Posts
3956
Following
731
Followers
1603
"I'm interested in all kinds of astronomy."
@airwhale I never heard that one, is this a Swedish term?
1
0
0
repeated

Micropatches released for Windows Accessibility Infrastructure Elevation of Privilege Vulnerability (CVE-2026-24291, CVE-2026-25186, CVE-2026-25187) https://blog.0patch.com/2026/05/micropatches-released-for-windows.html

1
3
0
[RSS] Deep dive into the object creation flow in Windows - PART 4: Handle table internals.

https://winware31.blogspot.com/2026/05/deep-dive-into-object-creation-flow-in_01568126117.html
0
0
2
@tychotithonus My problem is that on Linux they don't even try to connect to the device, and since passkey support on Linux is shit, they essentially disable HW key 2FA for all Linux users. I'm so mad about this.
0
0
1
repeated

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.

I know people here probably don't want to rehash the disclosure discussion for the 683,547,329th time, but fuck Microsoft and this passive aggressive bullshit trying to frame their own interests as "best practices" in a vuln mitigation publication. Your shit is getting torn apart. Act like you've been there before because we all know you have.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585

6
9
0
@ramin_hal9001 Right, I actually read this one just forgot about it! Thanks for the reminder!
0
0
1
This one by @sassdawe deserves some more love in these trying days:

#VSCode Extension Deployment with Intune - Björn Sundling, David Sass - PSConfEU 2025

https://www.youtube.com/watch?v=deBTJdjMc5o

RE: https://infosec.exchange/@sassdawe/116606877612791531
1
5
5
repeated

Also - if you think 'none of our users run VSCode', check your telemetry. They do. It doesn't even need local admin rights to install.

I've tooted about this one for about two years now, Microsoft have created their own security bonfire and it's going off in their own backyard, they just haven't realised yet.

9
5
0
repeated

Wow some terrible reporting about Google's latest horrible ideas about how to distort information access in the name of "convenience" (or something):

https://techcrunch.com/2026/05/19/google-search-as-you-know-it-is-over/

A short thread
🧵>>

1
12
0
Edited 15 hours ago
I could not find an existing phrase so I'm inventing a new one:

"Yes Man Design" is the principle of implementing a system so it always reports desired results and hides any errors. This often serves to achieve faster adoption than competing, more honest designs, forcing out alternatives.

I use the #LLM tag for no particular reason.
2
2
7
repeated

back in 2022 i found a bug that would let me, with no user interaction, turn any chromium-based browser into a permanent js botnet member

in edge, you wouldn't even notice anything out-of-place, and would stay connected to the c2 even after closing the browser

today, almost 4 years later, the bug is finally public:
https://issues.chromium.org/issues/40062121

7
22
0
repeated

info on the github breach appears to only be available on xitter 🙄 , I fished it out for you.

8
9
0
repeated

im celebrating the release of the new openbsd

but the usb rndis driver, extremely fragile!

if someone walks up to your OpenBSD 7.9 thinkpad in starbucks tomorrow and tries to plug in a suspicious usb device into your daily driver whilst yelling "please run `ifconfig urndis0 up` as soon as possible! this is a matter of life and death!" don't fall for it, you've been warned.
https://bird.makeup/users/openbsd/statuses/2056724227273687517

1
1
0
repeated

After uncovering memory bugs in NASA’s CFITSIO, we looked at turning its *documented* features into attack primitives.

Check out the blog post for details & a newly released Docker playground to reproduce the demos locally.

https://blog.doyensec.com/2026/05/19/cfitsio-weaponized-filenames.html

0
2
0
repeated

RE: https://mastodon.social/@bagder/116599713949044164

Unfortunately Daniel Stenberg's talk on how to manage a critical open source infrastructure under the AI-accelerated deluge of vulnerability reports turned into a practical demonstration of how to do it, and we hope to announce a new keynote speaker shortly.

0
5
0
repeated

In part 2 of my macOS security internals series, I demystify System Integrity Protection (SIP), breaking down how the kernel enforces Apple-signed entitlements over POSIX root privileges, the mechanics of rootless.conf, and why the hardware always has the final veto.

Includes a small C program to audit your own CSR bitfield configuration.

Read the full deep dive here:
https://bytearchitect.io/macos-security/Apple-defences-SIP-and-APFS-(cont'd)/

0
3
0
@tychotithonus did they start supporting normal webauthn without passkeys again??
1
0
1
[RSS] RCE and arbitrary file write in Vitess vtbackup via untrusted MANIFEST fields

https://neurowinter.com/security/2026/05/18/RCE-and-arbitrary-file-write-in-Vitess-vtbackup-via-untrusted-MANIFEST-fields/
0
0
1
repeated

Did you hear about Optical Line Terminals? ISPs rely on them to build their service networks, but what if they are vulnerable?
Here @coiffeur0x90 shows how attackers could compromise entire ISPs by exploiting them and cloud-based fleet management software
https://blog.quarkslab.com/how-olts-may-have-exposed-entire-isp-networks.html

0
2
0
Show older