08/14

Discord Desktop - Remote Code Execution | Electrovolt Blog

https://blog.electrovolt.io/posts/discord-rce/
Discord Desktop - Remote Code Execution | Electrovolt Blog

A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave | WIRED

https://www.wired.com/story/john-deere-tractor-jailbreak-defcon-2022/
A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave | WIRED

CVE-2022-30216 - Authentication coercion of the Windows “Server” service

https://www.akamai.com/blog/security/authentication-coercion-windows-server-service
CVE-2022-30216 - Authentication coercion of the Windows “Server” service

akamai-security-research/cve-2022-30216 at main · akamai/akamai-security-research · GitHub

https://github.com/akamai/akamai-security-research/tree/main/cve-2022-30216
akamai-security-research/cve-2022-30216 at main · akamai/akamai-security-research · GitHub

How I Hacked my Car :: Programming With Style

https://programmingwithstyle.com/posts/howihackedmycar/
How I Hacked my Car :: Programming With Style

How I Hacked my Car Guides: Creating Custom Firmware :: Programming With Style

https://programmingwithstyle.com/posts/howihackedmycarguidescreatingcustomfirmware/
How I Hacked my Car Guides: Creating Custom Firmware :: Programming With Style

How I Hacked my Car Part 3: Making Software :: Programming With Style

https://programmingwithstyle.com/posts/howihackedmycarpart3/
How I Hacked my Car Part 3: Making Software :: Programming With Style

How I Hacked my Car Part 2: Making a Backdoor :: Programming With Style

https://programmingwithstyle.com/posts/howihackedmycarpart2/
How I Hacked my Car Part 2: Making a Backdoor :: Programming With Style

Introducing Threatest, A Go Framework For End-to-end Testing Of Threat Detection Rules | Datadog Security Labs

https://securitylabs.datadoghq.com/articles/threatest-end-to-end-testing-threat-detection/
Introducing Threatest, A Go Framework For End-to-end Testing Of Threat Detection Rules | Datadog Security Labs

Eugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties.pdf

https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Eugene%20Lim%20-%20You%20Have%20One%20New%20Appwntment%20-%20Hacking%20Proprietary%20iCalendar%20Properties.pdf
Eugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties.pdf

Eugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties whitepaper.pdf

https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Eugene%20Lim%20-%20You%20Have%20One%20New%20Appwntment%20-%20Hacking%20Proprietary%20iCalendar%20Properties%20whitepaper.pdf
Eugene Lim - You Have One New Appwntment - Hacking Proprietary iCalendar Properties whitepaper.pdf

Over 9,000 VNC servers exposed online without a password

https://www.bleepingcomputer.com/news/security/over-9-000-vnc-servers-exposed-online-without-a-password/
Over 9,000 VNC servers exposed online without a password

Digital Corpora Downloads: corpora/scenarios/magnet/

https://downloads.digitalcorpora.org/corpora/scenarios/magnet/
Digital Corpora Downloads: corpora/scenarios/magnet/

XMPP Stanza Smuggling or How I Hacked Zoom - Black Hat USA 2022 | Briefings Schedule

https://www.blackhat.com/us-22/briefings/schedule/index.html#xmpp-stanza-smuggling-or-how-i-hacked-zoom-26618
XMPP Stanza Smuggling or How I Hacked Zoom - Black Hat USA 2022 | Briefings Schedule

Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users

https://www.trendmicro.com/en_us/research/22/h/irontiger-compromises-chat-app-Mimi-targets-windows-mac-linux-users.html
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users