Posts
3166
Following
706
Followers
1560
"I'm interested in all kinds of astronomy."
@algernon @hongminhee "They need new content to "improve" the models." -> The easiest way to think about this is to consider some fast evolving library API. If you don't scrape+train constantly, you won't be able to generate code for the latest&greatest, so by this logic (incredibly costly) training *can never stop*.
1
0
1
repeated

IMO, the biggest takeaway from this research is the huge promise shown by memory mitigations, both hardware and software, in protecting users against 0-days.

1
4
0
repeated

Jerry did a nice write up on how to take on NTLM in your environment.

We've got some Very Fun updates coming out in the next little while on this front too.

https://techcommunity.microsoft.com/blog/CoreInfrastructureandSecurityBlog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782

1
3
0
repeated

Wikipedia turns 25 today! 🎂📚

To celebrate, we’re looking back at its baby pictures—some of the earliest captures of the site, preserved in the .

Take a nostalgic peek at early Wikipedia ⤵️

https://web.archive.org/web/20030301000000*/en.wikipedia.org

@wikipedia

2
8
0
repeated

As I will be travelling starting tomorrow, I declare the today.

Instead of going deeper into one particular die, this will be several of them but one-pagers.

This one is HV9911 by Supertex (now owned by Microchip). Those following me have probably seen the epic struggle with restoring a diving light; this one came from the LED driver chip in the light. Entirely undamaged, as far as I can tell. Of particular interest is an array of fuses in the top right corner.

1
2
0
repeated
Edited 14 hours ago
"I hope you're fine and healthy. The reason I am writing this mail is to share a few of my experiments and research I've done to come up with a reasonable stack pivot detection for the Syd kernel. TL;DR I have failed and I have learned a lot."

https://www.openwall.com/lists/oss-security/2026/01/10/1

Messages like this give me some hope in humanity <3
0
3
2
repeated

New.

Mandiant: Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables

0
3
0
repeated

Updated Cisco advisory. "Rudolph, the red-nosed reindeer ...." 🎵 🎶 🎧

"There are no workarounds identified that directly mitigate the risk concerning this attack campaign, but administrators can view and follow the guidance provided in the Recommendations section of this advisory."

Cisco: CVE-2025-20393, critical: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 @TalosSecurity

@cR0w

1
3
0
repeated

Inspirational Skeletor💀

0
10
0
[RSS] CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center

https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce/
0
0
0
repeated

Nariman Gharib, an #Iran cyber-espionage expert (on exile):

Obtained #Starlink terminal debug data from Iran during the ongoing internet shutdown.

The telemetry shows direct evidence of GPS spoofing: the dish detected 18 #GPS satellites with valid signal lock, but activated its anti-spoofing countermeasures (inhibitGps: true). This isn’t simple jamming; the government appears to be broadcasting fake GPS signals to confuse terminals.

The impact: 20%+ sustained packet loss, connection never stabilized after 24 minutes, bandwidth restricted, and beam pointing ~1° off target. Starlink stayed online but was barely usable.

The anti-spoofing detection works, but SpaceX’s fallback positioning can’t currently maintain normal performance under electronic warfare.

First documented technical evidence of state-level GPS spoofing against consumer satellite internet.

https://github.com/narimangharib/starlink-iran-gps-spoofing/blob/main/starlink-iran.md

1
6
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Epic Games Store Installation DLL Hijacking Privilege Escalation Vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2279

CVE-2025-61973
0
1
1
repeated
@joxean @Xilokar ...but I meant this mostly as a joke :)
0
0
1
@joxean @Xilokar malware, obviously! I'd also consider Electron itself as packing and I'm pretty sure there are other "IP protection" schemes under the hood...
1
0
1
repeated
Edited 22 hours ago

One question: have you seen recently packed software (malware or some proprietary application) that isn't Windows PE files? Like, I don't know, Linux ELFs, or MacOS MACH-O files, or Android apks.

1
2
0
Show older