https://secret.club/2023/12/24/riscy-business.html
RISC-Y Business: Raging against the reduced machine
RISC-Y Business: Raging against the reduced machine
secret club
RISC-Y Business: Raging against the reduced machine
Abstract In recent years the interest in obfuscation has increased, mainly because people want to protect their intellectual property. Unfortunately, most of what’s been written is focused on the theoretical aspects. In this article, we will discuss the practical…
Order of Six Angles
я чуть не охуел дебаггер сам взял сменил себе иконки на новогодние
merry christmas! ебать время летит
Order of Six Angles
*чуть обновил https://www.orderofsixangles.com/art
пришла физическая копия моего нфт 🤯
This media is not supported in your browser
VIEW IN TELEGRAM
Коротко о моей ленте твиттера: 99% коты, 1% иб
Operation Triangulation:
What You Get When Attack iPhones of Researchers
https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
What You Get When Attack iPhones of Researchers
https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
media.ccc.de
Operation Triangulation
Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the a...
Order of Six Angles
Operation Triangulation: What You Get When Attack iPhones of Researchers https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
X (formerly Twitter)
Boris Larin (@oct0xor) on X
Thanks to marcan (https://t.co/sDwlE7Wq6T) and @zhuowei (https://t.co/EzBvk4cNBY) now we know the original purpose for this unknown hardware feature. Its MMIO debug registers for GPU L2 cache. I am really excited that we are very close to solving this mystery!
Order of Six Angles
https://x.com/oct0xor/status/1740543898022547780?t=pf-q9JPpQbqzllx_qwLTeQ&s=35
по слухам, генерал цру лично позвонил тиму куку и попросил адреса дебаг регистров (шутка)
Breaking Fortinet Firmware Encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
https://bishopfox.com/blog/breaking-fortinet-firmware-encryption
Bishop Fox
Breaking Fortinet Firmware Encryption
Review our latest Fortinet analysis that breaks encryption on firmware images, leading to improved detection, fingerprinting, and exploit development.
Retro Gaming Vulnerability Research: Warcraft 2
https://research.nccgroup.com/2023/12/19/retro-gaming-vulnerability-research-warcraft-2/
https://research.nccgroup.com/2023/12/19/retro-gaming-vulnerability-research-warcraft-2/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.