Realized from this and some other conversations that this was a bit implicit in my original argument. Added a section about this to my post: sunshowers.io/posts/on-poi...
06.12.2025 20:17 โ ๐ 12 ๐ 1 ๐ฌ 1 ๐ 0
@gzobra.bsky.social
Previously Blue team, now more on the Threat Intel side and interested by OSINT. Learning ARM reverse engineering for fun. Books and Music when possible. Opinions are my own. Reposts are not endorsements.
Realized from this and some other conversations that this was a bit implicit in my original argument. Added a section about this to my post: sunshowers.io/posts/on-poi...
06.12.2025 20:17 โ ๐ 12 ๐ 1 ๐ฌ 1 ๐ 0New post: a defense of lock poisoning in Rust.
Followup to recent discussion: decided to write about lock poisoning, looking at the arguments on each side, and informed by our experience at @oxide.computer dealing with the parallel problem of unexpected async cancellations
Please give it a read!
Voila les tabs ouverts depuis ?? que "je laisse pour plus tard"ยฉ
bit.ly/m/CaffeineOS
github.com/xen-project/...
www.linuxfromscratch.org/hints/downlo...
ntk148v.github.io/posts/linux-...
rayanfam.com/topics/hyper...
www.moritz.systems/blog/before-... (carafe, triste)
github.com/Torwang1/lin...
1/n
J'hรฉsite entre merci pour ce partage d'infos et non merci pour la perte de temps libre en consรฉquence ๐
J'ai cherchรฉ sur wayback machine, il y a plusieurs archives de l'article que tu mentionnais comme perdu
web.archive.org/web/20250416...
New Blog: This will be my last blog of 2025. And since we are close to the Xmas holidays kids will probably spend hours scrolling on their phones.
Read the blog here : THE ALGORITHMIC ANXIETY MACHINE | You can expose the social media algorithm dangers with OSINT www.dutchosintguy.com/post/the-alg...
Donโt forget the OpenBSD variant and socat(1)
06.11.2025 17:48 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0New podcast episode drops next week ๐๏ธ Principal Security Consultants Oddvar Moe and Hans Lakhan are joining to talk footprint discovery for red teamers. Listen wherever you get your podcasts... just search for "Security Noise" and subscribe today!
31.10.2025 18:00 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0Thank you
Also thank you to @simonwillison.net
@simonwillison.net
Hello
May i ask you if you have evaluated the power efficiency of the nvidia dgx spark ?
Or any electricity or power measure while it is loaded with models ?
Credential Guard was supposed to end credential dumping. It didn't.
Valdemar Carรธe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.
Read for more: ghst.ly/4qtl2rm
The recording of our (CC @nicolo.dev ) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl.bsky.social is now online!
Recording: www.youtube.com/watch?v=QxSG...
Slides: synthesis.to/presentation...
#BinaryNinja Plugin: github.com/mrphrazer/ob...
And there is a DeLorean DMC-12 too ๐
10.10.2025 17:42 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0The web leaves clues. EyeWitness collects receipts. Gather information from web services in a whole new way with @redsiege.com's EyeWtiness!
Chris Traynor breaks down the tool so you can add it to your aresnal!
Download it on Github -- github.com/RedSiege/Eye...
Drasi turns 1! ๐
We launched Drasi to make change-driven systems easierโand now weโre adding GQL support for continuous queries alongside openCypher. This means more flexibility and a future-proof path for graph-based apps.
opensource.microsoft.com/blog/2025/10...
Storm-1175, a financially motivated actor known for deploying Medusa ransomware & exploiting public-facing applications, was observed exploiting the CVE-2025-10035 vulnerability in GoAnywhere MFT's License Servlet. Read our analysis & get detection+hunting guidance: msft.it/63325sIfZZ
06.10.2025 17:12 โ ๐ 6 ๐ 5 ๐ฌ 1 ๐ 0LUTINOS! ร vous la beautรฉ des (vrais) microsevices, le live d'hier soir est en ligne et il vous apprendra *ENFIN* ร crรฉer facilement votre propre microvm NetBSD qui dรฉmarre... ce que vous voulez.
Enjoy youtu.be/yiWTi18oG8M et partagez vos expรฉriences !
๐ฑ Silent Smishing: The Hidden Abuse of Cellular Router APIs
Our latest #CTI investigation from Sekoia #TDR team uncovers a novel #smishing vector abusing Milesight industrial cellular router APIs to send phishing #SMS at scale.
blog.sekoia.io/silent-smish...
Now, i will work on studying device registration threats and hardening or detection
27.09.2025 09:15 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0I watched it today: very well explained.
And using the graph to explain what threat actors may try and what defenders may harden is a super idea.
๐๐๐
รa y est, notre hors-sรฉrie consacrรฉ au pentest mobile est disponible en kiosque !
Vous pouvez รฉgalement le retrouver en version numรฉrique ou le commander en papier (les ports sont offerts) sur boutique.ed-diamond.com/nouveautes/1....
#pentest #iOS #android #cybersรฉcuritรฉ
@drazuread.com
Hello,
I read your slides from OrangeCon. Many information(CAE, CAP, Token protection) in it,very informative. I know what to search for and what to learn now.
I will watch the video if it is published.
Thank you
Arghhhhhhhh, le jour oรน je pars en Europe centrale pour le $TAF
20.09.2025 18:42 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0Beyond good olโ Run key, Part 151
www.hexacorn.com/blog/2025/09...
Read the recent part 2
blog.nns.ee/2025/04/01/m...
@lefinnois.bsky.social je suis maintenant curieux de savoir si cโest vrai.
15.09.2025 17:25 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0รa y est, imil va encore changer le noyau pour ne plus appeler init.
Il noyaute NetBSD je vous dit!
This week, the Bonus Drop features a practical example of using Python data loaders in Observable Notebooks 2.0. They enhance notebook performance by executing code in advance, facilitating access to diverse data formats.
dailydrop.hrbrmstr.dev/2025/09/14/b...
Even with HTTPS, Windows Server Update Services can be abused if attackers obtain a trusted certificate, allowing authentication relay. In our latest blog, Austin Coontz explains how WSUS traffic can be found and abused, and what sparked his investigation. Read now!
trustedsec.com/blog/wsus-is...
Password-spray detection typically relies on correlating failed logins over time, but this often leads to false positives. In our latest blog, Sean Metcalf shares how to detect password-spraying more accurately by leveraging a honeypot account. Read it now!
trustedsec.com/blog/detecti...
Thereโs been some confusion around what exactly WhatsAppโs โAdvanced Chat Privacyโ option does, so we dug in to see exactly how it works. www.eff.org/deeplinks/2...
06.09.2025 14:01 โ ๐ 69 ๐ 22 ๐ฌ 2 ๐ 2