Posts
2476
Following
561
Followers
1266
A drunken debugger

Heretek of Silent Signal
If it's stupid, but it works, it's not stupid.
It's technical debt.
1
4
8
Twitter account of note:

https://x.com/Fortibitch
0
1
1
repeated
Edited 2 months ago

SolarWinds: SolarWinds Access Rights Manager (ARM) Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2024-28991)
CVE-2024-28991 (9.0 critical, disclosed 12 September 2024) SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution.
Reported by Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative. No mention of exploitation.

EDIT: Piotr states that CVE-2024-28991 can be chained with CVE-2024-28990 (6.3 medium) SolarWinds Access Rights Manager (ARM) Hardcoded Credentials Authentication Bypass Vulnerability for pre-authenticated remote code execution.

2
2
0
repeated

I talk to the press largely to *combat* AI hype. It's beyond frustrating to be misquoted in ways that contribute to it instead.

New newsletter post:

https://buttondown.com/maiht3k/archive/correcting-the-record/

1
4
0
It seems after burning God knows how much money and CO2, OpenAI decided that *maybe* if you want to have anything close to "intelligence" you'll need some reasoning. Can't wait to see how they scale against this problem!
0
0
0
repeated

This is cool. We ported parts of the Windows MDM stack (used by Intune) to Linux!! Now you can use it to EASILY control the configuration and security posture of Linux VMs in Azure.

https://learn.microsoft.com/en-us/azure/osconfig/quickstart-sec-baseline-mc?tabs=azure-cli

0
3
0
repeated

Microsoft is building new Windows security features to prevent another CrowdStrike https://trib.al/otEVx6r

0
2
0
Some exploits are just three curl commands in a trench coat.
2
7
17
repeated

I FOUND IT.
it took nearly four hours, but i found it.

thank you for coming along with me into the mines of my twitter archive to find this gif. dropbox deleted this, and many others when they 'just decided' to delete all locally stored files, making all the stuff you had exist only in the cloud.

i fired them for this, and replaced them with synology drive, that I sync over wireguard.

4
2
0
See also:

WHITE ELEPHANT 0DAY EXCHANGE - https://pastebin.com/uTiAK34P
0
0
1
A colleague just wanted to gift me an InkJet...

https://en.wikipedia.org/wiki/White_elephant
1
0
1
repeated

You asked, and we delivered! Check out the new Microsoft Incident Response Ninja Hub for a compilation of the research and guides that the Microsoft IR team has developed over the years on threat hunting, case studies, and more.

https://techcommunity.microsoft.com/t5/microsoft-security-experts-blog/welcome-to-the-microsoft-incident-response-ninja-hub/ba-p/4243594

0
3
1
repeated

For those of you who might like it: Here are the slides from my Alligatorcon talk:
https://gergelykalman.com/the-forgotten-art-of-filesystem-magic-alligatorcon-2024-slides.html

1
6
0
repeated
Edited 2 months ago

Mozilla, reading the room extremely well, seemingly just recently flipped the switch to enable-by-default sponsored weather results from AccuWeather in every new Firefox tab you open. Clicking "Learn more" takes you here, with zero information on if your location is sent to AccuWeather every time you open a new tab: https://support.mozilla.org/en-US/kb/customize-items-on-firefox-new-tab-page

Probably only noticed because I normally have a blank new tab page but this showed up after updating Firefox!

2
17
1
Windows Wi-Fi Driver RCE Vulnerability – CVE-2024-30078

https://www.crowdfense.com/windows-wi-fi-driver-rce-vulnerability-cve-2024-30078/
0
0
1
repeated

CISA: Vulnerability Summary for the Week of September 2, 2024
Sometimes I check the summary for hidden gems. This time, five of the Mozilla Firefox CVEs are CVSSv3.1: 9.8 critical

  • CVE-2024-8381 type confusion
  • CVE-2024-8384 memory corruption
  • CVE-2024-8385 type confusion
  • CVE-2024-8387 memory corruption
  • CVE-2024-8389 memory corruption

At a glance, they're obviously high severity. It's just that you won't have that sense of urgency at the time of announcement because you didn't see the CVSS score, or understand the impact.

Let's not forget to mention Hall of Shame Progress Software for having LoadMaster vulnerability CVE-2024-7591 with a perfect 10.0 🥳

0
2
0
repeated
Show older