Posts
2457
Following
555
Followers
1263
A drunken debugger

Heretek of Silent Signal
"The xCyclopedia project attempts to document all executable binaries (and eventually scripts) that reside on a typical operating system."

https://strontic.github.io/xcyclopedia/intro
0
5
4
[oss-security] PostgreSQL: 4 CVEs fixed in 17.1, 16.5, 15.9, 14.14, 13.17, 12.21

https://www.openwall.com/lists/oss-security/2024/11/16/7

CVE-2024-10976, CVE-2024-10977, CVE-2024-10978, CVE-2024-10979
0
0
2
repeated
Qualys is at it again:

https://seclists.org/oss-sec/2024/q4/108

LPEs in needrestart (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992,
CVE-2024-10224, and CVE-2024-11003)
1
6
5
repeated

Vulnerability names: this is log4shell. We named it this way because it's in log4j and gives you shell.

Threat actor names: this is HAIRY EEL, aka VIOLIN HIPPO, no relation to VEXING MACKEREL. Also known as APT-74, formely APT-C-92. We named it this way because he's a guy in Bulgaria

4
10
0
repeated

Thinking of participating in Automotive? ZDI's Connor Ford provides a detailed look at the internals of the DMX958XR. This is the first in a series detailing the attack surface of the IVI. Read all the details (and gander at the pics) at https://www.zerodayinitiative.com/blog/2024/11/18/looking-at-the-internals-of-the-kenwood-dmx958xr-ivi

0
2
0
repeated

ZDI-24-1514|CVE-2024-11393] (0Day) Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVSS 8.8; Credit: The_Kernel_Panic) https://www.zerodayinitiative.com/advisories/ZDI-24-1514/

0
1
0
repeated

Hello! I've written 22,000+ words on "Safe" C++

https://izzys.casa/2024/11/on-safe-cxx/

7
8
0
repeated

If there’s no evidence that this investment is working, shouldn’t we either stop it, or at least increase the ways in which we’re trying to detect it?

But I’m going to go further. There’s few reasons to think that people are unaware of cybersecurity. It seems much more plausible that they’re unaware of what to do (stop clicking links?) or that there’s no clear tie between the things they worry about and the advice they’re getting. Either of those leads to them ignoring advice, or getting annoyed that we’re wasting their time.

Beyond that, we have scarce resources. Without evidence that an awareness month is working, and with good reason to think that it’s not...isn’t it time we stopped and tried something else?

(4/4, full post: https://shostack.org/blog/is-cybersecurity-awareness-month-worth-the-money/)

2
1
0
repeated

Paged Out! is out! Enjoy!
https://pagedout.institute/
And if you like the cover, check out the 8K wallpaper by Mark Graham (downloadable on our website)!

https://bird.makeup/@pagedout_zine/1858799166505234848

0
3
0
repeated

Finally got to publish the CVE for a "forever-day" path traversal in the .NET library DotNetZip affecting all releases since 2018. Enjoy, the PoC is in the patch! blobcatsuit

https://www.cve.org/CVERecord?id=CVE-2024-48510

2
7
0
Edited 4 days ago
I try to reconstruct the design process of PAN-OS web services:
- Let's require authentication on all interfaces, because security!
- ...but we need some stuff to be accessible pre-auth 🤔
- Let's define a skeleton key that can be passed to us by another parser that have 0 concept of what needs to be authenticated!

Am I missing something?

#PaloAlto
2
2
9
@wdormann to paraphrase: good software is expensive, but bad software is even more expensive.
0
5
9
@wdormann And still, companies will continue to pay insane money to buy these boxes of high-end engineering.
1
0
4
[RSS] Pluralistic: Canada's ground-breaking, hamstrung repair and interop laws (15 Nov 2024)

https://pluralistic.net/2024/11/15/radical-extremists/#sex-pest
0
0
0
@gsuberland This perfectly illustrates most days at dev/ops jobs too.
1
0
7
repeated

Boost this toot if you're planning on sticking around Mastodon whether or not it's more popular than Bluesky.

14
52
0
repeated

If only Sun Microsystems had purchased Apple when it had the chance, we could have had this magnificent device
https://alecmuffett.com/article/110670

0
2
0
repeated

Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 - watchTowr Labs https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/

0
2
0
Show older