigma rules, and Indicators of Compromise are listed.

0
2
0
repeated
repeated

Apparently Google is just shitty.

No duress signal or anything here. Just trying to fit in by being shitty. πŸ€¦β€β™‚οΈ

5
5
0
Show older