Posts
2515
Following
649
Followers
1466
"I'm interested in all kinds of astronomy."
repeated

Just released v0.8.0 - Ghidra 11.3 Support + PyGhidra ๐Ÿ”ฅ๐Ÿ‘€

This release uses the latest PyGhidra now officially supported by Ghidra ๐Ÿค“๐Ÿ’ช

https://github.com/clearbluejar/ghidriff/releases/tag/v0.8.0

๐Ÿ”‹ included!

0
5
1
Free advice for #UX designers:

The answer to the question "Should we show a survey/questionnaire to the user?" is always NO.
0
6
11
#music #deathmetal #stevensegal
Show content
The Album Cover of the Year Contest starts off pretty strong!

I mean how would you beat Schwarzenegger teaming up with Gremlins and the Cobra Commander (and others) to mutilate the clones of Steven Segal?

https://listenable-records.bandcamp.com/album/big-trouble
0
0
1
@recon any news about 2024 recordings?
1
0
0
repeated

Recon 2025 Have been Annonced! 20th year Anniversary https://recon.cx June 23-29.

1
6
1
@cR0w @screaminggoat I will never not like this meme!
0
0
3
repeated

Picard management tip: It's okay not to know things. Practice saying "I don't know." Go ahead. Say it.

1
2
0
repeated

Kennt ihr ?

Ist ein coverage-guided REST-Fuzzer und Open-Source.

Bin heute darรผber gestolpert und dacht das ist teilenswert.

https://github.com/TNO-S3/WuppieFuzz

0
4
0
repeated

Our blog site is having a moment, and @TheDustinChilds is stuck on a plane in DFW, but nothing stops Patch Tuesday. There's 2 Microsoft bugs being exploited in the wild and some things we've never seen before. Read all the details at https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review

0
2
0
repeated

CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog

  • CVE-2025-21418 (7.8 high) Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability
  • CVE-2025-21391 (7.1 high) Microsoft Windows Storage Link Following Vulnerability
  • CVE-2024-40890 (8.8 high) Zyxel DSL CPE OS Command Injection Vulnerability
  • CVE-2024-40891 (8.8 high) Zyxel DSL CPE OS Command Injection Vulnerability

The Zyxel stuff is not new, but since the Microsoft zero-days are part of , I'm including them in this conversation.

1
2
0
repeated
repeated

Happy from Microsoft: 4 ZERO-DAYS (2 EXPLOITED) out of 56 new CVEs

  • CVE-2025-21377 (6.5 medium) NTLM Hash Disclosure Spoofing Vulnerability (PUBLICLY DISCLOSED)
  • CVE-2025-21194 (7.1 high) Microsoft Surface Security Feature Bypass Vulnerability (PUBLICLY DISCLOSED)
  • CVE-2025-21418 (7.8 high) Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (EXPLOITED)
  • CVE-2025-21391 (7.1 high) Windows Storage Elevation of Privilege Vulnerability (EXPLOITED)

2
3
0
Cisco Talos is grinding through NVIDIA nvJPEG2000, check out their vulnerability reports page for details:

https://talosintelligence.com/vulnerability_reports#disclosed

CVE-2024-0142, CVE-2024-0143, CVE-2024-0144, CVE-2024-0145
0
1
4
[RSS] Exploring a VPN Appliance: A Researcher's Journey [CVE-2024-46666, CVE-2024-46668]

https://www.akamai.com/blog/security-research/2025-february-fortinet-critical-vulnerabilities

"We%27ll go through the processes of getting the firmware, decrypting, setting up a debugger, and finally looking for vulnerabilities." -> Mad respect!
0
1
0
That's it, I unsubscribed Sonar because of their shitty RSS :P
0
0
2
repeated
repeated

Good tools are made of bugs: How to monitor your Steam Deck with one byte.
Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming.
A Christmas gift in February, brought to you by the incredible @pwissenlit ๐Ÿซถ

https://blog.quarkslab.com/being-overlord-on-the-steam-deck-with-1-byte.html

0
7
0
repeated
repeated

ElecticIQ: Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
EclecticIQ analysts assess with high confidence that Sandworm (APT44), a threat actor supporting Russia's Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia's invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER, a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT), enabling attackers to exfiltrate sensitive data and conduct cyber espionage.

Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145, based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm's involvement. Yara and Sigma rules, and Indicators of Compromise are listed.

0
2
0
repeated
Show older