A hefty root cause analysis of #Cisco Secure Firewall Management Center (FMC) RCE CVE-2026-20079 out now from our exploit dev team. The bug's a CVSS 10, but there are significant prerequisites for exploitation that limit real-world exploitability https://www.vulncheck.com/blog/cisco-fmc-auth-bypass-cve-2026-20079
AI, a few thoughts, observations about AI & security vulns.
My standard line about AI is "there's a lot I'm uncertain about". But let's be clear, there's a lot I don't like & I'm probably biased towards the "here's how spectacularly AI failed once again" news (of which there are plenty) or at least the "it's not as impressive as it may look".
Yet, I don't want to close my eyes if I see things that clearly don't fit my biases. And I know a thing or two about security vulnerabilities.🧵
US or EU, Remote - Wiz - Threat Intelligence Researcher (Cloud)
Wiz has been doing some great work around TeamPCP lately, among other things.
According to LinkedIn ( https://www.linkedin.com/posts/benjamin-read-41817121_im-continuing-to-build-the-threat-intel-share-7442969734645608448-Gu-n?utm_source=share&utm_medium=member_desktop&rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o ) it's posted for US but open to EU. They're looking for two roles, one Cyber Crime and one Cyber Espionage.
(I am not affiliated with Wiz or at all involved in this hiring process.)
https://www.wiz.io/careers/job/4658917006/threat-intelligence-researcher-cloud
you know
multiple people now have said that the thing they like about LLMs is that they don't have to deal with feeling embarrassed or humiliated by bringing questions to others that the others will judge them for.
which like
y'all.
this is a classic "solving a people problem with tech and having horrible side effects as a result" situation
and perhaps y'all ought to be less fucking toxic and judgemental to your coworkers.
fuck.
Rust 1.94.1 has been released.
This point release fixes a few regressions that slipped into in Rust 1.94.0: an internal compiler error in Clippy, a small security issue in Cargo, and two issues in the standard library.
See the blog post for details: https://blog.rust-lang.org/2026/03/26/1.94.1-release/
I discovered a race-based vulnerability class in the Linux kernel: "Out-of-Cancel"
A structural flaw where cancel_work_sync() is used as a barrier for object lifetime management, causing UAF across multiple networking subsystems.
I wrote an exploit for CVE-2026-23239 (espintcp). It interleaves Delayed ACK timers, NET_RX softirqs, timerfd hardirqs, workqueue scheduling, and CFS scheduler manipulation to hit a ~Xµs race window.
Blog: https://v4bel.github.io/linux/2026/03/23/ooc.html
This is the race scenario diagram 😁: