hex nomad (@hexnomad) 's Twitter Profile
hex nomad

@hexnomad

ID: 1526874374

calendar_today18-06-2013 06:01:44

604 Tweet

1,1K Followers

0 Following

chompie (@chompie1337) 's Twitter Profile Photo

microsoft: Exploit Code Unporoven me: i literally gave you a compiled PoC and also exploit code m$: No exploit code is available, or an exploit is theoretical. me:

Bill Demirkapi (@billdemirkapi) 's Twitter Profile Photo

Yuki Chen This happened. It turns out maintaining consistency at 4x-6x the previous volume is a really hard problem. Honestly, a misc CVE field is the least of my worries- inconsistencies in what's considered an "Important" vulnerability is what keeps me up at night 🥲

<a href="/guhe120/">Yuki Chen</a> This happened. It turns out maintaining consistency at 4x-6x the previous volume is a really hard problem. Honestly, a misc CVE field is the least of my worries- inconsistencies in what's considered an "Important" vulnerability is what keeps me up at night 🥲
Ivan Fratric 💙💛 (@ifsecure) 's Twitter Profile Photo

New Project Zero blog post by Sergei Glazunov and Mark Brand: Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models googleprojectzero.blogspot.com/2024/06/projec…

Michael Coppola (@mncoppola) 's Twitter Profile Photo

New blog post "Google: Stop Burning Counterterrorism Operations" My reflection on an incident where Project Zero and TAG knowingly shut down an active Western counterterrorism cyber operation, and the real-world harm that could have resulted from it. poppopret.org/2024/06/24/goo…

flawedworld | @flawedworld@infosec.exchange (@flawedworlddev) 's Twitter Profile Photo

Michael Coppola Skill issue. Such failures will be dealt with by moving to the next exploit chain and the next C2 server. TAG has the freedom to report on and/or patch any issues discovered by them. Poor SIGINT OPSEC is what the actual issue is, I expect better tradecraft from SIGINT operations.

Halvar Flake (@halvarflake) 's Twitter Profile Photo

The cynic in me is saying that if you are a secret agent on a counterterrorism mission, it's kinda your job not to have your secret equipment confiscated by the mall cop on the segway, so I think the lady doth protest too much. (Random subtweet)

Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

When embarking on a new vulnerability research project it is important to perform extensive background research into the area to gather as much info as possible to supplement and guide j00ru//vx describes these learning resources for the Windows Registry: googleprojectzero.blogspot.com/2024/06/the-wi…

Gabriel Landau (@gabriellandau) 's Twitter Profile Photo

Thanks to everyone who attended my REcon and BlueHat IL talks! The exploit and slides are here: github.com/gabriellandau/… If you took any photos during either of the talks, please share them here. Also, please don't hesitate to stop me to say hi!

Thanks to everyone who attended my <a href="/reconmtl/">REcon</a> and <a href="/BlueHatIL/">BlueHat IL</a> talks! The exploit and slides are here: github.com/gabriellandau/…

If you took any photos during either of the talks, please share them here.  Also, please don't hesitate to stop me to say hi!
Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Maybe companies shouldn’t have gotten rid of QA teams because “devs can write unit tests and that’s basically the same thing”?

Gryff & Lily’s Dad | 🍻🐐🍻 (@andrewofyfc) 's Twitter Profile Photo

After over a decade in cybersecurity I sometimes forget that a lot of tech probably has never heard of Crowdstrike (as is now apparent by all the posts) You’ve probably also not heard of Field Effect so here is your chance (no I don’t work for them) fieldeffect.com/blog/recoverin…

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

My take on this: “… appears to be starting a conversation about…” is corporate speak for “there’s nothing we can do about this and we’re waiting this out”. There’s currently no alternative to running Windows EDRs in kernel mode and there’s not going to be one any time soon.

Matt Holland (@notnotaspy) 's Twitter Profile Photo

In the wake of the CrowdStrike crash event, some interesting articles have been published that explore some perspectives of security vendors in the Windows kernel. I penned a blog for another perspective. Sean Endicott Davey Winder Andrew Cunningham fieldeffect.com/blog/the-brass…

chompie (@chompie1337) 's Twitter Profile Photo

I’m thrilled to share my latest blog post! This one focuses on the bug hunting process: inspiration, approach, and execution. I also provide a retrospective on how the bug was introduced and analyze the insufficient “patch”. Check it out: securityintelligence.com/x-force/little…

farmpoet (@f4rmpoet) 's Twitter Profile Photo

It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. 🧵