Exploiting CVE-2024-26581: use-after-free in Linux kernel nftables subsystem
The delayed import-table phantomDLL opportunities
https://hexacorn.com/blog/2024/09/14/the-delayed-import-table-phantomdll-opportunities/
I've implemented Conway's Game Of Life, in Conway's Fractran, in 416 fractions.
https://paste.sr.ht/~rabbits/046a86f42b74789fd5ea08657d253287b3847ffc
Looks like Newag isn't satisfied with how their civil lawsuit against us in Warsaw is going - because they just filed another one, this time in Gdańsk, and from another corporate entity they manage. And to add to the pile of arbitrary accusations, this time it's about unfair competition (again) and violation of their corporate personality rights (slander?).
Microsoft Security Response Center (MSRC) corrected CVE-2024-43461 (8.8 high) Windows MSHTML Platform Spoofing Vulnerability, marking it as both exploited and publicly disclosed based on evidence of exploitation from ZDI Hunting Team (see parent toot). This is the fifth zero day of September 2024 Patch Tuesday!
cc: @TheDustinChilds @campuscodi @briankrebs @todb @goatyell @ntkramer @hrbrmstr
#CVE_2024_43461 #eitw #activeexploitation #vulnerability #microsoft #msrc #zeroday #cve
Google Security Blog: A new path for Kyber on the web
#postquantum #chrome #kyber #mlkem #security #infosec #cybersecurity
My response when people ask me about the state of computer security:
(Modified from https://xkcd.com/2030/)