Posts
3370
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated

After releasing his PoC for CVE-2024-49138, @ale98 is back with two new articles that provide background on , analyze two distinct patched by Microsoft’s KB5048685, and describe how to them.

https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-1

https://security.humanativaspa.it/cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis-part-2

0
3
0
repeated

Well, here's the cyberpunk part of the dystopia. Congrats Linux users, you're all criminals now.

Starting on January 19, 2025 Facebook's internal policy makers decided that Linux is malware and labelled groups associated with Linux as being "cybersecurity threats". Any posts mentioning DistroWatch and multiple groups associated with Linux and Linux discussions have either been shut down or had many of their posts removed.

https://distrowatch.com/weekly-mobile.php?issue=20250127#sitenews

6
8
0
repeated

@buherator yes, I don't remember where I took the filter from, but it's something like this: https://github.com/gijsdev/ublock-hide-yt-shorts/blob/master/list.txt works on desktop and mobile. keep on rocking 🤘

1
2
0
@obivan Awesome, I've been experimenting with an other filter I found but it didn't work, this one does, thank you!
0
0
1
@obivan Oh uBlock has a feature for shorts specifically? That's good to know thanks!

Anyway, I think I should block YT from my life altogether (listening to some fine deathmetal on Bandcamp rn :))...
1
0
0
I accidentally clicked a fucking YT short and it WON'T STOP PLAYING IF I START ANOTHER VIDEO!!
1
1
1
repeated

Via another "crazy security scanner" report, I learn that is installed in a Office and/or Teams install on Windows? According to the reddit post, in a normal install.

Does anyone know more?

The reddit page mentioning this: https://www.reddit.com/r/sysadmin/comments/1hx9eib/libcurl_vulnerability_in_office_and_teams/?sort=new

The libcurl mailing list post:

https://curl.se/mail/lib-2025-01/0086.html

1
3
0
repeated

David Sacks and OAI complaining about distillation is extremely rich considering OAI trained in all of Libgen. :-(

Everyone is r*tarded.

OpenAI says it has evidence China’s DeepSeek used its model to train competitor - https://www.ft.com/content/a0dfedd1-5255-4fa9-8ccc-1fe01de87ea6?shareType=nongift via @ft

3
2
0
[RSS] My electric toothbrush was acting up, so I tried to reboot it

https://devblogs.microsoft.com/oldnewthing/20250128-00/?p=110815

Life is an adventure!
0
0
0
repeated

Sent by Charles Adams from Inyokern, California, U.S.A. on May 20, 1996. https://postcardware.net/?id=43-13

0
1
0
GhidraDbg - A Python script that creates a bridge between #Ghidra and #WinDbg for dynamic driver analysis, allowing real-time synchronization of debugging states.

https://github.com/philsajdak/GhidraDbg

"The built-in Ghidra-WinDbg sync can be challenging to configure and maintain, often requiring specific connection settings and troubleshooting. This script aims to provide a more straightforward, feature-rich alternative."
0
0
3
repeated
repeated

jesus, Google Maps is going to change the names of the Gulf of Mexico and Denali. https://www.theverge.com/2025/1/27/24353450/google-maps-rename-gulf-of-mexico-america-mt-mckinley

10
10
0
@carnage4life "The use of Janus models is subject to DeepSeek Model License."
0
0
0
repeated

It’s Tuesday. How’s everyone holding up?

8
2
0
@turtle OK but can you do that very confidently?
1
0
1
repeated

Sitting in bed and using my portable data terminal to read about USA billionaire vs China military backed battling AI systems suspected of stealing our data and spying on us is exactly the cyberpunk future I was promised.

3
4
0
repeated

A detailed, well-written, and hilarious breakdown of the details of CVE-2024-55591, one of the latest Fortinet fiascos:

https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/

1
8
0
repeated

You know the drill.
Update your fruit.
At least one of these (CVE-2025-24085) is being used by attackers in the wild.
https://support.apple.com/en-us/100100

2
5
0
Show older