You are here |
halestrom.net | ||
| | | |
malwaretech.com
|
|
| | | | It seems that the bootstrap code is just scattered around various memory addresses and there's no simple way to dump all of it, so i decided to just dump a chunk of memory from 0x00000000 and look for any reference to addresses outside of that chunk (allowing me to build up a basic map of the code). Although the exact addresses vary between disk models, my layout should give you a good idea where to look. | |
| | | |
puri.sm
|
|
| | | | Purism makes premium phones, laptops, mini PCs and servers running free software on PureOS. Purism products respect people's privacy and freedom while protecting their security. | |
| | | |
reverse.put.as
|
|
| | | | Today a local privilege escalation vulnerability was disclosed in this blog post. It describes a vulnerability in IOBluetoothFamily kernel extension (IOKit is a never-ending hole of security vulnerabilities). Mavericks and most probably all previous versions are vulnerable but not Yosemite. The reason for this is that Apple silently patched the bug in Yosemite. This is not a new practice, where Apple patches bugs in the latest and newly released OS X version and doesn't care about older versions. | |
| | | |
www.seqrite.com
|
|
| | Seqrite Labs uncovers Silent Lynx, a new APT group targeting government entities in Kyrgyzstan and neighboring nations. This in-depth analysis explores their campaigns, including malicious ISO files, C++ loaders, PowerShell scripts, and Golang implants, leveraging Telegram for command and control. |