Posts
3124
Following
708
Followers
1551
"I'm interested in all kinds of astronomy."
repeated

Timeline cleanse: pleased to report that Greg is still blowing stuff up with electricity https://www.youtube.com/watch?v=Cse3pUxvecY

0
3
0
repeated

🚧 What do dancing babies, "under construction" signs, and bubble-gum-blowing Furbys tell us about digital preservation? In the latest essay for the Internet Archive's Vanishing Culture series, writer JD Shadel explores the rise, fall, and cultural legacy of early Internet GIFs—and why they matter today.⁠

🔗 https://blog.archive.org/2025/02/05/vanishing-culture-what-early-internet-era-gifs-show-us-about-preserving-digital-culture/

🕳️

1
6
0
repeated

@AAKL @Mandiant
Having a healthy amount of skepticism is perhaps the most important skill that one can have in this industry. 😂

0
2
0
repeated

"Thinkers like Jean-Paul Sartre and Hannah Arendt warned us that the point of this deluge is not to persuade, but to overwhelm and paralyze our capacity to act. More recently, researchers have found that the viral outrage disseminated on social media in response to these ridiculous claims actually reduces the effectiveness of collective action.

The result is a media environment that keeps us in a state of debilitating fear and anger, endlessly reacting to our oppressors instead of organizing against them."

https://www.404media.co/you-cant-post-your-way-out-of-fascism/

12
21
0
@neodyme You guys keep hitting _really_ close to my interests :D (https://silentsignal.hu/docs/OffensiveCon22-Case_Studies_of_Fuzzing_with_Xen.pdf - maybe there are some useful tips in here too?)
1
0
0
repeated

🪝Introducing HyperHook! 🪝
A harnessing framework for snapshot-based using Nyx. ⚒️
HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient!
🔗 Read more: https://neodyme.io/en/blog/hyperhook/

2
3
0
repeated

Cisco security advisories (PatchTuesday-ishing @shellsharks):

"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."

1
2
0
repeated

In response to a popular demand, here is DOOM running on Apple Lightning to HDMI dongle

https://youtu.be/4XCkeN0XuqA?feature=shared

0
7
0
repeated

Veeam: CVE-2025-23114
CVE-2025-23114 (9.0 critical) A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code on the affected appliance server with root-level permissions. This CVE impacts multiple versions of Veeam Backup. No mention of exploitation. h/t: @cR0w

0
2
0
repeated

While working on a nday vulnerability research project, we stumbled upon a vulnerability in the core of the TCP subsystem of the Linux kernel. We reported it upstream, which was fixed in May of last year. This blog post shares how we came across it and our vulnerability analysis. It is a reference counter issue, and a mechanism in the Linux kernel usually prevents those issues from being exploitable. Still, in this case, it could even be with the mechanism present. Read it and see how it could be done.

Accidentally uncovering a seven years old vulnerability in the Linux kernel

https://allelesecurity.com/accidentally-uncovering-a-seven-years-old-vulnerability-in-the-linux-kernel/

0
4
0
repeated

Zyxel says it has no plans to release patches for two zero-days under active attack and is advising customers to replace vulnerable routers.

The company says these devices have been “end of life for years” - but the devices are not listed on Zyxel’s EOL page, and some are still available to buy on Amazon https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/

2
4
0
repeated

Embrace. This is the new CVE I expect I will get a fair amount of... "traffic" about: https://curl.se/docs/CVE-2025-0725.html

6
5
0
[RSS] Micropatches Released for Windows Task Scheduler Elevation of Privilege Vulnerability (CVE-2024-49039)

https://blog.0patch.com/2025/02/micropatches-released-for-windows-task.html
0
0
1
repeated

We've been collecting and mirroring what we can find of public data scrapes of data that has recently gone missing from federal sites or is likely to in the near future. The repos here include public data from CDC, NIH, and NOAA. Be warned that some of these repos are quite large!

https://git.lsit.ucsb.edu/publicdata

3
5
0
#uspol
Show content
0
0
0
Edited 11 months ago
@_dm "Speedrunning engineering failures" is the new "Speedrunning the failures of the financial system"?
0
0
0
repeated

Unofficial continues with Google Chrome: Stable Channel Update for Desktop
Chrome 133.0.6943.53 (Linux) and 133.0.6943.53/54( Windows, Mac) includes 12 security fixes, 3 are externally reported:

  • CVE-2025-0444 (high) Use after free in Skia
  • CVE-2025-0445 (high) Use after free in V8
  • CVE-2025-0451 (medium) Inappropriate implementation in Extensions API

No mention of exploitation.

0
2
0
@krypt3ia The state of the industry is well illustrated by the fact that people take THN seriously...
0
0
0
repeated

@SecurityWriter one time, a trillion years ago, i did an assessment for a biotech company here in san diego. they wanted me to spend a few days going after their fat client. it talked to a server and had something to do with creating mollecules.

it had, by design, the ability to squirt arbitrary bash/python/php/etc into its server end - by design.

i tried to explain how this could be abused but they said "Pff.. who would ever do that?!" and wrote me off outright.

then they went to cloud

1
2
0
Show older