▄▄▄▄▄                                                                ▄▄▄▄▄   
 ▄█▀▀█▀▀█▄                O  U  I  O  U  T  H  E  R  E                ▄█▀▀█▀▀█▄ 
 ██  █  ██ ▄ ▄ ▄▄▄ ▄▄▄                                       ▄▄▄ ▄▄▄  ██▄▄█▄▄██ 
 ▀█▄▄▀▄▄█▀ ▀█▀ █▄  ▀▀▄           The OOM Oracle              █ █ █ █  █▀▄▄▀▄▄▀█ 
   █████    ▀  ▀▀▀ ▀▀▀                                       ▀ ▀ ▀▀▀  █████████ 
   ▀ ▀ ▀                         ▄▄▄▄ ▄▄▄▄ ▄  ▄                       ▀ ▀ ▀ ▀ ▀ 
                            ▄▄▄▄ █     █  █ ▄▄▄                             
                       ▄▄▄  █    █▀▀  █  ▄ █▀▀█  █  ▄▄▄▄                        
                  ▄▄▄▄ █  █ █▀▀▀ █    █▄▄█ █  █  █    █  ▄  ▄                   
             ▄▄▄  █  ▀ █  █ █▄▄▄                ▄█▄   █  █ ▄▀ ▄                 
        ▄▄▄▄ █  █  █▄▄█                         ▄▄█  █▀▄  █    ▄▄▄▄▄        
        █  █ █▀▀█ █▄▄█           ▄▄▄▄ ▄▄▄ ▄  ▄           █  █ █    █ █ █        
        █▀▀█ █▄▄█           ▄▄▄▄ █  █ ▄  ▄           █▄▄▄ █ █ █        
        █  █           ▄▄▄▄ █  █ ▀▀▀█  █  █ █  █ ▄   ▄          █   █        
                  ▄▄▄▄ █  █ █▀█▀ ▄▄▄█  █▄▄█ ▀█▄█ █ ▄ █ ▄  ▄                  
             ▄▄▄▄ █  █ █ ▄█ █  █                ██  █ █ █ █  █ ▄  ▄             
        ▄▄ ▄ █  █ █▀▀▀ █▄██                         █▄█▄█ ▄▀▀▄ █  █ ▄▄▄▄        
        █▀▄█ █  █ █                                       █  █ ▀▀▀█   ▄▀        
        █ ▀█ █▄▄█                                              ▄▄▄█ ▄▀          
        █  █                                                        █▄▄▄        
                                                                                
                ▄▄  ▄▄▄▄ ▄▄▄▄ ▄  ▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄                
                 █  ▀  █ ▀  █ █  █ █    █  ▀ ▀  █ █  █ █  █ █  █                
                 █  █▀▀▀ ▀▀▀█ ▀▀▀█ ▀▀▀█ █▀▀█    █ █▀▀█ ▀▀▀█ █  █                
                ▄█▄ █▄▄▄ █▄▄█    █ █▄▄█ █▄▄█    █ █▄▄█ █▄▄█ █▄▄█                
                                                                                
                                                                                
                              G  O  O  D  B  Y  E                               

This is our last podcast episode for now! Thank you all so much for a wonderful
two years! You'll be seeing us around the internet, follow us on Twitter for 
any and all updates! More info on why we're ending the podcast here.

Upcoming Virtual Events!

- A Survey of Microarchitectural Timing Attacks and Countermeasures on 
  Contemporary Hardware Thursday 19 March 17:00 PDT 
- WRCCDC Live Stream ft. Thugcrowd Friday / Saturday 3/20 - 3/21 
- PancakesCon Sunday 3/22/20, from 9AM-6PM Central US
- CrisisCon  March 23-28

▄▄ ▄ ▄▄▄▄ ▄   ▄ ▄▄▄▄ 
█▀▄█ █    █ ▄ █ █    
█ ▀█ █▀▀▀ █ █ █ ▀▀▀█ 
█  █ █▄▄▄ █▄█▄█ ▄▄▄█ 

- Details about new SMB wormable bug leak in Microsoft Patch Tuesday snafu      
  Writeup -> I'M SMBGHOST, DABA DEE DABA DA                                 
- 5 years of Intel CPUs and chipsets have a concerning flaw that's unfixable    
  Response -> RAMming Down Hype via Intel CSME                                
- AMD processors from 2011 to 2019 vulnerable to two new attacks                
- Intel CPUs vulnerable to new LVI attacks                                      
  RELATED: Load Value Injection (LVI) flaws of Intel CPUs described             
- Intel Patches High Severity Flaws in Windows Graphics Drivers                 
- Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys                   
- Utah Spent $250k on a Surveillance Startup Instead of Life-Saving Drugs       
- Spying concerns raised over Iran's official COVID-19 detection app            
- Microsoft orchestrates coordinated takedown of Necurs botnet                  
- Talkspace threatened to sue a security researcher over a bug report           
- Virgin Media breach 'linked customers to porn'                                
- Zoho zero-day published on Twitter                                            
- Europol Dismantles SIM Swap Criminal Groups That Stole Millions               
- Data of millions of eBay and Amazon shoppers exposed                          
- Reporters Without Borders uses Minecraft to sneak censored works across       
  borders                                                                       
- Chelsea Manning is out of jail after almost a year                            
- Staff angered as Charter prohibits working from home despite spread of        
  coronavirus                                                                   

▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄    ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄  ▄▄▄▄ 
█    █  █ █  █ █  █   █  █ █    █  █ █  █ █    
█  ▄ █  █ █  █ █  █   █▀█▀ █▀▀▀ █▀▀█ █  █ ▀▀▀█ 
█▄▄█ █▄▄█ █▄▄█ █▄▄█   █  █ █▄▄▄ █  █ █▄▄█ ▄▄▄█ 

- Azeria: Trustonics's Kinibi TEE Implementation                                
- Cobalt Strike joins Core Impact at HelpSystems, LLC                           
- The Word from Wuhan                                                           
- CS:GO 0day and some thoughts (aka: why All or Nothing Bug Bounty Programs     
  are Bad)                                                                      
- Surveillance Firm Banjo Used a Secret Company and Fake Apps to Scrape Social  
  Media                                                                         
- The Art Of Malware - Bringing the dead back to life                           
- MMD-0066-2020 - Linux/Mirai-Fbot - A re-emerged IoT threat                    
- Writing an Extremely Fast RISC-V Emulator and Fuzzing with it! (Part 1/2)     
- Applocker Bypass: COR Profiler                                                
- Scripting Engine Memory Corruption Vulnerability CVE-2020-0674                
- Secret-sharing app Whisper failed to keep users' fetishes and locations       
  private                                                                       
- Azeria's Social Distancing Thread                                             
- Analyzing Android Stalkerware With The Aid of Splunk (Part One)               
- How the coronavirus is affecting the dark web drug market                     
- Java on GPUs and FPGAs                                                        

▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄  ▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ 
█  █ █    █    █  █ █  █ █  █ █  ▀ █    █    
█▀█▀ █▀▀▀ ▀▀▀█ █  █ █  █ █▀█▀ █    █▀▀▀ ▀▀▀█ 
█  █ █▄▄▄ ▄▄▄█ █▄▄█ █▄▄█ █  █ █▄▄█ █▄▄▄ ▄▄▄█ 

- [dustyfresh] Hardened nginx config                                            
- Kerberosity Killed the Domain: An Offensive Kerberos Overview                 
- Bash Tricks Thread                                                            
- Screetsec/TheFatRat: Post Exploitation Tool                                   
- Reversing Golang Binaries: Part-1                                             
- Reversing Golang Binaries: Part-2                                             
- Reversing Golang Binaries: Part-3 (How to run a golang ransomware :)          
- University of Cincinnati Malware Analysis Course (CS6038/CS5138)              
- The Ultimate PCAP                                                             
- Reverse Engineering Tibia Packet Function - x64dbg Tutorial                   
- cybergibbons: Shodan Safari Tips!                                             

▄▄▄▄ ▄  ▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄ ▄▄▄▄ 
█  ▀ █  █ █    █  █  █  █    
█    █▀▀█ █▀▀▀ █▀▀█  █  ▀▀▀█ 
█▄▄█ █  █ █▄▄▄ █  █  █  ▄▄▄█ 

- Remote iOS/MacOS kernel heap corruption due to insufficient bounds checking   
  in AWDL                                                                       
- taviso/avscript: Avast JavaScript Interactive Shell                           
- Ridter/cve-2020-0688: PoC for CVE-2020-0688 - Microsoft Exchange Memory       
  Corruption Vulnerability                                                      
- corellium/projectsandcastle: Supporting tools for Android/Linux on the        
  iPhone                                                                        
- Exploiting an Accidentally Discovered V8 RCE                                  
- Parse Server sessionToken regex NoSQL injection                               
- TRRESPASS: DDR4 Rowhammer Attack                                              
- CVE-2020-1981 PAN-OS: Predictable temporary filename vulnerability allows     
  local privilege escalation                                                    
- Thread of Google dorks for video meetings                                     
- zer0pwn - FRIDAY THE 13TH KDE 5 POC                                           
- CVE-2020-2551: Unauthenticated Remote Code Execution in IIOP protocol via     
  Malicious JNDI Lookup                                                         

▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄▄ ▄▄▄ 
█    █  █ █    █  █ █  █  █  
▀▀▀█ █▀▀█ █▀▀  █▀▀█ █▀█▀  █  
▄▄▄█ █  █ █    █  █ █  █ ▄█▄ 

- [aneilan] stuff found while streaming on twitch - 2020/03/10                  
- [bane] Acrelec kiosk - shodan                                                 
- [dustyfresh] IPs in my logs from ~24 hours scanning for MongoDB               
- [dustyfresh] COVID-19 Domains Feed                                            
- [hermit] "COVID-19 Global Updates" Greynoise Query                            
- [hermit] "COVID-19 Global Updates" Google Dork                                
- [hermit] FedEx Tracking Dork                                                  
- [hermit] Webex WSDL                                                           
- [hermit] Some weird spam ring                                                 
- [plazmaz] allintitle:"Password Management Client"                             
- [sshell] COVID-19 Real Time Scam Hunter (In Browser Tool)                     
- [xehle] Acrelec Kiosk Updater Documentation                                   
- [xehle] Acrelec Complete - Customer Tracking Software                         
- [xehle] Acrelec Package Repo                                                  
- [xehle] Acrelec Kibana and Elastic Search - shodan                            
- [yuu] Sitebuilder File Upload Dork