IMO, the biggest takeaway from this research is the huge promise shown by memory mitigations, both hardware and software, in protecting users against 0-days.
Jerry did a nice write up on how to take on NTLM in your environment.
We've got some Very Fun updates coming out in the next little while on this front too.
Wikipedia turns 25 today! 🎂📚
To celebrate, we’re looking back at its baby pictures—some of the earliest captures of the site, preserved in the #WaybackMachine.
Take a nostalgic peek at early Wikipedia ⤵️
https://web.archive.org/web/20030301000000*/en.wikipedia.org
As I will be travelling starting tomorrow, I declare the #nakeddiefriday today.
Instead of going deeper into one particular die, this will be several of them but one-pagers.
This one is HV9911 by Supertex (now owned by Microchip). Those following me have probably seen the epic struggle with restoring a diving light; this one came from the LED driver chip in the light. Entirely undamaged, as far as I can tell. Of particular interest is an array of fuses in the top right corner.
let's pour one to -fbounds-safety 🔥🌸
https://tech.lgbt/@fay59/115900565326279983
New.
Mandiant: Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables #Google #infosec
Updated Cisco advisory. "Rudolph, the red-nosed reindeer ...." 🎵 🎶 🎧
"There are no workarounds identified that directly mitigate the risk concerning this attack campaign, but administrators can view and follow the guidance provided in the Recommendations section of this advisory."
Cisco: CVE-2025-20393, critical: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 @TalosSecurity #infosec #Cisco #vulnerability
Nariman Gharib, an #Iran cyber-espionage expert (on exile):
Obtained #Starlink terminal debug data from Iran during the ongoing internet shutdown.
The telemetry shows direct evidence of GPS spoofing: the dish detected 18 #GPS satellites with valid signal lock, but activated its anti-spoofing countermeasures (inhibitGps: true). This isn’t simple jamming; the government appears to be broadcasting fake GPS signals to confuse terminals.
The impact: 20%+ sustained packet loss, connection never stabilized after 24 minutes, bandwidth restricted, and beam pointing ~1° off target. Starlink stayed online but was barely usable.
The anti-spoofing detection works, but SpaceX’s fallback positioning can’t currently maintain normal performance under electronic warfare.
First documented technical evidence of state-level GPS spoofing against consumer satellite internet.
https://github.com/narimangharib/starlink-iran-gps-spoofing/blob/main/starlink-iran.md
Still going to argue that https://gitlab.com/mjg59/linux/-/commit/13cd6ec5e0e99124dd730156a4d921b20f192e2d would maybe be the most security per lines of code this decade