Posts
3393
Following
713
Followers
1581
"I'm interested in all kinds of astronomy."
repeated

BREAKING: UnitedHealth has confirmed the ransomware attack and data breach on its Change Healthcare subsidiary in February 2024 now affects around 190 million people β€” almost double the previous estimate.

https://techcrunch.com/2025/01/24/unitedhealth-confirms-190-million-americans-affected-by-change-healthcare-data-breach/

5
8
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

@HalvarFlake - I promised to take a better look at the but initially I could find no detail. Now there is a new (brief) document that looks very urgent but I haven't yet studied it: https://euro-stack.eu/a-pitch-paper/

1
1
0
repeated
repeated

C IS LEGAL AGAIN

12
14
1
repeated

Me clicking on a restaurant website: I wonder when they're open and what they serve

Restaurant website: O U R M I S S I O N

7
8
1
repeated
TIL @tubetime has live streams on Twitch!
https://m.twitch.tv/tubetimeus
0
0
0
[RSS] CVE-2024-26230: Windows Telephony Service - It's Got Some Call-ing Issues (Elevation of Privilege)

https://starlabs.sg/blog/2025/cve-2024-26230-windows-telephony-service-its-got-some-call-ing-issues/
0
4
3
repeated

UI is hell, or why you can't design a four-function calculator: https://lcamtuf.substack.com/p/ui-is-hell-four-function-calculators

1
5
1
@wolf480pl As a first step I'd have filters for low-risk vuln classes for client and server side. E.g. I see a large chunk of effort being spent on theoretical XSS scenarios that will likely never be exploited:

https://github.com/v-p-b/xss-reflections
0
0
0
@bagder This somehow made the situation seem even worse?
0
0
1
This is new: CISA KEV adds an XSS vulnerability!

https://www.cisa.gov/news-events/alerts/2025/01/23/cisa-adds-one-known-exploited-vulnerability-catalog

The KEV page quotes (emphasis mine): "JQuery contains a *persistent* cross-site scripting (XSS) vulnerability" so this still doesn't seem to meet the bar for my XSS Reflections list:

https://github.com/v-p-b/xss-reflections

If anybody has more info about the related incident please lmk!
0
0
1
repeated

TrendAI Zero Day Initiative

And that’s a wrap! Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn.

0
2
0
[RSS] Memory corruption from outside the process looks like space aliens

https://devblogs.microsoft.com/oldnewthing/20250123-00/?p=110800

Full system instrumentation ftw :)
0
0
0
repeated

Every once in a while I have a really stupid idea, and then I sit down to write out what it would look like, and immediately spot a flaw in it that renders the whole thing insecure.

One of these days, one of my bad ideas is going to look back at me as someone else's implementation, deployed to production.

1
1
0
repeated

WinVisor: A proof-of-concept hypervisor-based emulator for Windows x64 binaries https://www.elastic.co/security-labs/winvisor-hypervisor-based-emulator

0
2
0
repeated

We are sharing backdoored Ivanti Connect Secure devices that *may* have been compromised as part of a CVE-2025-0282 exploitation campaign (but also we believe may include older or other activity).

379 new backdoored instances found on 2025-01-22:
https://dashboard.shadowserver.org/statistics/combined/tree/?day=2025-01-22&source=compromised_website&source=compromised_website6&tag=cve-2025-0282%2B&geo=all&data_set=count&scale=log

Data shared daily in our Compromised Website report https://www.shadowserver.org/what-we-do/network-reporting/compromised-website-report/ tagged 'backdoor;ivanti-connect-secure'

Dashboard tracker: https://dashboard.shadowserver.org/statistics/combined/time-series/?date_range=7&source=compromised_website&source=compromised_website6&tag=backdoor%2B&dataset=unique_ips&limit=1000&group_by=geo&style=stacked

Make sure to investigate your Ivanti Connect Secure instance if you receive an alert from us! @cisacyber mitigation advice is a good start https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282

Thank you to @certfi for the insights and detection methods!

0
5
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

Yesterday a user told me they couldn't log in to my parliamentary monitoring site. On investigating, I found that Microsoft email security was logging in on behalf of my user by executing a POST. This broke the single-use sign-on link. Executing POSTs is usually considered unacceptable, and in this way Microsoft again transgresses an important norm. Here's how to deal with the specific POST problem & what might be done about these transgressions in general:
https://berthub.eu/articles/posts/shifting-cyber-norms-microsoft-post/

11
7
0
repeated

Daniel Chateau donor (γ‚·γƒ£γƒˆγƒΌγƒ»γƒ€γƒ‹γ‚¨γƒ«)

2
3
0
repeated
Show older