82 Followers
338 Following
95 Posts
Some people wonder why I’m not that interested in the technical details behind most intrusions these days. The recent excellent reporting by @TheDFIRReport shows why. The intruders used scheduled tasks as the persistence mechanism. SCHEDULED TASKS, like what we Foundstone consultants taught students to look for in 2002. Sure, occasionally an intruder does something interesting, but almost universally, from tools, to tactics, to operations/campaigns, to strategy, to policy, it’s been SSDD *for decades.* And orgs still get owned, and govs say do better, and vendors do or don’t invest in “secure” products, and consultants and defenders scramble, and others undermine their work. Le sigh.
Does Twitter blocking Mastodon links constitute anticompetitive behavior against a nascent rival? I asked a couple of legal experts, including Bill Baer, the former antitrust chief at DOJ and FTC in two US administrations. Here's what they say: https://www.cnn.com/2022/12/16/tech/mastodon-twitter-links/index.html

Awesome @githubsecurity articles by @anticomputer on recognizing and exploiting the hidden attack surface of interpreted languages

Now you C me, now you don't: An introduction to the hidden #attack surface of interpreted languages
https://securitylab.github.com/research/now-you-c-me/

Now you C me, now you don't, part two: #exploiting the in-between
https://securitylab.github.com/research/now-you-c-me-part-two/

For historical context on the ret2dlresolve #xdev technique, see also Nergal's "The advanced return-into-lib(c) exploits"
http://phrack.org/issues/58/4.html

Now you C me, now you don’t: An introduction to the hidden attack surface of interpreted languages

Aimed at developers, in this series we introduce and explore the memory unsafe attack surface of interpreted languages.

GitHub Security Lab

Very cool research about reverse engineering the NFC protocol used by Tesla Model Y and relaying it using a Proxmark device.
credits Josep Pi Rodriguez


White paper link: https://act-on.ioactive.com/acton/attachment/34793/f-6460b49e-1afe-41c3-8f73-17dc14916847/1/-/-/-/-/NFC-relay-TESlA_JRoriguez.pdf

#hacking #tesla #iot #nfc #infotech #cybersecurity #exploit #vulnerability #proxmark

Videos are on their way from #ComfyConAU2022Too🎈​

The playlist is ready to go and will have videos added to it over the coming week(s) ... (nag @Shanna if its too slow)

https://www.youtube.com/playlist?list=PLg-aMs82kVNrINbvFqFO_kXPw3b4DdVqj

You can check out videos from @hal_pomeranz, @fr0gger, & @ppym so far 

ComfyConAU2022Too

YouTube
Hack the Real Box: APT41’s New Subgroup Earth Longzhi

We looked into the campaigns deployed by a new subgroup of advanced persistent threat (APT) group APT41, Earth Longzhi. This entry breaks down the technical details of the campaigns in full as presented at HITCON PEACE 2022 in August.

Trend Micro

@davidr It's deeply moving, complex, subtle, nuanced, big, loud, fun, serious...

It's really excellent, all around.

And the literal historic nature of such a big budget film being created and driven by a Black man who uses his clout to center and uplift Black women will resonate through the ages.

The world changing on the screen and behind the scenes.

#WakandaForever

Analysis on Docker Hub malicious images: Attacks through public container images – Sysdig

The Sysdig TRT performed an analysis of over 250,000 Linux images on Docker Hub to detect malicious payloads hidden in the containers images.

Sysdig
Hearing from a large MSP that quite a few large European customers are getting ready to ditch their cyber insurance when it comes up for renewal. No nation state threat actor coverage. Less ransomware coverage. Premiums going up. No longer worth it...
I’m really hoping I don’t have to go to bird site anymore now that that stupid criminal orange racist narcissist grifting abusive lying fraudulent treasonous fucking dickhead is back. With his invective flowing again USA is measurably less safe. Elmo really wants to ram the clown car off the cliff. Or into the “freedom” pool.