147 Followers
64 Following
19 Posts
Blue team, DFIR, Reverse engineering
@pancakescon @qualcomm Thanks for the CTF! It was fun! \o/
CTF is almost done but still anyone's game! Well done, teams, and thanks again @qualcomm !
@foone AddBadMonsters or AddToughMonsters or AddEvilMonsters

@foone
class RoomNumberUpdateScript
class HouseTwoEvents (or SecondHouseEvents)
class uhh what

Who is Mr Spook and what Kontrls him?

UK Electoral Commission has been #breached for extended period. It's unclear how many people are affected, but estimates suggest tens of millions. https://www.electoralcommission.org.uk/privacy-policy/public-notification-cyber-attack-electoral-commission-systems

In Finland #penandpaper voting has been preferred, and still is. The cyber and other threats originating from electronic voting have been considered too high of a risk vs the existing well defined voting process. more here: https://blog.f-secure.com/podcast-evoting/

#evoting #cybersecurity #compromise

Public notification of cyber-attack on Electoral Commission systems

We have been the subject of a complex cyber-attack. Find out about the data affected, the potential impact, and the measures we’ve taken.

@jerry lol, sorry I did this. Impossible for anyone to send more now 😂
There’s still no evidence that @jerry ever sleeps, this only would also show otherwise.
⚠️ We have just released important security fixes for the #Mastodon server software. Versions 4.1.3, 4.0.5, 3.5.9, as well as a new nightly are available now to make upgrading quick and painless. Please upgrade as soon as possible!
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 3.5.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, attackers using carefully crafted media files can cause Mastodon's media processing code to create arbitrary files at any location. This allows attackers to create and overwrite any file Mastodon has access to, allowing Denial of Service and arbitrary Remote Code Execution. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
NVD - CVE-2023-36460