104 Followers
595 Following
1.9K Posts
Keele Computer Science Grad, working for the blue team. Shitposts,politics and tech. Fighting my daemons one day at a time.
packet loss

How did I become a wealthy hedge fund manager when I was only 19, you ask?

-I worked hard.
-I didn't cut corners.
-I murdered a wealthy hedge fund manager and stole his identity.

There are no shortcuts in life.

The devout Muslim making a living from Islamophobic AI slop
https://www.thebureauinvestigates.com/stories/2026-05-05/a-devout-muslim-in-pakistan-is-making-a-living-from-islamophobic-ai-slop
A content creator in Pakistan is earning money from viral videos that stir up hate in UK
The devout Muslim making a living from Islamophobic AI slop

A content creator in Pakistan is earning money from viral videos that stir up hate in UK

TBIJ

A COMPUTER CANNOT FIND OUT

THEREFORE A COMPUTER MUST NEVER BE ALLOWED TO FUCK AROUND

Palantir employees are talking about company’s “descent into fascism”
https://arstechnica.com/tech-policy/2026/04/palantir-employees-are-talking-about-companys-descent-into-fascism/
Slack messages, interviews with current and former works paint picture of company in turmoil.
Palantir employees are talking about company's "descent into fascism"

Slack messages, interviews with current and former works paint picture of company in turmoil.

Ars Technica

(gendigital.com) Group Theory in the Wild: A Deep Dive into Bedep Malware's Mathematically Sophisticated Domain Generation Algorithm

Bedep malware leveraged a mathematically advanced DGA using Euro FX rates from the European Central Bank, rendering C2 domains unpredictable until publication. This technique, rooted in group theory and number theory, significantly hindered preemptive sinkholing or blocking efforts.

In brief - Bedep, an ad-fraud botnet delivered via Angler EK (CVE-2015-0311), used a sophisticated DGA seeded with real-time ECB foreign exchange rates. This approach prevented pre-computation of C2 domains, complicating defensive measures. Active globally (excluding Russia), it infected ~82K IPs.

Technically - Bedep’s DGA fetches UTC time and ECB FX rates, parsing up to 48 currency values to seed a cyclic subgroup walk modulo large primes. Using precomputed primes (p) and subgroup orders (q), it performs modular exponentiation (seed = pow(seed, step, p)) to generate collision-free domains. Domains are constructed via multiply-XOR-shift operations on group elements, currency rates, and codes, producing 12–18 character .com domains. Seven config variants generated 50 domains weekly, each leveraging primitive root searches and smooth factorization of p-1.

Source: https://www.gendigital.com/blog/insights/research/the-group-theory-inside-bedeps-dga

#Cybersecurity #ThreatIntel

When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA

A closer look at how Bedep used foreign exchange data and advanced math to generate hard-to-predict domains, making its command-and-control infrastructure more difficult for defenders to block and disrupt

The internet changes before the advisory drops. New from GreyNoise: activity surges preceded 33 CVEs across 16 vendor families with a median 11-day lead. The pattern holds up to rigorous testing.

https://www.greynoise.io/resources/ten-days-before-zero

Ten Days Before Zero: How Activity Surges in GreyNoise Data Precede Vulnerability Disclosure

Attackers are moving before disclosures. GreyNoise shows how surge activity can signal vulnerabilities days before CVEs are published.

From the same author as BlueHammer we now have RedSun.

This works ~100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server 2019+ with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled. Any system that has cldapi.dll should be affected.