A great analysis of resident key challenges with UAF: https://fy.blackhats.net.au/blog/2023-02-02-how-hype-will-turn-your-security-key-into-junk/
PSA: If you are using AWS Aurora PostgreSQL 15.2 on aarch64 (r6g, etc) your servers may randomly abort with `PANIC: queueing for lock while waiting on another one`: https://github.com/postgres/postgres/blob/f4c00d138f6dea4c9d8af8ec280b7edc9b0a29e1/src/backend/storage/lmgr/lwlock.c#L1074
Google Domains is shutting down after selling the business to Squarespace... any great registrar recommendations? https://9to5google.com/2023/06/15/google-domains-squarespace/
Congrats to the Gandi investors on their sale. Thanks for posting such a comprehensive list of price increases too! https://www.gandi.net/static/documents/2023-july-usd-renew-price-increase.pdf
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away:
https://arstechnica.com/information-technology/2023/06/hackers-can-steal-cryptographic-keys-by-video-recording-connected-power-leds-60-feet-away/I love these kinds of attacks. Via @dangoodin at @arstechnica
#reconmtlThis #reconmtl talk by Ang Cui looks epic: Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot https://cfp.recon.cx/2023/talk/HCJHBW/
(coverage at https://www.theregister.com/2023/06/09/cold_boot_ram_theft/ by @thomasclaburn)
A little cheeky of PrinterLogic to warn against PrintNightmare vulnerabilities after this savage thrashing on full-disclosure: https://seclists.org/fulldisclosure/2023/May/16
Shodan is only showing ~15 on the internet at least: https://www.shodan.io/search?query=title%3Aprinterlogic
The @runZeroInc query is similar: https://console.runzero.com/inventory/services?search=_asset.protocol%3Ahttp%20protocol%3Ahttp%20%28html.title%3A%3D%22Printer%20Logic%22%20OR%20favicon.ico.image.md5%3A%3Dab2fc8886bfbf3e986f8015539d29736%29
hat tip to @campuscodi for flagging at https://riskybiznews.substack.com/p/risky-biz-news-iranian-hacktivists (and @riskydotbiz for the mention)
#moveit #cve_2023_34362Fun times this week coming up with a @runZeroInc query for the actively-exploited MOVEit SQL injection vulnerability:
https://www.runzero.com/blog/finding-moveit-file-transfer-services/Nicky Mouha just posted a follow-up to his work on the SHA-3 reference implementation buffer overflow from last year: https://mouha.be/sha-3-buffer-overflow-part-2/
Excellent reporting by @dangoodin : Critical Barracuda 0-day was used to backdoor networks for 8 months https://arstechnica.com/information-technology/2023/05/critical-barracuda-0-day-was-used-to-backdoor-networks-for-8-months/ ... and who says Perl isn't relevant anymore =D
Copyright 1998-2025 HD Moore