Today David Grusch, an individual who served 14 years with the United States Air Force and National Geospatial Intelligence Agency, testified under oath that the United States government possesses 'Unidentified Anomalous Phenomena' and has been reverse engineering it for decades
More info: https://www.cbsnews.com/news/ufo-hearing-congress-uap-takeaways-whistleblower-conference-david-grusch-2023/
More info: https://www.cbsnews.com/news/ufo-hearing-congress-uap-takeaways-whistleblower-conference-david-grusch-2023/
CBS News
UFO hearing key takeaways: What a whistleblower told Congress about UAPs
A former military intelligence officer-turned-whistleblower told House lawmakers that Congress is being kept in the dark about unidentified anomalous phenomena.
ðĪĢ48ðą14ð7ð5ðĪŊ5ðĨ4âĪ2âĪâðĨ1
Today haveibeenpwned announced they have acquired the Breached Forum database. An individual using the alias "breached_db" compromised Breached in November, 2022. This was when Pompompurin was the administrator.
This database leak exposes PII on 212,000 users.
This database leak exposes PII on 212,000 users.
ð57ðĪŊ19ð15ðĒ8
With Web Environment Integrity in Chromium (Chrome, Opera, Edge) it'll allow websites to determine whether a visitor is a human or a robot based off of hardware fingerprinting.
It is designed to enhance ad delivery capabilities.
https://twitter.com/nearcyan/status/1684242509847822336
It is designed to enhance ad delivery capabilities.
https://twitter.com/nearcyan/status/1684242509847822336
ðĪ42ðą18ðĒ16ðĪŊ8ð5ðĪĢ5ðŦĄ5âĪ2ð1ðŊ1
In the past month nerds have been complaining of a worm on Activision's MW2 (2009)
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
A shared sample shows a sideloaded 32bit dsound.dll with some silly strings. It hooks DirectSoundCreate8 and then begins to work
We have only briefly skimmed the file. We'll share the sample
ðą38ð10âĪ7ðĪ3ðĪŊ1
The sample is available on the vx-underground website. It is located under /Tmp/
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
Hash: CB000ABED31B92B4F3F895A633EF0FFAF01A1BE0DFC73619ACF98C1605A5999D
âĪ24ð6âĪâðĨ3ðĒ2
We're in the process of re-verifying our APT sample and paper collection while simultaneously renaming directory structures to improve legibility.
Behold! It is beautiful =D
Behold! It is beautiful =D
âĪ47ðĨ7ðĨ°3ðĪ2
CyberAv3ngers claim to has compromised Bazan Group, an oil refinery and petrochemicals company located in Haifa Bay, Israel.
âĪ107ðĪĢ37ðĨ25ðą10ðĪ6âĪâðĨ5ð4ðĒ3ðŦĄ3ð1
Benefits of joining the Infosec X (formerly Twitter) community
- Stay up to date with news
- Social network
- Become targeted by Threat Actors
- Establish & maintain bitter rivalries with people you'll never meet
- Stay up to date with news
- Social network
- Become targeted by Threat Actors
- Establish & maintain bitter rivalries with people you'll never meet
ðĪĢ118ðĨ°8ð7ðĪŠ6ðĨ4ð2ð1ðĪ1ðŊ1
We've updated the vx-underground Windows malware paper collection
-2012-02-14 - Stack Necromancy - Defeating Debuggers By Raising the Dead
-2019-06-19 - Combining Direct System Calls & sRDI
-2020-06-20 - Hiding Process Memory via Anti-Forensic Techniques
https://www.vx-underground.org/
-2012-02-14 - Stack Necromancy - Defeating Debuggers By Raising the Dead
-2019-06-19 - Combining Direct System Calls & sRDI
-2020-06-20 - Hiding Process Memory via Anti-Forensic Techniques
https://www.vx-underground.org/
ð15ð5