I love my awesome friends' awesome research:
www.labs.greynoise.io/grimoire/202...
I love my awesome friends' awesome research:
www.labs.greynoise.io/grimoire/202...
defcon 33 main stage sunday aug 10 noon - flyer with sick ascii by x0 and aNACHRONiST
Are you going to @defcon.bsky.social??
We'll be giving away 9500 print copies of Phrack!
Come by main stage Sunday @ noon to see @vacci.ne @richinseattle.bsky.social and chompie talk hacker history! This will mark the first time Phrack staff appear together on DEF CON’s main stage.
A vulnerability in a Signal-based enterprise messaging app could expose plaintext usernames and passwords via an unauthenticated memory dump. We're seeing exploit attempts in real time. Full analysis ⬇️ #Cybersecurity #ThreatIntel #GreyNoise
Flyer for the Phrack 40th anniversary edition CFP. It contains the text of the CFP at phrack.org, with additional text "CFP EXTEND!! Papers due June 15 2025" and "Phrack Since 1985"
We heard you needed some more time, so we wanted to let you cook.
We decided to push the Phrack 72 CFP deadline back until June 15th.
Stay tuned for upcoming Phrack events.
Print this flyer out and give it to someone IRL!!
Phrack Graffiti Logo
Reminder that the Phrack 72 CFP closes APRIL 1ST 2025. Get your papers in and come be a part of our fabulous 40th anniversary issue!
See phrack.org for more info
checkmate
Nice try, AI. That ain't raw chicken. That would be a number of perfectly baked rotisserie chickens there. Further, person in the bathtub isn't "bathing chickens." They're making butt chicken soup. A rare and highly sought-after piece of Florida cuisine.
A news story from today: Headline: Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection during malware distribution. Attackers are leveraging ephemeral port 60102, typically reserved for temporary communications, as a service port for covert malware transmission. This approach bypasses traditional monitoring systems, which often focus on scanning standard service ports such as 80 or 443.
I don't want to scare y'all, but I just checked the @greynoise.io sensor logs and found over 1000 sessions in the last hour that used this sophisticated technique (ie, attempted to download malware over ephemeral ports)!!
variety.com/2024/film/ne...
RIP Action Jackson.
Bummer, I really liked him.
THIS BUILDING IS NOT EMPTY IT IS FULL OF BATS sign on door
might as well say “please open me”
I must have one
We are expanding our honeypot sensor feeds to include reporting of IPs scanning or exploiting IKEv2 (Internet Key Exchange) services: shadowserver.org/what-we-do/n... May include Zyxel CVE-2023-28771 -CVSS 9.8 RCE
IKEv2 scanner tracker (~800 src IPs/day): dashboard.shadowserver.org/statistics/c...
Relieved I didn't get that butterfly silhouette tattoo
I wrote dis blog for work:
www.labs.greynoise.io/grimoire/
(・–・;)ゞ
In our latest Labs blog, researcher @h0wdy.bsky.social delves into the power of GreyNoise EAP Sensors to unearth a new PoC for CVE-2023-47246. Learn how dynamic honeypots are crucial in the fight against emerging threats. 🍯📡
king of the hill sailor moon mashup image
gangalang
Time for an Arm-twist! CVE-2023-4039
Tom Hebb (Meta red team) and I discovered an 0day in GCC (for AArch64 targets) during my Arm exploitation training.
It renders stack canaries against overflows of dynamically-sized variables useless.
developer.arm.com/Arm%20Securi...
Who else up assembling they arm? 🦾
Now your smart home can know if the cops show up:
github.com/lozaning/Hom...
T-shirt art I did some time ago for the fine folks at Exhumed Films. They've been doing 35mm horror movie screenings/events for years in NJ/PA. This Oct 21st in Phoenixville, PA is their infamous 24-hr horror marathon.
Tix might still be available, go if you can. www.facebook.com/ExhumedFilms
GreyNoise Labs has launched! 🚀 Your new go-to destination for in-depth explorations into our security research projects, data science initiatives, and cutting-edge concepts in detection engineering. 🧪
Android ginger read easter egg, painted by Jack Larson, depicts bugdroid next to a monster gingerbread person surrounded by zombies on cell phones.
Friendly reminder that Easter eggs exist in android and the first one they ever did was for gingerbread, and it is the best one.
Drop something blue from your gallery
Lol. This prompts for a translation
Oh shit! Hey! What's up? Damn... wasn't expecting a reply... this is awkward 😬
Hello, friends! My cat, husky, and I r planning a trip out west! Taking recs on places to visit and sleep along the way! Here's the full post: haunted.computer/@h0wdy/11105...
Pls feel free to reach out!:) I would rather have too much to do than too little!
what a lovely day, I sure hope nothing bad happens
flamin’ alaskan call that garson arson
greynoise written in blood on doom wall texture
ghostie greynoise logo over cursed barney cirno doom wad
pretty stoked about the new gn merch drop... [words r my own and not my employers]