Posts
3935
Following
728
Followers
1602
"I'm interested in all kinds of astronomy."
repeated

Exclusive: Fast16 malware has raised questions about what it was designed to do. Researchers at Symantec finally confirm it was subverting software used to simulate nuclear weapons explosions. Nuclear experts also tell me Iran was the likely target and explain how it impacted nuclear weapons tests. Fast16 wasn't aimed at sabotaging nuclear weapons themselves, but was only designed to alter data being fed to engineers from software used to simulate nuclear explosions tests. The goal was to trick engineers into believing their tests were failing to create confusion and slow down weapons program. Fast16 and Stuxnet were similar in that they both fed false data to engineers. But Stuxnet also physically altered centrifuges while tricking engineers into believing the devices were fine. New analysis from me also shows the two codes were contemporaneous, not separated by years.

Here's my story, which contains a link to a timeline showing how they were being developed around the same time, likely as part of a multi-pronged operation to slow down Iran's nuclear program.

https://www.zetter-zeroday.com/experts-confirm-the-fast16-malware-was-sabotaging-nuclear-weapons-tests-likely-in-iran/

1
14
0
repeated
Edited 5 hours ago

New from Nightmare-Eclipse, we have MiniPlasma

Works reliably to get a SYSTEM cmd.exe prompt on Win11 (including 26H1) with May's updates. Is reportedly a failure to properly fix CVE-2020-17103. I'll note that it does not seem to work on the latest Insider Preview Canary Windows 11.

1
5
0
repeated

TrendAI Zero Day Initiative

We're back for the final day of Berlin! Yesterday we ended the day with $908,750 awarded, 39 unique 0-days, and DEVCORE with a commanding lead for Master of Pwn. What's in store for today? Follow along for live results!

0
2
0
repeated

TrendAI Zero Day Initiative

Aaaand it's official! Orange Tsai (@orange_8361) of DEVCORE Research Team chained 3 bugs to achieve Remote Code Execution as SYSTEM on Microsoft Exchange, earning a whooping $200,000 and 20 Master of Pwn points. Full win!

0
4
0
ssh-keysign-pwn: Steal SSH host private keys and /etc/shadow via the ptrace_may_access mm-NULL bypass

https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
0
4
3
repeated

@jhr77 @christopherkunz @buherator
Ah, so this is fascinating.

It appears that Microsoft did NOT address RedSun. They merely added a definition to discover the post-modified TieringEngineService.exe binary (which is the RedSun.exe file itself).

And if you aren't careful, like I wasn't, you might at a glance think that Microsoft broke the RedSun exploit. But that is wrong! They merely now detect the post-exploit-modified binary that RedSun chooses to modify. πŸ€¦β€β™‚οΈ

1
3
0
repeated

They: "On a scale from 1 to 10: How lazy are you?"

Me: Using copy fail instead of sudo to gain root to avoid having to type my password

2
15
1
repeated

Has anyone ENCHANTED any cool WEAPONS lately?

#wizardposting #wizard
2
1
0
repeated
repeated

TrendAI Zero Day Initiative

It's official! Kentaro Kawane of GMO Cybersecurity by Ierae chained 2 Use-After-Free bugs to escalate privileges on Microsoft Windows 11 in the third round, earning $15,000 and 3 Master of Pwn points.

0
2
0
repeated
Edited 2 days ago

Calif demonstrates a not-yet-fixed data-only macOS kernel LPE. MIE, which is available on M5 Macs, does not thwart the attack.
https://blog.calif.io/p/first-public-kernel-memory-corruption

0
2
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament. The DTA is a political/think tank/civil society/industry initiative that hopes to foster a tech-ecosystem on which we can continue to run our European democracies. Because it is not looking good. Useful progress was made, and here is what I learned: https://berthub.eu/articles/posts/democratic-tech-alliance-may-2026/

1
4
0
repeated

TrendAI Zero Day Initiative

In a video highlight from Day 1 of Berlin, Orange Tsai of the DEVCORE Research Team takes on Microsoft Edge with a sandbox escape! He earns $175,000 and 17.5 Master of Pwn points. https://youtube.com/shorts/8ngMzEVrdVs?feature=share

0
2
0
repeated

TrendAI Zero Day Initiative

Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it.

0
2
0
@lina Proper automation has an upfront cost, and I think this is what ppl try to avoid. It's not uncommon that people wait for frontier models to get better at deciding on logical conditions instead of writing two if's...
0
1
7
repeated

Hoshino Lina (ζ˜ŸδΉƒγƒͺγƒŠ) 🩡 3D Yuri Wedding 2026!!!

I worked at a fairly big tech co years before the AI boom. People did large scale refractoring across huge code bases back then. With refactoring tools. And properly written robots.

Applying changes to code at scale, opening PRs automatically, basic interaction with human reviewers, making sure tests pass, getting things merged when ready. All that already existed before LLMs. And it was actually reliable and not capable of hallucinating terrible things.

It's like we've forgotten how to automate things without LLMs and openclaw now...

3
8
0
repeated

TrendAI Zero Day Initiative

Amaze! Amaze! Amaze! Orange Tsai of DEVCORE Research Team was able to exploit Edge with a sandbox escape! If confirmed, we wins $175K. He's off to the disclosure room to explain how he did it.

0
3
0
repeated

TrendAI Zero Day Initiative

Boom! Valentina Palmiotti wastes no time kicking off Berlin in style. She requires just a few second to get code execution on the NV Container Toolkit. She heads off to the disclosure room to provide all the details.

0
3
0
repeated
Edited 2 days ago

I have published 3.4.0. Now you can install it in IDA by just running this:

$ hcli plugin install diaphora

https://github.com/joxeankoret/diaphora/releases/tag/3.4.0

2
3
1
Show older