I'm incredibly pleased to announce that the microcode for the Intel 80386 has been decoded.
It was a group effort by a bunch of talented people to extract and correct the physical bits, but the major work of decoding them was done by reenigne - you may know him from such incredible PC demos as 8088 MPH and Area 5150, as well as being the person who decoded the 8088 microcode previously.
Please, check out his writeup.
https://www.reenigne.org/blog/80386-microcode-disassembled/
#retrocomputing #vintagecomputing #microcode #reverseengineering
If you run a peertube instance and have not patched in the past 4 hours, you are way behind and likely have been compromised. The latest patch will help clean up the mess.
See here: https://github.com/Chocobozzz/PeerTube/releases/tag/v8.1.8
Fun fact, a web upload trigger gives you root read access on the Tolino Vision Color, but im not even sure if they are in general just more open for tinkering.
7" Full Color Linux eink reader for 200€ is anyway more on the expensive side
eat flaming shit, google.
https://techcrunch.com/2026/05/22/you-can-no-longer-google-the-word-disregard/
Hello and welcome to #NakedDieFriday! This time with proper capitalisation. :-)
The die of today is named HD6483153 and is designed by Hitachi. It fell out of a SIM card. I do not know what commercial p/n this is, if it was ever assigned one. If anyone can provide any details on what smart cards were made by Hitachi, please do so! In the meantime, we shall explore a bit. 🧵
Full-res map: http://infosecdj.net/map/hitachi/hd6483153/infosecdj_mz_nikpa40x_2/
EDIT: This is H8/3153, part of the H8/3150 series.
🏆 Nominations for the 2026 Burp Suite Extension Awards close THIS TUESDAY ⚠️
Week 3 of Extensibility month is almost wrapped - here's what happened, what's still to come, and how to get your nomination in before it's too late 👇
(picussecurity.com) UNC2891: Anatomy of a Sophisticated Bank Heist Using CAKETAP Rootkit and Raspberry Pi-Based Attacks
UNC2891, a financially motivated threat group active since 2017, has executed sophisticated attacks on banking infrastructure using custom malware and physical access vectors. Their latest campaign in Q1 2025 involved planting a 4G-enabled Raspberry Pi on a bank’s network switch to bypass perimeter defenses, enabling ATM fraud via Payment HSM manipulation.
In brief - UNC2891 targets financial institutions with advanced Linux/Solaris malware, including the CAKETAP rootkit, to authorize fraudulent ATM withdrawals. A recent attack used a Raspberry Pi for initial access, highlighting evolving physical and digital threats to banking systems.
Technically - UNC2891 employs CAKETAP (Solaris kernel rootkit) to hook system calls like `mkdirat` and `ipcl_get_next_conn`, enabling stealthy C2 and network manipulation. SLAPSTICK (PAM backdoor) captures credentials, while TINYSHELL (backdoor) communicates over raw TCP (ports 53/443). Tools like WINGHOOK (keylogger) and STEELHOUND (in-memory dropper) facilitate credential harvesting and payload execution. The CAKETAP variant on ATM switches bypasses card/PIN verification by replaying HSM responses.
RE: https://mastodon.social/@marver/116617742819891906
If you don't recognize "Starlette":
"Starlette is the foundation of the FastAPI Python framework."
... and everything uses FastAPI.
Patch Starlette now! If you're run it via uvicorn or other common ASGI servers then a host header parsing issue can lead to vulnerabilities leading from auth bypass up until RCE! Examples for affected packages are liteLLM, vllm, etc... Here is the X41 Advisory: