Posts
2452
Following
555
Followers
1266
A drunken debugger

Heretek of Silent Signal
SEC Consult SA-20241024-0 :: Unauthenticated Path Traversal Vulnerability in Lawo AG - vsm LTC Time Sync (vTimeSync) (CVE-2024-6049)

https://seclists.org/fulldisclosure/2024/Oct/7
0
0
0
@artemis I think the LLM part is only the symptom of general degradation of human writing skills: people find LLM's useful because they are struggling with writing in the first place and "AI checkers" are tuned based on the inputs of these very people.
0
0
0
repeated

This makes me want to scream and pull out my hair.

"Reduce your vocabulary by 10-20% to prove you're a human."

5
20
2
repeated

The Apple Security Research blog now has an RSS feed, though it’s not properly advertised.

https://security.apple.com/blog/feed.rss

0
2
0
repeated

A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://ssd-disclosure.com/ssd-advisory-common-log-file-system-clfs-driver-pe/

0
1
0
@azonenberg It seems like an interesting problem to quantify to the extra frontend development cost (and UX problems) of other frameworks...
0
0
2
repeated

Has anyone attempted to calculate the overall environmental / energy consumption of Electron, vs if the most popular applications using it were rewritten in a more efficient native framework?

1
1
0
repeated

It has now been twelve years since the paper "The most dangerous code in the world: validating SSL certificates in non-browser software" was published.

My blog post about it from back then: https://daniel.haxx.se/blog/2012/10/25/libcurl-claimed-to-be-dangerous/

It'd be interesting to know how much HTTPS clients are still skipping cert verification in the wild. I bet it is still widespread.

1
1
0
repeated
repeated

@buherator call me vain - but that there’s no reference to the original research behind the field work makes me sad. https://m.youtube.com/watch?v=3HFiv7NvWrM & https://github.com/sensepost/birp

@mainframed767 is involved though and is the OG progenitor of so much of it, who’s still working on it.

2
3
1
[RSS] It rather involved being on the other side of the airtight hatchway: Defeating ASLR after you've gained RCE via ROP

https://devblogs.microsoft.com/oldnewthing/20241024-00/?p=110417
0
0
0
[RSS] Tales from the Call-Gate: An SMM Supervisor Vulnerability

https://labs.ioactive.com/2024/10/tales-from-call-gate-smm-supervisor.html
0
1
3
repeated

the https://32bit.cafe team ( @yequari, @flamed, jay, & @cooperationiskey) did a group interview for the FROM THE SUPERHIGHWAY newsletter! so so so cool to feel seen with what we're doing and be able to answer thoughtful questions about the and hobby web development :)

read the issue here:

https://fromthesuperhighway.com/issues/issue02

0
1
0
repeated

"Inside the U.S. Government-Bought Tool That Can Track Phones at Abortion Clinics"

An excellent @404mediaco investigation into "Locate X", a tracking tool that uses ad-tracking tech -- specifically, "mobile advertising identifiers" -- to follow people around

https://www.404media.co/email/f4992514-a605-4579-9a75-3d0707758e03/

3
4
0
repeated

Today I learned that GNU tar does network connections if you say "foo:bar", it tries to resolve "foo". FFS, wasn't the Unix philosophy to do one thing and do it well? Luckily there's a "--force-local" option to GNU tar to avoid it doing remote connections.

Sorry if you're in trouble now, either reviewing your tar calls in your application and whether they can take user input as filename -- or if this was part of your exfiltration or attack on a system.

3
14
0
repeated

VR News To Your Inbox Every Thursday 📰 EC 44 out now ‼️

@reodus_ gives you a virtual memory refresher

SELinux bypasses from @klecko0

@zeroclicksh VirtualBox Escape write-up

A binder bug analysis from @maherazz2

+ jobs and more 👇

https://blog.exploits.club/exploits-club-weekly-newsletter-44-itw-android-privescs-virtualbox-escapes-cross-process-spectre-exploitation-and-more/

0
2
0
repeated

Glad this is finally live: https://security.apple.com/documentation/private-cloud-compute

Getting started with the Virtual Research Environment: https://security.apple.com/documentation/private-cloud-compute/virtualresearchenvironment

"The PCC Virtual Research Environment (VRE) requires a Mac with Apple silicon with at least 16GB of unified memory and the latest macOS 15.1 Developer Preview. For optimal VRE performance, we recommend using a Mac with at least 24GB of unified memory.”

0
5
0
repeated

Y’all know that CNN has a text-only web interface, right?

If you want to experience how GODDAMN FAST the web can be without the tens of megabytes of adware tracking cruft and hundreds of npm dependencies, try this out:

https://lite.cnn.com

9
28
1
Show older