Pretty unfortunate update on Fortra GoAnywhere MFT CVE-2025-10035 from the folks at @watchtowrcyber. Yikes. https://labs.watchtowr.com/it-is-bad-exploitation-of-fortra-goanywhere-mft-cve-2025-10035-part-2/
i can finally share the google docs attack poc from my slides!!
blogpost coming later
(video 1/2 - the attack)
🔴 We just published our Black Hat Arsenal talk (part 1)!
It's a brief tutorial on:
1. using rev.ng from the CLI;
2. playing around with the decompiled code in VSCode;
3. finding bugs with clang static analyzer! 🦾
I didn't know how to explain it at the time but we have words for my bug report now: I used the SSDP RFC -> LLM-generated EBNF grammar -> vibe-coded Rust compiler for EBNF to Protobuf -> vibe-coded C++ frontend -> vibe-coded root cause -> vibe-coded report https://issues.chromium.org/issues/40070891
🏆 VB2025 Péter Szőr Award — Finalists Announced!
We're excited to reveal the three shortlisted finalists for this year’s Péter Szőr Award, selected by committee vote
The winner will be announced at the Gala Dinner this evening, Thursday 25 September, at VB2025 in Berlin.
We need an internet archive outside the US! We can't put all our eggs in one basket.
Oh, wait: we *have* an internet archive outside the US. Let's support it.
And now they have an office - a physical presence!
https://flaminghydra.com/freedom-and-sharing-at-the-internet-archive-europe/
Workslop: bad ‘study’, but an excellent word
wasting coworkers’ time with AI — as directed
https://www.youtube.com/watch?v=xnI-Yr6plXI&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
https://pivottoai.libsyn.com/20250923-workslop-bad-study-but-an-excellent-word - podcast
time 7 min 10 sec
https://pivot-to-ai.com/2025/09/23/workslop-bad-study-but-an-excellent-word/ - text
So I just reported a very interesting bug in Outlook - took me a while to analyze and understand (part of) the root cause..
The bug allows to read the value of an MAPI property* and use it *directly* as a memory pointer. We know OOB (e.g. caused by integer overflow) bugs are not rare but they're all some sort of "offsets", not someone just read the value and directly use it as a pointer.. So basically you can set the DWORD 0xdddddddd in the email and Outlook would happily access memory at 0xdddddddd. Not sure what severity it could be as it's an OOB-read at first glance, but def. an interesting find for me.:)
Full details will be released after MSRC's review.
* https://learn.microsoft.com/en-us/office/client-developer/outlook/mapi/mapi-property-overview
System/38 project update. Edith is off the pallet and on her own wheels. WE REPEAT THE EDITH HAS LANDED.
https://www.gofundme.com/f/ibm-system-38-computer-rescue-and-restoration
The crates.io team was notified of two malicious crates (with similar names as legitimate crates) which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exfiltration. The malicious crates have been removed.
See the blog post for details: https://blog.rust-lang.org/2025/09/24/crates.io-malicious-crates-fasterlog-and-asyncprintln/
I wrote an article about what I wish juniors in cybersecurity would ask for and contribute when asking for a mentor and career guidance, in light of the terrible tech jobs market.
https://tisiphone.net/2025/09/24/reasonable-expectations-for-cybersecurity-mentees/
#Cybersecurity #Infosec #MentoringMonday #Mentoring #CybersecurityCareers
There's an vuln in Cisco IOS which allows RCE via SNMPv1 or v2 if you have the read-only community string and can send SNMP packets. Under active exploitation. CVE-2025-20352
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte
stty
https://wizardzines.com/comics/stty/
(from The Secret Rules of the Terminal, out now! https://wizardzines.com/zines/terminal/)