The next time someone says "Privacy doesn't matter to me, I've got nothing to hide", show them this video.
CUDA de Grâce
Talk by @chompie1337 and Samuel Lovejoy about exploiting a race condition that leads to a double-free in the NVIDIA GPU driver to escape a container created with NVIDIA Container Toolkit.
Video: https://www.youtube.com/watch?v=Lvz2_ZHj3lo
Slides: https://docs.google.com/presentation/d/1FgfURpMyHhnflGWtxeq8ClPPaB5ZDCzT/edit?usp=sharing
Marco Rubio just posted on Twitter:
The European Commission’s $140 million fine isn’t just an attack on X, it’s an attack on all American tech platforms and the American people by foreign governments. The days of censoring Americans online are over.
He did so after a few US companies got fined in EU for violation of laws regarding privacy and not only moderation of posts, but also the opposite - arbitrary deletion of legitimate content and refusal to restore it.
Seems like the secretary of state just discovered that if an US company wants to earn money in another country, that comes bundled with following its laws! Can you imagine?
For comparison, if an EU company wants to do business in US, it has to follow not only US federal laws, but also state laws and county (!) laws. Americans in EU have it much easier, because they enjoy laws that are largely harmonised among member states rather than the US mess of incompatible state laws and variable sales tax rates between counties.
What I'm listening to today: "RK 5000 bucket chain excavator - timelapse"
Why does this go so hard
Here's another crates.io security advisory, again many thanks to Socket!
Malicious crates `finch-rust` and `sha-rust` have been removed; they appeared to try to exfiltrate credentials stored in local files.
Our official announcement: https://blog.rust-lang.org/2025/12/05/crates.io-malicious-crates-finch-rust-and-sha-rust/
Socket's blog post with more technical analysis: https://socket.dev/blog/malicious-crate-mimicking-finch-exfiltrates-credentials
Also we're having discussions in Zulip in `t-crates-io
> how to announce takedowns?` about possible changes to these announcements.
Yesterday, after various bogus AI slopped "PoC"s, eventually a functional PoC for the React RCE emerged:
https://github.com/msanft/CVE-2025-55182
We now have a PoC from the reporter of the vulnerability as well:
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
🔴 We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: https://www.youtube.com/live/nzar2L4GUJ8
#cybersecurity #reverseengineering #binary #softwareengineering
You fail to realize you are on a honeypot.
https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/
Since I started to analyze #CVE-2025-55182 (#React, #NextJS #RCE) at work today, I decided to publish my analysis findings so far, given all the fuzz about the vulnerability: https://github.com/msanft/CVE-2025-55182
Feel free to contribute to the search for a proper RCE sink!
The ChatGPT outage the other day made me wonder if we will see DDoS crews hold AI services for ransom. Many of them have deep pockets and being down a day or two would hurt.
NEW: Staffers at notorious spyware maker Intellexa had live remote access to their customers' surveillance systems.
This allowed them to see the personal data of targets hacked with Intellexa's spyware Predator, according to new research based on a leaked training video.
Needless to say, this is bad for several reasons.