Hey @TimiHealth@twitter.com. You might want to check your email. I'm going to hazard a guess and say this is probably not good.
IBM X-Force details new "warshipping" technique that relies on criminal groups shipping packages with malicious WiFi equipment within a company's network range, so they can perform wireless attacks on the internal network
Captain, we've detected a disturbance in space-time. It's coming from Earth. Someone audited the Kubernetes source • The Register https://www.theregister.co.uk/2019/08/06/kubernetes_security_audit/
You can turn a cheap rpi0w into a plug and play ethernet gadget to upgrade any device to a pentest platform. Nexmon allows monitor mode on the default WiFi running @firstname.lastname@example.org and its web UI. Boots in seconds, deauths and gets handshakes like a mf 😬
Interesting: ‘“GitHub knew or should have known that obviously hacked data had been posted to http://GitHub.com,” […] The plaintiffs believe that because Social Security numbers had a fixed format, GitHub should have been able to identify and remove this data’ https://twitter.com/jedisct1/status/1157981338726785025
Thanks to @SentinelOne@twitter.com @email@example.com, my free ebook of How To Reverse #macOS Malware is now available. Learn to set up a safe #Mac test lab, find #malware samples, static + dynamic analysis. eBook is free; tools you need are free. 😁https://go.sentinelone.com/ebook-macos-reversing-malware-registration.html
NIST has released a new document around best practices on MFA/Risk based auth. for e-commerce: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-17.pdf
(Bonus: it aligns with SP-800-63 and is really detailed architecture-wise)
PowerHub : A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting : https://github.com/AdrianVollmer/PowerHub/
A new @firstname.lastname@example.org is OUT! https://okt.to/ZoTCWB @email@example.com Project Update - colo upgrade, future trends, resuming ZFS send, realtime bandwidth terminal graph visualization, fixing telnet fixes, a chapter from the FBI’s history with @firstname.lastname@example.org and an OpenSSH vuln.
usbrip : Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux : https://github.com/snovvcrash/usbrip
Being an intern in a Malware team 😄 https://twitter.com/blackorbird/status/1155781572718546944
I made a GZIP file that infinitely contains itself! Includes a self-referencing CRC~
(remove backslash as I don't want to be banned for spreading zip bombs lol)
Want to know how to make one yourself?
A new @email@example.com is OUT! https://okt.to/6UXJ87 Replacing a (silently) failing disk in a ZFS pool, @OPNsense@twitter.com 19.7 RC1, implementing DRM ioctl support for @NetBSD@twitter.com, high quality/low latency VOIP server with umurmur/Mumble on @OpenBSD@twitter.com, PDP-7 where Unix began, LLDB watchpoints, & more.
💬🛡️ [@firstname.lastname@example.org] This year again, our senior security researcher @email@example.com will give a talk at #DEFCON about #BLE. 10 August, 12:00 #LASVEGAS time 🇺🇸. #DefCon27 #ds2019
More info: https://bit.ly/2XQtMt2
PEpper : An open source script to perform malware static analysis on Portable Executable : https://github.com/Th3Hurrican3/PEpper
This is JoAnn Morgan, the instrumentation controller for #Apollo11. 🚀
JoAnn was the only woman in the launch firing room for the Apollo 11 liftoff. https://www.nasa.gov/feature/the-story-of-joann-morgan