Hungarian e-gov site "under attack" (another DoS I guess?)
https://kormany.hu/hirek/kibertamadas-ert-tobb-kormanyzati-portalt [HU]
!!!
RT @GenghisTronBand@twitter.com
Our new album, Dream Weapon, will be released by @RelapseRecords@twitter.com on March 26. The first single (“Dream Weapon”) is streaming now.
You can listen and pre-order the vinyl here: https://orcd.co/genghistrondw
thread
RT @ReneFreingruber@twitter.com
(1/n) Some context. The LPE looked like a real LPE. However, the .header file with windows defines contained a version string. I diffed the file against a public header file with the same version and approx. 2000 LoC were different (out of the 6k LoC). That got me suspicious
A thousand times this:
Hello Monday!
RT @Nnedi@twitter.com
🤣!!! A well-rounded amphibian living life to the fullest. 🐸
The explanation: https://grapee.jp/en/162253?fbclid=IwAR3c-iKlohNA2goDo-IH3uE7BhqZ2qc4yCuHo-Tb6yjOvax_t7TDfuiqf6I
As @RGB_Lights@twitter.com put it: "So why are we successful? We put the time in to know that network. We put the time in
to know it better than the people who designed it, and the people who are securing it." https://www.youtube.com/watch?v=bDJb8WOJYdA
Oracle Critical Patch Update Advisory - January 2021
https://www.oracle.com/security-alerts/cpujan2021.html
♂️🔐
RT @vxunderground@twitter.com
We'd like to uncomfortably announce we have received the source code to IoT Ransomware. that targets... Male Chastity devices...
You can download and view the source code to Trojan-Ransom.Python.ChastityLock here:
https://github.com/vxunderground/MalwareSourceCode/tree/main/Python
I had one night of proper sleep this week, and #infosec is already so deep in drama mode that it'd take a full Saturday morning to trace, so I just won't.
RT @marcan42@twitter.com
Full disclosure: @corelliumhq@twitter.com ported Linux to earlier iPhone chipsets a year ago, but their public code release does not meet upstream standards (nor can I certify it meets our RE policy) and I can therefore not use their work. Their CTO is mad at me for this.
I added a bunch of notes about CVE-2021-1647 to avpwn:
ICYMI you can use this with Ghidra 9.2.1 after you update extension properties ;)
RT @AdmVonSchneider@twitter.com
#BinDiff 6 is here.
For IDA 7.4 on Windows, Linux, macOS. If you're feeling lucky, try Ghidra 9.1.2 (https://github.com/google/binexport/tree/v11/java/BinExport).
Get yours here: https://zynamics.com/software.html
File bugs: https://bugs.zynamics.com/bindiff
Thanks everyone who tested pre-release binaries!
e7ce25c1850ecb96b6c5eef5662af98ee65a9ef724d8fd562ee23b05392b056e
6d881180f9566792625a2ebc9e5ea9cb981e2fca7e53efa2169c098e8e0e1d51
"I want to know the size of their shoes!" seemed like an impossible request from any spy movie spook before social media...
RT @donk_enby@twitter.com
https://gizmodo.com/parler-users-breached-deep-inside-u-s-capitol-building-1846042905
CVE-2021-1647 - Windows Defender RCE
Vector: Local
Exploitation Assessment: Exploitation detected
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1647
Snapshots FTW!
RT @nicolasbrulez@twitter.com
One simple trick to get decrypted code inside your IDB without writing (bothering) a decoding script
IDA Pro Debugger: Leveraging the Take Memory Snapshot Feature https://youtu.be/plaRysF1cxk via @YouTube@twitter.com
A drunken debugger