Posts
3377
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
[RSS] [Microsoft] Toward greater transparency: Publishing machine-readable CSAF files

https://msrc.microsoft.com/blog/2024/11/toward-greater-transparency-publishing-machine-readable-csaf-files/
0
0
0
repeated

Down since the archive had to retool, emulation in the browser at @internetarchive is BACK.

A quarter million programs and growing can run free again.

But all anyone cares about is our #1 title:

https://archive.org/details/msdos_Oregon_Trail_The_1990

0
8
0
repeated

NIST standardisation organisation says that systems must phase out non-quantum-resistant cryptography by 2035. RSA, ECDSA, ECDH disallowed as insecure. https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf

1
3
0
repeated
repeated

"Ross Anderson had agreed with his publisher, Wiley, that he would be able to make all chapters of the 3rd edition of his book Security Engineering available freely for download from his website. These PDFs are now available there." ๐ŸŽ‰ ๐Ÿ’”

https://www.cl.cam.ac.uk/archive/rja14/book.html

(As noted at: https://www.lightbluetouchpaper.org/2024/11/12/sev3-download/ )

0
10
0
repeated

Why chatbots are terrible for search, and why retrieval augmented generation doesn't fix that: https://buttondown.com/maiht3k/archive/information-literacy-and-chatbots-as-search/ by @emilymbender

0
2
0
repeated

Happy from Citrix:

Please see the advisories for the prerequisites for each vulnerability.

1
1
0
repeated

Microsoft:
The BinaryFormatter type is dangerous and is not recommended for data processing... BinaryFormatter is insecure and can't be made secure.

Citrix:
We have the facts and we're voting Yes for using BinaryFormatter for processing data in our product.

CVE(s) TBD...

https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/

1
1
0
"Tomorrow, 10am, BinaryFormatter dies."
\o/

https://bsky.app/profile/blowdart.me/post/3lapy5gaou22h
0
1
2
repeated

Micropatches Released for Remote Registry Service Elevation of Privilege Vulnerability (CVE-2024-43532)
https://blog.0patch.com/2024/11/micropatches-released-for-remote.html

1
3
0
repeated

Check out the Snapshot Manager (https://github.com/d0mnik/binja_snapshot_manager), the latest community-plugin (https://github.com/Vector35/community-plugins ). That brings the total plugins in the plugin manager up to 166. How long before we break 200?!

0
2
0
repeated
repeated
New assessment for topic: CVE-2024-9464

Topic description: "An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. ..."

"Note: While this is an authenticated exploit, CVE-2024-5910 affects the same versions and allows an attacker to reset the admin password to allow authentication. ..."

Link: https://attackerkb.com/assessments/911948de-467d-4804-b97d-d943203fae60
0
3
0
repeated

EDIT: Hey y'all who've already boosted this! Sorry for the ping. ๐Ÿ™ƒ But I was a silly git and posted this from my personal account, not expecting it to take off like it did. If you'd like to follow my efforts and possibly support my work, follow me @ClarusPlusPlus@peoplemaking.games or @HadroSoft. Thanks! ๐Ÿ˜Š

---- Original toot follows ----

Remember when Stewart Chiefet and Bruce Tognazzini got miniaturized and put inside an Apple IIe to teach us how computers work?

*wistful sigh*

Technology used to be fun and not scary

1
2
0
repeated

Happy Patch Tuesday to those who celebrate.

1
2
0
repeated

lmao. so intel couldn't use their own new fab to do their latest chips, right.

so they went to tsmc. and negotiated a 40% discount somehow. and then told their customers you can't trust tsmc because they're close to china.

mr tsmc was like "what a discourteous fellow" and refused to honour the discount ๐Ÿ˜‚

1
3
0
repeated

E-crime groups have realised at scale three things in the past year:

A) orgs arenโ€™t very good at applying patches for defective SSL VPN products

B) security vendors are negligently and knowingly shipping defective SSL VPN products

C) many orgs arenโ€™t mandating MFA for VPN 100% of the time

Itโ€™s driving a lot of the incidents going on in the past year.

2
4
0
repeated

vArmor

vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that are ready to use out of the box.

https://github.com/bytedance/vArmor

0
1
0
[RSS] Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight

https://workos.com/blog/ruby-saml-cve-2024-45409
0
1
1
Show older