Decompiling x86 Deep Neural Network Executables
🗣mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
👤WarrantyVoider
🎖@malwr
🗣mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
👤WarrantyVoider
🎖@malwr
GitHub
GitHub - monkbai/DNN-decompiler: BTD - Bin To DNN: A DNN Executables Decompiler
BTD - Bin To DNN: A DNN Executables Decompiler. Contribute to monkbai/DNN-decompiler development by creating an account on GitHub.
IDA Free 8.1 released:
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
🎖@malwr
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
🎖@malwr
👍3
Cybersecurity expert analysis about security vulnerabilities that alters exposed NGINX config files
🗣cheeztoshobo
🎖@malwr
🗣cheeztoshobo
🎖@malwr
Criminal IP
Knowledge Hub | Criminal IP
The Knowledge Hub for Criminal IP users, featuring case studies, webinars, white papers, and videos. Explore and utilize the materials you need.
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
🗣monoimpact
Nice chaining. And I've now a headache after reading it.
👤hinterzimmer
🎖@malwr
🗣monoimpact
Nice chaining. And I've now a headache after reading it.
👤hinterzimmer
🎖@malwr
Sonarsource
Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)
We discovered multiple vulnerabilities in Checkmk, which can be chained together by an unauthenticated, remote attacker to fully take over a vulnerable server.
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
BlackBerry
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom
The threat actor known as RomCom is actively deploying new campaigns aimed at victims in Ukraine and English-speaking regions. The BlackBerry Threat Research and Intelligence Team discovered new campaigns that spoof popular brand-name software packages. The…
👍2
Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Phylum Research | Software Supply Chain Security
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
Last week, our automated risk detection platform alerted us to suspicious activity in dozens of newly published PyPI packages. Here's what we uncovered.
👍3
U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud | USAO-SDNY
🗣digicat
>today remains the Department’s second largest financial seizure ever
What's the biggest?
👤RamblinWreckGT
Wait...
He technically did nothing wrong. He stole from scumbags. Just because it's tainted doesn't mean he should go to jail. Holy shit.
👤asecuredlife
Infinite money glitch irl:
- Create anonymous account on darknet market
- Exploit race condition to steal bitcoin (You could double spend if you do it fast)
- Quickly transfer bitcoin through a chain of addresses to hide source.
- Wait for hard fork to double your money
- ~~Make stupid opsec fails that lead to you getting caught~~
- Profit.
👤NullVoidPointer
🎖@malwr
🗣digicat
>today remains the Department’s second largest financial seizure ever
What's the biggest?
👤RamblinWreckGT
Wait...
He technically did nothing wrong. He stole from scumbags. Just because it's tainted doesn't mean he should go to jail. Holy shit.
👤asecuredlife
Infinite money glitch irl:
- Create anonymous account on darknet market
- Exploit race condition to steal bitcoin (You could double spend if you do it fast)
- Quickly transfer bitcoin through a chain of addresses to hide source.
- Wait for hard fork to double your money
- ~~Make stupid opsec fails that lead to you getting caught~~
- Profit.
👤NullVoidPointer
🎖@malwr
www.justice.gov
U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure
Create Emergency Access Accounts for AAD and Use Log Analytics to Monitor Sign-ins from them
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
TECHCOMMUNITY.MICROSOFT.COM
Create Emergency Access Accounts for Azure AD and Use Log Analytics to Monitor Sign-ins from Them
As part of your cloud BCDR processes, make sure you have a solid emergency accounts process and automation watching for sign-in attempts from those emergency..