Joe Beeton

60 posts

Joe Beeton

Joe Beeton

@JosephBeeton

Brighton, England Katılım Kasım 2022
442 Takip Edilen67 Takipçiler
Joe Beeton
Joe Beeton@JosephBeeton·
@PositivFuturist I think you are missing the point, when talking about paid for software. If you can pay 1/10 of the price for something that is "good enough". You will pick that.
English
0
0
1
38
Andy
Andy@PositivFuturist·
Name a software product you use that’s second or third best.. then you can claim vibe coding will dominate software.
English
19
0
19
2.4K
Joe Beeton
Joe Beeton@JosephBeeton·
@trufflesec Im guessing part of the reason its taking so long to fix, is working out the best way to unravel this mess. Do you block older keys from accessing gemini? Create a new type of key meant to be publicly accessible? Any fix breaks some existing users workflows.
English
0
0
0
1.1K
Truffle Security
Truffle Security@trufflesec·
🚨 Google told devs: API keys aren't secrets. Gemini changed that. 😱 We found ~3,000 public keys silently authenticating to Gemini - exposing private files, cached data & charging for LLM usage 💥Even Google's own keys were vulnerable. 🔗 trufflesecurity.com/blog/google-ap…
Truffle Security tweet media
English
14
71
329
90.3K
Joe Beeton
Joe Beeton@JosephBeeton·
@Dinosn I imagine they have lost alot more than that in lost customers/sales.
English
0
0
0
22
Joe Beeton
Joe Beeton@JosephBeeton·
youtu.be/5QXGfquhx2Y?fe… Ive done a few talks on this attack vector especially as a way to target developers that run services on localhost. Essentially js running in the browser can be used to interact in some circumstqnces with services bound to localhost leading to RCE on the devs machine in Spring, Quarkus, spring mcp. Several POCs can be found at joebeeton.github.io its good to see it fixed at the browser level. Although another popup is not the way to do it.
YouTube video
YouTube
English
0
0
0
5
Attila
Attila@attilablenesi·
What's happening with websites recently? All want local network access...
Attila tweet media
English
66
39
3.8K
462.7K
Joe Beeton
Joe Beeton@JosephBeeton·
You can if course. You shouldnt Esp in a business Apart from the technical issues of limited library support, memory safety etc. The main issue is you find it impossible to get skilled enough developers to maintain it after you have moved on. Java web devs are cheap and plentiful
English
0
0
1
123
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
I would argue that even "Web Applications" can be predominantly written -- and written well -- in C. In fact, this was a common approach in years gone by. Programming a CGI, in C, and dropping that compiled bad boy in the "cgi-bin" directory is an approach that most big websites (like Amazon) used until fairly recently.
English
32
8
254
15.2K
Joe Beeton
Joe Beeton@JosephBeeton·
@Osinttechnical Im suprised they still havent built relatively cheap hangars for their aircraft. These are relatively light fpv drones. Either hangars or just netting would have made this attack less effective. I know this is far from the front, but still.
English
3
0
12
4K
OSINTtechnical
OSINTtechnical@Osinttechnical·
Today, Ukrainian forces conducted a simultaneous strike on Russia's Belaya, Dyagilevo, Olenya, and Ivanovo airbases using FPV drone swarms. The strikes destroyed a number of high-value Russian aircraft (Ukrainian SBU sources tell the FT nearly 40), including heavy bombers.
OSINTtechnical tweet mediaOSINTtechnical tweet mediaOSINTtechnical tweet mediaOSINTtechnical tweet media
English
62
577
5K
292.3K
Joe Beeton
Joe Beeton@JosephBeeton·
@jaketeater @Osinttechnical Thats true, that makes fibre optic unlikely. So radio link to the container is most likely. I doubt they had rf jammers running at a airfield that far away.
English
0
0
1
340
jake teater
jake teater@jaketeater·
@JosephBeeton @Osinttechnical One of the drones flies over a fire. I assume if it had a fiber connection to a mothership/container the pilot would avoid the fire below, which might melt his fiber.
English
2
0
0
328
Joe Beeton
Joe Beeton@JosephBeeton·
@UKDefJournal 5 inches, thats the size of a tooth brush, how can they defend themselves with that!
English
0
0
6
271
Joe Beeton
Joe Beeton@JosephBeeton·
Why are cash machines so intent on convincing me to check my bank balance?
English
1
0
3
99
Joe Beeton retweetledi
elttam
elttam@elttam·
New blog post: plORMbing your Django ORM - Part one of a series about ORM Leak vulnerabilities and attacking the Django ORM. elttam.com/blog/plormbing…
English
1
37
77
8K
Joe Beeton retweetledi
hackaday
hackaday@hackaday·
Who else learned in high school that you could use a file open or file save dialog to run executables?
Deftdawg@deftdawg

@hackaday F1 for help, file open, browse to cmd or explorer and you can skip the logins… great for using computer labs anonymously 🤣

English
10
6
55
14.6K
Joe Beeton
Joe Beeton@JosephBeeton·
@josephfcox This is why penetration testing is so important!
English
2
2
113
5.5K
Joseph Cox
Joseph Cox@josephfcox·
New from 404 Media: claims a vibrator delivered malware went viral. So, we bought a couple of them and put them through "404 Media's forensic lab" (some old computers). Also did a tear down. 404media.co/spencers-vibra…
English
20
63
442
85.4K
Navy Lookout
Navy Lookout@NavyLookout·
Unfortunately, Lewis Page is now defence editor @Telegraph and is endlessly saying not fitting QEC carriers with CATOBAR is a disaster and it was a "conspiracy" that prevented it. In an ideal world where defence spending was north of 3% of GDP & manpower was abundant the RN would have CATOBAR carriers but this is completely unrealistic with resources available. telegraph.co.uk/news/2024/02/0…
English
58
19
308
73.4K
Joe Beeton retweetledi
LaurieWired
LaurieWired@lauriewired·
Reminder, JAVA is *NOT* designed for Nuclear Facilities
LaurieWired tweet media
English
78
572
5.6K
310.7K
Joe Beeton retweetledi
CSOonline
CSOonline@CSOonline·
MLflow vulnerability enables remote machine learning model theft and poisoning trib.al/Iz67hOP
English
0
1
1
634