You know it's bad when Trump is involved in whatever manner
You know it's bad when Trump is involved in whatever manner
If you're interested in an example I have >25 years of professional software development experience - I wrote about how I use LLMs to write code in detail here simonwillison.net/2025/Mar/11/...
CVE-2024-55591 Fortinet FortiOS Authentication Bypass PoC github.com/watchtowrlab...
Cool investigation from Kela... But let's be a bit more.. nuanced... IntelBroker's actions have never "shaken both corporations and government entities alike."
www.kelacyber.com/blog/intelbr...
Threat actor Codefinger abuses publicly disclosed AWS keys with permissions to write and read S3 objects. By utilizing AWS native services, they achieve encryption in a way that is both secure and unrecoverable without their cooperation.
www.halcyon.ai/blog/abusing...
SCCMHound is a C# BloodHound collector for Microsoft Configuration Manager (MCM). If you're looking for a way to collect BloodHound session information from Configuration Manager's users and computers then this is the tool for you!
github.com/CrowdStrike/...
PendingFileRenameOperations + Junctions EDR Disable
github.com/rad9800/File...
Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation
oasis.security/resources/bl...
NSO Groupβs Pegasus Spyware Detected in New Mobile Devices
iverify.io/blog/iverify...
CVE-2024-11477 7Zip Code Execution Writeup and Analysis
github.com/TheN00bBuild...
Zabbix SQL injection in user.get API (CVE-2024-42327)
support.zabbix.com/plugins/serv...
The linpeas.sh version hosted at linpeas.sh is sending info to a remote server
github.com/peass-ng/PEA...
The Snowflake saga continue as one of the threat actors in the extortions may be a U.S. soldier
krebsonsecurity.com/2024/11/hack...
KrbRelayEx is a tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets.
github.com/decoder-it/K...
Merci pour ce rΓ©sumΓ© !
Still Russia could easily nuke the world many times over (so could the USA).
Fascinating story:
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
www.volexity.com/blog/2024/11...
π‘Did you know that #Hunters International provides a tool to their affiliates that allows them to leak stolen data on the brand storefront *without* uploading it anywhere and keeping it on their own servers? #Ransomware
Disclosure of 7 Android and Google Pixel Vulnerabilities
blog.oversecured.com/Disclosure-o...
Apple Confirms Zero-Day Attacks Hitting macOS Systems
www.securityweek.com/apple-confir...
Chromium is opensource.. So they will have to contribute more π
Leaked Documents Show What Phones Secretive Tech βGraykeyβ Can Unlock
www.404media.co/leaked-docum...