GuardDog: Identifying malicious PyPI packages using static code analysis and package metadata analysis
π£thorn42
π@malwr
π£thorn42
π@malwr
Datadoghq
Finding malicious PyPI packages through static code analysis: Meet GuardDog
GuardDog is an open-source tool to identify malicious PyPI packages through source code and metadata analysis
Framework Proposal to Regulate Lawful Hacking by Police within Criminal Investigations - PhD dissertation
π£digicat
π@malwr
π£digicat
π@malwr
Proquest
Framework Proposal to Regulate Lawful Hacking by Police within Criminal Investigations - ProQuest
Explore millions of resources from scholarly journals, books, newspapers, videos and more, on the ProQuest Platform.
Emulate Any ISA Card With A Raspberry Pi And An FPGA
π£r_retrohacking_mod2
Hoping for a model that could emulate a real 3DFx
π€RetroBastardo
comments in the article are more interesting, specially RP2040 based ISA cards
π€incrediblediy
If you already have the FPGA, maybe you could use that instead of the Pi?
π€Dwedit
π@malwr
π£r_retrohacking_mod2
Hoping for a model that could emulate a real 3DFx
π€RetroBastardo
comments in the article are more interesting, specially RP2040 based ISA cards
π€incrediblediy
If you already have the FPGA, maybe you could use that instead of the Pi?
π€Dwedit
π@malwr
Hackaday
Emulate Any ISA Card With A Raspberry Pi And An FPGA
One of the reasons the IBM PC platform became the dominant standard for desktop PCs back in the mid-1980s was its open hardware design, based around what would later be called the ISA bus. Any manuβ¦
A vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco Secure Manager Appliance and Cisco Email Security Appliance
π£SSDisclosure
π@malwr
π£SSDisclosure
π@malwr
SSD Secure Disclosure
SSD Advisory β Cisco Secure Manager Appliance remediation_request_utils SQL Injection Remote Code Execution - SSD Secure Disclosure
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco Secure Manager Appliance and Cisco Email Security Appliance.
FTKimager unable to run and is a gear icon.
Need to use the application as a my university project but unable to run on ubuntu (latest version as at 17/11/2022, donβt remember the version).
I downloaded a compatible ftkimager from accessdata and did an extraction via terminal.
But my application is unable to run no matter how much I click on it and itβs a gear icon instead of icon that says AD.
Itβs frustrating that I couldnβt find anything to resolve this issue on the internet.
Screenshots: https://imgur.com/a/EsiwovI
π£AlienDumpling
Hey u/AlienDumpling \- FTK Imager for Linux is very different from the Windows version. The Linux version is only a command-line application, it must be run from the terminal.
Based on the screenshot you linked, it appears 'ftkimager' is in your /usr/local/bin directory, so you should just be able to run 'ftkimager' in the terminal to see the command help.
π€tobraha
π@malwr
Need to use the application as a my university project but unable to run on ubuntu (latest version as at 17/11/2022, donβt remember the version).
I downloaded a compatible ftkimager from accessdata and did an extraction via terminal.
But my application is unable to run no matter how much I click on it and itβs a gear icon instead of icon that says AD.
Itβs frustrating that I couldnβt find anything to resolve this issue on the internet.
Screenshots: https://imgur.com/a/EsiwovI
π£AlienDumpling
Hey u/AlienDumpling \- FTK Imager for Linux is very different from the Windows version. The Linux version is only a command-line application, it must be run from the terminal.
Based on the screenshot you linked, it appears 'ftkimager' is in your /usr/local/bin directory, so you should just be able to run 'ftkimager' in the terminal to see the command help.
π€tobraha
π@malwr
Imgur
Discover the magic of the internet at Imgur, a community powered entertainment destination. Lift your spirits with funny jokes, trending memes, entertaining gifs, inspiring stories, viral videos, and so much more from users.
MITRE Engenuity Publishes First-Ever ATT&CK Evaluations of Security Service Providers
π£mrkoot
π@malwr
π£mrkoot
π@malwr
MITRE
MITRE Engenuity Publishes First-Ever ATT&CK Evaluations of Security Service Providers | MITRE
The findings highlight results across 16 providers and assess provider capabilities in their ability to analyze and describe adversary behavior and to deliver threat-informed defense capabilities.
WASP Attack on Python β Polymorphic Malware Shipping WASP Stealer; Infecting Hundreds Of Victims
π£jnazario
π@malwr
π£jnazario
π@malwr
Medium
WASP Attack on PythonβββPolymorphic Malware Shipping WASP Stealer; Infecting Hundreds Of Victims
In early November, several malicious packages were reported by Phylum and CheckPoint. We link these two reports to the same attacker withβ¦
Vulnerability Management at Lyft: Enforcing the Cascade [Part 1](https://eng.lyft.com/vulnerability-management-at-lyft-enforcing-the-cascade-part-1-234d1561b994)
π£jnazario
π@malwr
π£jnazario
π@malwr
Medium
Vulnerability Management at Lyft: Enforcing the Cascade [Part 1]
Vulnerability Management at Lyft: Enforcing the Cascade - Part 1 Abstract Over the past 2 years, weβve built a comprehensive vulnerability management program at Lyft. This blog post will focus on β¦