for whatever reason, unknown to me, hn automatically strips "how" from the start of titles. i cant remember ever seeing a title where this was an improvement.
Titles are standard clickbait.
Although given the tendency for end point logging agents to run on buffers to reduce their network chattiness I do wonder if a fast acting exploit could dump that buffer before it manages to be transmitted.
It sounds great but that could be as low as 50.1% since they don't provide an actual percentage.
skinfaxi•46m ago
> One of the first things our security team did was confirm that our existing endpoint detection would catch this exploit. Our servers run behavioral detection that continuously monitors process execution patterns. It doesn't rely on knowing about specific vulnerabilities; it watches for anomalous behavior across the fleet.
CGamesPlay•43m ago
jeffbee•35m ago
CGamesPlay•31m ago
jeffbee•15m ago
Retr0id•10m ago
I have a fileless, execless copyfail exploit that works by injecting shellcode directly into systemd's pid 1. (I should probably publish it at some point...)
parliament32•26m ago
In a serious environment you'd run IPE with dm-verity/fs-verity to ensure binaries are whitelisted and integrity-checked at every execution.
dboreham•11m ago
mobeigi•7m ago