Written by 妖怪March 30, 2019 [EN] Down the Rabbit Hole – Part II: Analyzing an EFI Application with Radare2 | erfur’s bits&pieces https://erfur.github.io/down_the_rabbit_hole_pt2/
Written by 妖怪March 30, 2019 [EN] Down the Rabbit Hole – Part I: A Journey into the UEFI Land | erfur’s bits&pieces https://erfur.github.io/down_the_rabbit_hole_pt1/
Written by 妖怪March 30, 2019 Let’s play with Qulab, an exotic malware developed in AutoIT – Fumik0_’s box https://fumik0.com/2019/03/25/lets-play-with-qulab-an-exotic-malware-developed-in-autoit/
Written by 妖怪March 30, 2019 Updated Analysis of PatchGuard on Microsoft Windows 10 RS4 : (pdf) cc https://t.co/5BJoCskBnh https://t.co/WMYIsF3HAO
Written by 妖怪March 30, 2019 GitHub – CrowdStrike/automactc: AutoMacTC: Automated Mac Forensic Triage Collector https://github.com/CrowdStrike/automactc
Written by 妖怪March 30, 2019 Flaws in 4G and 5G could allow attackers to launch DoS attacks and track location : (pdf) https://t.co/2P8x1Nq81n
Written by 妖怪March 30, 2019 36 vulnerabilities in LTE 4G standard could enable data interception : (pdf / Report) https://t.co/GhLIaoggeL
Written by 妖怪March 30, 2019 Tesla Model 3 keeps data like crash videos, location, phone contacts https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html
Written by 妖怪March 30, 2019 icmp-reachable https://www.synacktiv.com/posts/systems/icmp-reachable.html
Written by 妖怪March 30, 2019 905940 – OOB Write in ValueDeserializer::ReadDenseJSArray (Tian Fu Cup exploit) – chromium – Monorail https://bugs.chromium.org/p/chromium/issues/detail?id=905940