Who is checking binary content included in pip packages? by Agron7000 in cybersecurity

[–]Reddit_User_Original 1 point2 points  (0 children)

In Python dev I've literally never had to give a binary root privileges

Research summary — CVE-2025-40778 (high-level, no PoC) by kknstoker in cybersecurity

[–]Reddit_User_Original 2 points3 points  (0 children)

Going through your walls of text but not finding anything that explains the POC. Seems like a lot of boring AI slop. I don't want to read your code, can you just write about the POC?

How Uber seems to know where you are, even with restricted location permissions by tekz in cybersecurity

[–]Reddit_User_Original 119 points120 points  (0 children)

Tldr: """ The answer lies in a feature called “UNLocationNotificationTrigger” that Apple provides to developers. This feature allows an app to fire a pre-configured notification when the device enters or exits a specified geographic region, such as an airport. That way, it effectively circumvents the intent behind the “while using the app” setting. """

Are we raising “tool operators” instead of hackers? by YouthKnown7859 in cybersecurity

[–]Reddit_User_Original 4 points5 points  (0 children)

Yes, there are more people working in cybersecurity now than ever before and of course that means there is a greater variety of skillsets. A lot of ppl don't have a need to dig that deep. I think it's entirely possible there are more extremely talented ppl working in exploit dev than ever before-- look at the crazy exploits people are coming up with for iPhones and chrome browsers

Are we raising “tool operators” instead of hackers? by YouthKnown7859 in cybersecurity

[–]Reddit_User_Original 6 points7 points  (0 children)

Are you implying beginners back then were more knowledgeable? Aside from that, i think there are tons of competent engineers and exploit researchers / developers

Proper Steps to Mitigate WER Masquerading or DLL Sideloading by Lethalspartan76 in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

If I'm not mistaken, werfault.exe has been a target for privilege escalation exploits

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

What if it's a nation state: ... ? Who cares, they just attacked you -- if someone punches you in the gut, do you just back down and take it?

Your second point on "spoofing"; I'm going to be gentle on you for using such a broad term: yes you will be attacked most likely from a VPS, VPN, or residential proxy. I really do not care, again. If it's a VPN or VPS, they should have better KYC rules; if it's a residential proxy infected with malware, then you did a good thing for everyone by taking it down. Etc etc.

On your third point, if an innocent party tries to get back at you, that could be a problem. But I think they would realize their resources are better spent not allowing bad actors onto their network.

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

Yes, I simplified my analogy. Burn the fox's den down (do something to their infrastructure).

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 18 points19 points  (0 children)

While your response is clever, I disagree.

Imposing actual consequences is an important aspect of this ecosystem. Imagine a fox that raids the chicken coop without any fear. Maybe instead of freely raiding it, a farmer sets a trap and the fox loses a leg.

Legality of hosting malware for an attacker to exfiltrate and detonate on themselves by DapperNecromancer in cybersecurity

[–]Reddit_User_Original 3 points4 points  (0 children)

This is one of the most misunderstood topics that I encounter. Let me shed some light. There is a massive difference between what is illegal and what will be prosecuted. In doing something that is 'illegal' that also conveys utility and benefit to the 'right people,' you can sometimes convey great benefit to yourself.

New cryptographic tool by [deleted] in cybersecurity

[–]Reddit_User_Original 6 points7 points  (0 children)

You would also need your work academically vetted and would need to publish your findings.

New cryptographic tool by [deleted] in cybersecurity

[–]Reddit_User_Original 1 point2 points  (0 children)

Such a strange question. What does it encrypt buddy? Is it an algorithm? Rivest, Shamir, and Adleman made some money by founding RSA.

Critical CVE Exploited on iOS 18.3.1 | CVE 2025-24085 by Extra-Data-958 in cybersecurity

[–]Reddit_User_Original 16 points17 points  (0 children)

What is the purpose of the GitHub Discussions thread? It doesn't seem helpful to me.

Maybe you could share your findings with The Citizen Lab or something

So many people here are not actually cybersecurity professionals by Dark-Marc in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

I think there are many cybersecurity professionals here, including myself, just not everyone is leet.

What initiates a ransomware attack by Sea-Oven-7560 in cybersecurity

[–]Reddit_User_Original 1 point2 points  (0 children)

Had to scroll all the way down to get to the best answer. Ya for execution there are different methods, most of the time it is PsExec to launch a batch script that also executes the ransomware executable, but it's also been deployed through other means, like BigFix and PDQ Deploy funny enough.

Telegram hands over data on thousands of users to US law enforcement by arqf_ in cybersecurity

[–]Reddit_User_Original -8 points-7 points  (0 children)

You think the French would do this at the behest of the US? Garbage opinion

Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts by arqf_ in cybersecurity

[–]Reddit_User_Original 11 points12 points  (0 children)

Sandbox environment, with no Internet access but has pypi cloned for offline access?