Posts
2522
Following
647
Followers
1462
"I'm interested in all kinds of astronomy."
Autonomously Uncovering and Fixing a Hidden Vulnerability in SQLite3 with an LLM-Based System

https://team-atlanta.github.io/blog/post-asc-sqlite/
0
0
2
repeated

Fortra security advisories:

No mention of exploitation. But shame on FileCatalyst for having hardcoded credentials. See related Bleeping Computer reporting: Fortra fixes critical FileCatalyst Workflow hardcoded password issue

0
2
0
Galaxy brain of @haifeili :
"Instead the vendor (you believe it's recklessly) asking you to provide more info, you ask them to provide their testing env & steps first. You want me to make a screen recording? Show your recording first."
2
1
3
repeated
repeated

📰 BinaryFormatter removed from .NET 9

Starting with .NET 9, we no longer include an implementation of BinaryFormatter in the runtime. This post covers what options you have to move forward.

https://devblogs.microsoft.com/dotnet/binaryformatter-removed-from-dotnet-9/

0
2
0
[RSS] CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability

https://www.thezdi.com/blog/2024/8/27/cve-2024-37079-vmware-vcenter-server-integer-underflow-code-execution-vulnerability
0
1
2
[RSS] Reverse engineering a Windows HDD firmware updater

https://syscall.eu/blog/2024/07/01/toshiba_hdd_firmware/
0
0
2
@Muddobbers @reverseics yes, you can configure url suggestions to include open tabs!
1
0
2
repeated

Micropatches were released for Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

1
2
0
repeated

Micropatches were released for "FakePotato" Local Privilege Escalation (CVE-2024-38100)

1
2
0
repeated

The "FakePotato" issue was discovered by Andrea Pierini (@decoder_it) of Semperis (https://semperis.com) and detailed in this article:
https://decoder.cloud/2024/08/02/the-fake-potato/

Despite Microsoft's advisory (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38100) only mentioning Windows Servers as being affected, we found this issue also affects Windows 10/11 computers, including those we have security-adopted.

Fortunately, even though Microsoft didn't list Windows 10/11 as affected, they did patch FakePotato on them with July 2024 updates.

We'd like to thank Andrea Pierini (@decoder_it) for sharing the details and POC for this vulnerability, which allowed us to create patches for legacy Windows users who are no longer receiving Microsoft's patches.

0
1
0
repeated

A-Dub 🏳️‍⚧️🏳️‍🌈

my university has converted our office telephones to Microsoft Teams. when i grumbled about this to a favourite sysadmin, this is how they responded 🔥

“Microsoft has actually brilliantly leveraged the lousy security landscape -- for which they are in no small part responsible -- to capture even larger market-share, as we now need commercial entities to produce the software required to protect us from their failures, and therefore need a more uniform environment to achieve the necessary scale. The uniformity then guarantees an ever greater scale for the inevitable conflagration. Monocultures guarantee one big fire instead of a bunch of small survivable ones. We really have no interest in learning from evolution, in no small part because it would produce fewer billionaires.

— Local Cranky IT Guy” [shared with permission]

3
27
1
repeated
Edited 1 year ago

According to https://httparchive.org/reports/page-weight, the median weight in KB for web page tech on desktop:

Over the last 14.5 years:

HTML
2010: 20KB;
mid 2024: 33KB;
Increase of 65%.

Images
2010: 229KB;
mid 2024: 1,062KB;
Increase of 464%.

JavaScript
2010: 89KB;
mid 2024: 640KB;
Increase of 719%.

- - -

Over the last 9 years:

Video
mid 2015: 173KB;
mid 2024: 3,872KB;
Increase of 2,238%.

I reckon that in the era of AI the JS gradient is gonna steepen significantly

2
5
0
repeated

Holy shit, the Rijksmuseum used a 100MP Hasselblad camera to take almost eight and a half THOUSAND photos of the whole of Rembrandt's The Night Watch, for a total image size of 717 GIGAPIXELS. 😳

It's on their website as a zoomable image and you can zoom in so far you can see the individual cracks in the paint: https://www.rijksmuseum.nl/en/stories/operation-night-watch/story/ultra-high-resolution-photo

0
20
1
repeated

@gsuberland @malware_traffic
Sure, some footguns come with safeties, which won't please everybody.

That doesn't change the fact that 7-zip skipping MotW propagation was done for...
*checks notes*
performance reasons.

https://sourceforge.net/p/sevenzip/bugs/1649/

1
1
0
repeated

Project Zero Bot

New Project Zero issue:

Qualcomm KGSL: reclaimed / in-reclaim objects can still be mapped into VBOs

https://bugs.chromium.org/p/project-zero/issues/detail?id=2548

CVE-2024-23384
0
1
1
repeated
Edited 10 months ago

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
Hot off the press! CISA adds CVE-2024-38856 (CISA-ADP: 8.1 high) Apache OFBiz Incorrect Authorization Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation.

cc: @ntkramer @hrbrmstr

0
1
0
repeated

We provisioned cloud infrastructure the Max Power way, showing that AI tools often generate code that works but has terrible security properties.
https://buff.ly/3X54ZSN

0
4
0
"Restarting the system to load the new processor microcode will not be handled automatically, so you should
consider rebooting."

Was this message written by an LLM?
0
0
1
repeated
Show older