Posts
3935
Following
728
Followers
1602
"I'm interested in all kinds of astronomy."
repeated

Peter G. Neumann, renowned computer scientist, ARPANET/Internet pioneer and expert on technology risks, working at SRI International since 1971, has died at age 93. Peace. He has been my friend and colleague for over half a century. He will be greatly missed.

7
16
0
repeated

GitHub says it has no problems with security researchers using AI to find bugs in its service, but it has a problem with researchers filing bad reports that haven't been validated, are extra-verbose and long, and don't contain steps to reproduce and a proof-of-concept.

Basically, KISS!

https://github.blog/security/raising-the-bar-quality-shared-responsibility-and-the-future-of-githubs-bug-bounty-program/

0
3
0
repeated
Edited 8 hours ago

There's apparently another Linux LPE.
DirtyDecrypt, also known as DirtyCBC, is a variant of CopyFail / DirtyFrag / Fragnesia.
I suspect it may be CVE-2026-31635.
Patches (change < to >) were committed on April 8, 2026 and also on April 18, 2026 as beee051f259acd286fed64c32c2b31e6f5097eb5 and e2f1a80d8b1ed6a5ae585a399c2b46500bdcc305

I have not been able to get it to actually work on any Linux distro that I've tried.
(Edit: Fedora and mainline Linux repro fine)

2
7
0
repeated
Overheard: “I feel more pressure to use AI as an adult than to do drugs as a teenager.”


7
16
0
repeated

New article on an AppleJPEGXL UaF I found recently.

https://ret2p.lt/2025/05/17/AppleJPEGXL-CVE.html

Enjoy! Constructive criticism is always appreciated.

0
3
0
repeated

DOMPurify 3.4.4 is out with again several small in-depth improvements.

These include added stability for IN_PLACE sanitization, improved handling of cross-realm nodes and several newly permitted elements and attributes.

https://github.com/cure53/DOMPurify/releases/tag/3.4.4

0
2
0
repeated

TIL that one of the diagnostic clues for autism is "Thinks about their special interests outside of the time when actually engaging with special interests."

And I'm like... what? What else do you think about?...

1
3
0
repeated

Big news. A Qemu escape. Are you ready? Panic!!1!

https://www.reddit.com/r/blueteamsec/comments/1tfgm80/qemutiny_is_a_memory_corruption_vulnerability_in/

Wait, CXL? Reddit as a source? AI off, brain on moment incoming...

CXL, that's for FPGAs. The escape isn't for x86 or ARM. It's not even for virtio.

Typical Proxmox CE deployments use AppArmor Sandboxing. Guest-to-host escapes are possible, but not this way.

It's not that Qemu is a fortress of years of great security auditing. That's not my point. My point is that the AI hype for vuln hunting is a fata morgana. Unless you work hard, you get nothing with or without AI.

You are welcome.

1
4
0
repeated

Interesting Git repos of the week:

Strategy:

* https://github.com/stnert/the-supreme-art-of-cyberwar - surveillance, privacy and cyber war

Bugs:

* https://github.com/Swival/security-audits - interesting bug reports from @jedisct1 🤖
* https://github.com/v12-security/pocs - interesting Linux PoCs
* https://github.com/kiddo-pwn/ffffirefox - originally an 0day but now tracked as CVE-2026-8390
* https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn - race condition in ssh-keysign that allows arbitrary file reads, now tracked as CVE-2026-46333
* https://github.com/Nightmare-Eclipse/YellowKey - another goodie, this one is a bugdoor in BitLocker
* https://github.com/Nightmare-Eclipse/MiniPlasma - previously known as CVE-2020-17103, MiniPlasma pops cldflt.sys

Exploitation:

* https://github.com/1r0BIT/WinSSHound - map SSH usage on Windows

Nerd:

* https://github.com/inferno-os/inferno-os - distributed Plan 9-esque OS... I remember playing with this growing up

, ,

0
4
0
repeated

TrendAI Zero Day Initiative

That's a wrap on Pwn2Own Berlin 2026! 🏆 $1,298,250 awarded. 47 unique 0-days. 3 days of absolute chaos. And talk about main character energy - congrats to DEVCORE for claiming Master of Pwn with 50.5 points and $505,000 - they never slowed down. See you next year!

0
3
0
repeated

RE: https://infosec.exchange/@thezdi/116585566164605071

* Seems many of the Browser exploits couldn't be demoed due to bad luck/last-minute fixes. Really sorry for the participants :( great research!
* No V8 (and Chrome?) submissions for the 2nd year in a row
* Orange's Edge chain sounds wild, very curious for details!
Thanks for running @thezdi

2
3
0
repeated

Exclusive: Fast16 malware has raised questions about what it was designed to do. Researchers at Symantec finally confirm it was subverting software used to simulate nuclear weapons explosions. Nuclear experts also tell me Iran was the likely target and explain how it impacted nuclear weapons tests. Fast16 wasn't aimed at sabotaging nuclear weapons themselves, but was only designed to alter data being fed to engineers from software used to simulate nuclear explosions tests. The goal was to trick engineers into believing their tests were failing to create confusion and slow down weapons program. Fast16 and Stuxnet were similar in that they both fed false data to engineers. But Stuxnet also physically altered centrifuges while tricking engineers into believing the devices were fine. New analysis from me also shows the two codes were contemporaneous, not separated by years.

Here's my story, which contains a link to a timeline showing how they were being developed around the same time, likely as part of a multi-pronged operation to slow down Iran's nuclear program.

https://www.zetter-zeroday.com/experts-confirm-the-fast16-malware-was-sabotaging-nuclear-weapons-tests-likely-in-iran/

2
16
0
repeated
Edited yesterday

New from Nightmare-Eclipse, we have MiniPlasma

Works reliably to get a SYSTEM cmd.exe prompt on Win11 (including 26H1) with May's updates. Is reportedly a failure to properly fix CVE-2020-17103. I'll note that it does not seem to work on the latest Insider Preview Canary Windows 11.

1
5
0
repeated

TrendAI Zero Day Initiative

We're back for the final day of Berlin! Yesterday we ended the day with $908,750 awarded, 39 unique 0-days, and DEVCORE with a commanding lead for Master of Pwn. What's in store for today? Follow along for live results!

0
2
0
repeated

TrendAI Zero Day Initiative

Aaaand it's official! Orange Tsai (@orange_8361) of DEVCORE Research Team chained 3 bugs to achieve Remote Code Execution as SYSTEM on Microsoft Exchange, earning a whooping $200,000 and 20 Master of Pwn points. Full win!

0
4
0
ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass

https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
0
4
3
repeated

@jhr77 @christopherkunz @buherator
Ah, so this is fascinating.

It appears that Microsoft did NOT address RedSun. They merely added a definition to discover the post-modified TieringEngineService.exe binary (which is the RedSun.exe file itself).

And if you aren't careful, like I wasn't, you might at a glance think that Microsoft broke the RedSun exploit. But that is wrong! They merely now detect the post-exploit-modified binary that RedSun chooses to modify. 🤦‍♂️

1
3
0
repeated

They: "On a scale from 1 to 10: How lazy are you?"

Me: Using copy fail instead of sudo to gain root to avoid having to type my password

2
15
1
repeated

Has anyone ENCHANTED any cool WEAPONS lately?

#wizardposting #wizard
2
1
0
repeated
Show older