rabidsecurity.bsky.social
@rabidsecurity.bsky.social
Reposted
Cicada Walkthrough — HackTheBox
Cicada Walkthrough — HackTheBox
An Easy Windows Machine
infosecwriteups.com
February 16, 2025 at 2:19 PM
You get a prize and you get a prize..... "Security through Transparency" vs "Security through Obscurity" and it's upfront promise to expose risk early in the production lifecycle. www.theregister.com/2025/01/16/r...
Raspberry Pi awards prizes for the RP2350 Hacking Challenge
Power-induced glitches, lasers, and electromagnetic fields are all tools of the trade
www.theregister.com
January 16, 2025 at 11:11 PM
Defense-in-Depth is good for generative AI too. Ask Microsoft's Red Team.... www.microsoft.com/en-us/securi...
3 takeaways from red teaming 100 generative AI products | Microsoft Security Blog
The growing sophistication of AI systems and Microsoft’s increasing investment in AI have made red teaming more important than ever. Learn more.
www.microsoft.com
January 15, 2025 at 11:05 PM
Reposted
step 1. open the terminal

step 2. type the following command:

echo '[q]sa[ln0=aln256%Pln256/snlbx]sb5567320342535949633984860024054390510049758475925810612727383477870370412074937779308150930912981042snlbxq'|dc

step 3. enjoy!
January 7, 2025 at 5:51 PM
Reposted
"Two ways of Rooting All Qualcomm based Android phones" (slides)

powerofcommunity.net/poc2024/Pan%...

#infosec #android
January 11, 2025 at 11:24 AM
news.yahoo.com/chinese-hack.... Cause legacy infrastructure and mature nation state weaponization are always a reason to be salty!
Chinese hackers used broad telco access to geolocate millions of Americans and record phone calls
The number of telecommunication providers impacted by the massive Salt Typhoon breach is now up to nine, deputy national security adviser for cyber and emerging technology Anne Neuberger confirmed.
news.yahoo.com
December 29, 2024 at 7:56 PM
Reposted
Quantum Computing Advances in 2024 Put Security In Spotlight
Quantum Computing Advances in 2024 Put Security In Spotlight
www.darkreading.com
December 27, 2024 at 2:12 PM
Reposted
Introduction to Linux kernel fuzzing and vulnerability research

Part 1: slavamoskvin.com/hunting-bugs...
Part 2: slavamoskvin.com/finding-bugs...
Part 3: slavamoskvin.com/finding-bugs...

#Linux #cysersecurity
December 26, 2024 at 2:59 PM
Reposted
Malware reverse engineering. Introduction for beginners

Part 1: intezer.com/blog/malware...
Part 2: intezer.com/blog/inciden...

#malware #infosec
December 26, 2024 at 3:02 PM
Reposted
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts
thehackernews.com
December 24, 2024 at 1:51 PM
Reposted
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
thehackernews.com
December 23, 2024 at 2:21 PM
Reposted
I want him 🥹
December 22, 2024 at 9:50 PM
Reposted
Embedded hardware and firmware reverse engineering (Kekz Headphones)

nv1t.github.io/blog/kekz-he...

#reverseengineering #infosec
December 22, 2024 at 1:14 PM
Reposted
🎯A small Cool Innovation:
A cheap, easy-to-use surgical product that makes a big impact

Orthopedics operation positioning sticker
December 22, 2024 at 4:30 AM
Reposted
How To Find a Directory On #Linux Based System - nixCraft www.cyberciti.biz/faq/howto-fi...
How To Find a Directory On Linux Based System
This tutorial explains how to find a directory on Linux based server or desktop using the find command line option.
www.cyberciti.biz
January 5, 2024 at 3:44 PM
Reposted
Christmas song for #UNIX or #Linux hackers <3 #programming #devlife #SysAdmin
December 18, 2024 at 2:41 AM