Posts
3985
Following
730
Followers
1608
"I'm interested in all kinds of astronomy."
repeated
Edited 5 minutes ago

I'm incredibly pleased to announce that the microcode for the Intel 80386 has been decoded.

It was a group effort by a bunch of talented people to extract and correct the physical bits, but the major work of decoding them was done by reenigne - you may know him from such incredible PC demos as 8088 MPH and Area 5150, as well as being the person who decoded the 8088 microcode previously.

Please, check out his writeup.

https://www.reenigne.org/blog/80386-microcode-disassembled/

2
11
1
repeated
Edited 5 hours ago

If you run a peertube instance and have not patched in the past 4 hours, you are way behind and likely have been compromised. The latest patch will help clean up the mess.

See here: https://github.com/Chocobozzz/PeerTube/releases/tag/v8.1.8

2
13
0
[RSS] A blueprint for formal verification of Apple corecrypto

https://security.apple.com/blog/formal-verification-corecrypto
0
0
0
repeated

Fun fact, a web upload trigger gives you root read access on the Tolino Vision Color, but im not even sure if they are in general just more open for tinkering.

7" Full Color Linux eink reader for 200€ is anyway more on the expensive side

0
2
0
repeated
void shitIDo(bShouldCrash){
if (!bShouldCrash){
crash();
}else{
while(1){}
}
}
0
0
0
repeated

Semgrep listed by Qilin. Oof.

1
6
0
repeated
repeated

Hello and welcome to ! This time with proper capitalisation. :-)

The die of today is named HD6483153 and is designed by Hitachi. It fell out of a SIM card. I do not know what commercial p/n this is, if it was ever assigned one. If anyone can provide any details on what smart cards were made by Hitachi, please do so! In the meantime, we shall explore a bit. 🧵

Full-res map: http://infosecdj.net/map/hitachi/hd6483153/infosecdj_mz_nikpa40x_2/

EDIT: This is H8/3153, part of the H8/3150 series.

1
2
0
repeated

🏆 Nominations for the 2026 Burp Suite Extension Awards close THIS TUESDAY ⚠️

Week 3 of Extensibility month is almost wrapped - here's what happened, what's still to come, and how to get your nomination in before it's too late 👇

0
4
0
When you can make $thing enter debug mode without docs, before your first and/or after your sixth coffee you know you've spent way too much time on $thing.
0
0
1
@orlysec Physical implant + Solaris rootkit :O
0
0
0
repeated

(picussecurity.com) UNC2891: Anatomy of a Sophisticated Bank Heist Using CAKETAP Rootkit and Raspberry Pi-Based Attacks

UNC2891, a financially motivated threat group active since 2017, has executed sophisticated attacks on banking infrastructure using custom malware and physical access vectors. Their latest campaign in Q1 2025 involved planting a 4G-enabled Raspberry Pi on a bank’s network switch to bypass perimeter defenses, enabling ATM fraud via Payment HSM manipulation.

In brief - UNC2891 targets financial institutions with advanced Linux/Solaris malware, including the CAKETAP rootkit, to authorize fraudulent ATM withdrawals. A recent attack used a Raspberry Pi for initial access, highlighting evolving physical and digital threats to banking systems.

Technically - UNC2891 employs CAKETAP (Solaris kernel rootkit) to hook system calls like `mkdirat` and `ipcl_get_next_conn`, enabling stealthy C2 and network manipulation. SLAPSTICK (PAM backdoor) captures credentials, while TINYSHELL (backdoor) communicates over raw TCP (ports 53/443). Tools like WINGHOOK (keylogger) and STEELHOUND (in-memory dropper) facilitate credential harvesting and payload execution. The CAKETAP variant on ATM switches bypasses card/PIN verification by replaying HSM responses.

Source: https://www.picussecurity.com/resource/blog/unc2891-bank-heist-explained-caketap-rootkit-and-raspberry-pi-attack

1
3
0
@troed If you could pour the 100 best sw engineers in the world to a similar case that wouldn't be effective either (the current management tier is likely insufficient to handle the numbers).

The initiative is good though, it's just easy to have the wrong expectations about short-term results.
0
0
0
repeated

RE: https://mastodon.social/@marver/116617742819891906

If you don't recognize "Starlette":

"Starlette is the foundation of the FastAPI Python framework."

... and everything uses FastAPI.

1
5
0
@troed Keep in mind that - as described in The Mythical Man-Month - suddenly throwing human resources to a project doesn't necessarily help to reach its milestones.
1
0
0
repeated

Patch Starlette now! If you're run it via uvicorn or other common ASGI servers then a host header parsing issue can lead to vulnerabilities leading from auth bypass up until RCE! Examples for affected packages are liteLLM, vllm, etc... Here is the X41 Advisory:

https://x41-dsec.de/lab/advisories/x41-2026-002-starlette/

0
6
0
[RSS] CVE-2026-9082 | Drupal SQL Injection Vulnerability

https://horizon3.ai/attack-research/vulnerabilities/cve-2026-9082/
0
0
0
[RSS] CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox

https://voidsec.com/cve-2026-40369-browser-sandbox-escape/

This is another writeup of a Windows sandbox escape that multi-collided during P2O
0
0
0
Show older