this is my short analysis of a little-known security feature built into Windows that inadvertently broke one of our authenticode signatures recently elastic.co/security-labs/…
Visiting NCC Group’s blogs right now feels like a CTF challenge: decipher the mangled text while dodging XSS pop-ups. Better to use web archive to see the original content but they have even changed the URLs!
Example:
nccgroup.com/research-blog/…
The fox-it.com etc are…
For every retweet of this post, I will donate £1 to the @VC_and_GC_Assoc up to £50,000.
Time is running out following @I_W_M’s decision to close the Lord Ashcroft Gallery.
Visit while you still can, to honour the bravery of those who risked so much to protect our great nation.
Since Nothing decided to ignore my report, I decided to release it publicly.
You can find the source code and full details here: github.com/R0rt1z2/fenrir
It only supports the Nothing Phone 2a for now but it should apply to more MediaTek devices from what I've seen so far.
Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available now at github.com/praetorian-inc…. If you're interested in developing malicious browser extensions give the code a look! #defcon#chromealone#malware
I wonder how many CS user have never thought about this - when you use explicit injection with an rDLL, what happens to it once it's finished? Nothing. It sits in memory until the process is closed.
Maybe some info at #defcon33 on Saturday, Track 3, 15:30 "Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug" https://t.co/3rnRMRh2J3
During my #BHUSA talk I've released many ETW research tools, of which the most notable is BamboozlEDR. This tool allows you to inject events into ETW, allowing you to generate fake alerts and blind EDRs.
github.com/olafhartong/Ba…
Slides available here:
github.com/olafhartong/Pr…
Tainting logs coming from ETW providers?
Absolutely! In many cases it can be done from an unelevated process in userland, depending on security descriptor set on ETW_GUID_ENTRY (taken from registry).
Impact? Sending fake events on behalf of almost any ETW provider, including…
not much info about it but:
🟥 CVE-2025-54982, CVSS: 9.6 (#Critical)
Zscaler SAML Authentication
A critical vulnerability due to improper verification of cryptographic signatures in Zscaler's SAML authentication mechanism, allowing authentication abuse.
#CyberSecurity#CVE…
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment.
Your own hands-on Entra lab for identity attack simulation.
Built for red teams, blue teams and identity nerds.
Check it out here👉github.com/semperis/entra…
For those looking for the @defcon@TheMeshtastic badge channel encryption keys, here you go:
DEFCONnect
OEu8wB3AItGBvzaxaSHh+5a3LlW/dCJ+nWr7SNZMsaE=
HackerComms
6IzsaoVhx1ETWeWuu0dUWMLqItvYJLbRzwgTAKCfvtY=
NodeChat
TiIdi8MJG+IRnIkS8iUZXRU+MHuGtuzEasOWXp4QndU=
hashcat v7.0.0 released!
After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had.
Detailed writeup is available here: hashcat.net/forum/thread-1…
1K Followers 2K FollowingThis 👉@obi_chezie got fried...but THE SHOW MUST GO ON! Health. Public Health. Tech. #LongCovid. Good governance; nothing less.
2 Followers 173 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/4NvHI5bovo
534 Followers 7K FollowingCybertection is your choice for all security software, but our specialty is always going to be antivirus software. We are your digital bodyguard.
28 Followers 921 FollowingLured the best beauties from all US states 😚
Ready for a 1 on 1 meeting
Nudes in profile! Watching this https://t.co/D8dohvvouh
4K Followers 5K FollowingAlleged GCHQ Operative/UK Mi5/6 Spy
Op Lovely Horse
#FVEY, @#TeamOrca
#WeAreNAFO,
Official member of the @churchofwifi,
#StandWithUkraine
My views are my own
680 Followers 799 FollowingWorking in the intersection of Data Science & InfoSec / I know more about x509 and TLS than your average person out walking their cat
find me @turbo.bsky.social
2K Followers 2K FollowingCISO and faculty by day, adversary emulation/tools by night, bad jokes and memes all the time.
Profile photo image credit to Tib3rius.
My dog disapproves.
1K Followers 2K FollowingCyber Ops on Channel 4's #Hunted and #CelebrityHunted TV shows | Ethical hacker / penetration tester / OSINT cyber-stalker at @NCCGroupInfosec | My own views
6K Followers 1K FollowingOfficial Twitter page for the Military Intelligence Museum. Learn about the history of British Military Intelligence, from the Boer War to the current day.
86K Followers 0 FollowingI report what I see. If it's good, it's good; if it's bad, it's bad. Does not depend on me. Make them release more awesome stuff. Don't shoot the messenger.
937 Followers 867 FollowingHacker, coffee drinker, film watcher. Former secretary of @AbertayHackers, now I break into containers and pipelines for @controlplaneio
4K Followers 409 FollowingCEO of World Cyber Health | Founder of @MalwareVillage | Creator of https://t.co/AKyp6xNeDy | Malware Researcher | Keynote | Banned from JSAC
4K Followers 1K FollowingSecurity researcher @TalosSecurity / Ex-Google TAG / Black Hat USA & HITCON Review Board / Organizer of @rhacklette41. My tweets are my own opinion.
10K Followers 156 Following🐴Pwnie Award Winning & Nation State funded psyop featuring 6 AI Anime Waifus and a Pup™ singing about APTs, Grifters, & Snake Oil in InfoSec
🖤🩷💚💙💜🤍
20K Followers 2K FollowingBlesma exists to guarantee that our limbless veterans are not failed, forgotten or left to fend for themselves. https://t.co/pdQgOXOOyL
5K Followers 2K FollowingEditor at @InfosecurityMag 👩💻
B2B journalist/editor for over a decade, started off in defence and now covering cybersecurity. DMs are open.
24K Followers 888 FollowingAuthor ‘Memory Makers: The Politics of the Past in Russia’ & ‘Russia’s War’ 📚 | Research Fellow @warstudies & @kcl_cgs | Senior Associate @CSIS |
5K Followers 0 FollowingNot sure if it’s bumsnorkling, then @bumsnorkler. It’s not sophisticated interpersonal influence, it’s sucking-up, brown-nosing or career laughing.
534 Followers 7K FollowingCybertection is your choice for all security software, but our specialty is always going to be antivirus software. We are your digital bodyguard.
65 Followers 280 FollowingInternet of Things and Operational Technology specialists. We provide penetration testing and hacker training and host an IoT cyber security podcast.
67K Followers 2 Followingrabbit is a consumer AI company making agents accessible on custom hardware — and tapping the unlimited possibility of AI. ⚙️ @rabbithelp_
No recent Favorites. New Favorites will appear here.