Posts
2910
Following
693
Followers
1517
"I'm interested in all kinds of astronomy."
repeated
Edited 15 hours ago

Interesting links of the week:

Strategy:

* https://www.ofcom.org.uk/siteassets/resources/documents/consultations/7986-cfi-security-resilience/annexes/detica-report.pdf?v=334114 - the start of OFCOM's journey to improve telecomms (from 2013)
* https://www.ncsc.gov.uk/blog-post/cyber-deception-trials-what-weve-learned-so-far - sometimes it's okay for NCSC to be deceptive
* https://arxiv.org/pdf/2512.03641 - modelling adversary decisions
* https://www.ncsc.gov.uk/blog-post/what-makes-a-responsible-cyber-actor - NCSC discuss responsible threat actors
* https://www.interface-eu.org/publications/cyber-red-flags - just what makes an irresponsible threat actor
* https://www.csis.org/analysis/criteria-cyber-situational-awareness - what does situational awareness mean in cyber
* https://www.redteammaturity.com/ - a maturity model for red teams
* https://redteam.guide/ - a handy guide to red team capability
* https://engage.mitre.org/ - if ATT&CK is operational, where do you start with forward planning your operational capability

Standards:

* https://www.rfc-editor.org/rfc/rfc6918.html - deprecating the fun bits of ICMP

Threats:

* https://medium.com/@meeswicky1100/unmasking-a-new-dprk-front-company-dredsoftlabs-bf9ed544d690 - beware of DredSoftLabs, a North Korean enterprise
* https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/ - CrowdStrikes latest missive on naughty pandas

Detection:

* https://api.gcforum.org/api/files/public/upload/c77233d5-139d-4fbd-a1a4-793a6f29916b_STC-report.pdf - spotting spoofed callers

Exploitation:

* https://scrapco.de/ - fun projects from @buherator
* https://bl4ckarch.github.io/posts/PrintSpoofer_from_scratch/ - spoofing the printer
* https://zplin.me/papers/GREBE.pdf - deep dive on Linux kernel bugs and exploitability
* https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/ - winning races with the Linux kernel

Hard hacks:

* https://ioninja.com/ - manipulating protocols at the bits and bytes
* https://blog.byteray.co.uk/critical-vulnerabilities-in-rut22gw-industrial-lte-cellular-routers-f4eb8768feb7 - LTE modems go brrrrrrr
* https://mp.weixin.qq.com/s/mfXBJmTuDsE5Y5ufbffkjw?poc_token=HL9bPGmjQcx4HjY2q6nc3pvfsIFWuwnJf-vGJx33 - attacking the Globalstar uplink

Nerd:

* https://oswatcher.github.io/frontend/ - how Windows has changed over time
* https://social.coop/@eb/115646613032814668 - @eb's prompt for F/OSS projects

,

0
3
1
[RSS] ActivID administrator account takeover : the story behind HID-PSA-2025-002

https://www.synacktiv.com/publications/activid-administrator-account-takeover-the-story-behind-hid-psa-2025-002.html
0
0
1
repeated

When seven German journalist students do a better job of tracking down the sources of the drone flights over Europe than the security services...

https://www.digitaldigging.org/p/they-droned-back

7
24
0
repeated
repeated

Day 12 of Advent of Compiler Optimisations!

Your loop checks the same condition every iteration, even though it never changes. Seems wasteful, right? The compiler thinks so too—and its solution is something that sounds completely backwards. Making your code bigger to make it faster? What's the trick?

Read more: https://xania.org/202512/12-loop-unswitching
Watch: https://youtu.be/-VCrYshE7iQ

0
4
0
@VoltPaperScissors The DMV sloth with a painfully slow stamping hand from Zootopia? :D
0
0
1
repeated

Free Micropatches for Windows Remote Access Connection Manager DoS (0day)
https://blog.0patch.com/2025/12/free-micropatches-for-windows-remote.html

1
3
0
@dey "flying in airplanes used
to be fun, but now it resembles a dystopian bin-packing problem in which
humans, carry-on luggage, and five dollar peanut bags compete for real estate while crying children materialize from the ether and make obscure demands in unintelligible, Wookie-like languages while you fantasize about who you won’t be helping when the oxygen masks descend."

Hope this cheers you up :) https://www.usenix.org/system/files/1309_14-17_mickens.pdf
1
0
1
repeated

"Base Score: 9.8 (Critical)"

https://hackerone.com/reports/3462525

4
3
0
repeated

If you just updated React / NextJS for , you now get to update again. Two additional vulnerabilities identified in follow-up work were just published: CVE-2025-55183 (DoS), CVE-2025-55184 (Source Code Exposure)

https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components

https://nextjs.org/blog/security-update-2025-12-11

0
6
0
[RSS] exploits.club Weekly(ish) Newsletter 93 - Old QEMU Bugs, Android Auto Bluetooth PoCs, BeeStation P20, and More

https://blog.exploits.club/exploits-club-weekly-ish-newsletter-92-s23-n-day-pocs-printer-overflows-dng-oob-writes-and-more-2/
0
0
0
@Viss you don't really talk about it because 1) NDA 2) you look at the damn code all the time?
0
0
1
@mttaggart I thought the "can't be bothered" needs a bit more nuance, that's all
1
0
1
repeated

Finally pushed an update to my

tl;dr life is distracting and having a young kid makes this harder to keep-up with

https://git.sr.ht/~louismerlin/december-adventure

0
2
0
@mttaggart Hiring is hard though, esp for SMBs. And at that level you are proper f'd if the guy says bye after a year for whatever reason. SaaS/cloud is more reliable than that.
1
0
1
repeated

Open Source Security mailing list

Exim 4.99: Remote heap corruption https://www.openwall.com/lists/oss-security/2025/12/10/1
In vulnerable configurations, a remote, unauthenticated attacker can achieve heap corruption. No exploit for remote code execution yet, but it may be possible. No further details published yet, until the fix goes public.

0
6
0
Show older