Posts
2576
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
@ghosttie @mcc I guess you are right. On the grand scale of things the Universe won't be bothered by my pathetic compile errors :,(
0
0
0
repeated

The Trump family has reportedly had conversations about acquiring a stake in Binance — as Binance founder and former CEO Changpeng Zhao is reportedly seeking a pardon from the president.

2
4
0
repeated

Let's also talk about our failures!

We tried to make a consortium for a cool EU-funded project about malware analysis, but didn't manage to do it in time. 🫤

We'll try again! If you're an SME owned and controlled in the EU, feel free to get in touch 💪

https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/topic-details/digital-eccc-2024-deploy-cyber-07-keytech

0
2
0
repeated
repeated

@linkersec The bug exploited in the article appears to have also been reported by syzbot last year. And looks like it haven't been fixed upsteam yet, only in Ubuntu.

syzbot report: https://syzkaller.appspot.com/bug?extid=5f3a973ed3dfb85a6683
Ubuntu fix: https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/noble/commit?h=Ubuntu-6.8.0-57.59&id=09ad3b1e99befe042ae5219e4020eb54411d98ef

0
2
0
repeated

Linux kernel hfsplus slab-out-of-bounds Write

Outstanding article by Attila Szasz about exploiting a slab out-of-bounds bug in the HFS+ filesystem driver.

The author discovered that Ubuntu allows local (not remote/SSH'd) non-privileged users to mount arbitrary filesystems via udisks2 due to the used polkit rules. This includes filesystems whose mounting normally requires CAP_SYS_ADMIN in the init user namespace.

The article thoroughly describes a variety of techniques used in the exploit, including a cross-cache attack, page_alloc-level memory shaping, arbitrary write via red-black trees, and modprobe_path privilege escalation.

https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/

1
6
0
repeated
repeated

🌪️ TyphoonPWN is back for its 7th year at TyphoonCon! 💻💰
This year, we’re offering up to $70,000 for discovering and exploiting Linux Privilege Escalation vulnerabilities.
Remote participation is allowed, so grab your gear, sharpen your knowledge, and sign up: https://typhooncon.com/typhoonpwn-2025/

0
2
0
@greg ccls.nvim worked best so far, but now I'm wrestling with Emacs where I expected components like the tree buffers to be better integrated. Now I'm stuck because the keys for file manipulation don't seem to work if the tree displays code elements :P
0
0
1
@hajovonta Yeah, I got into this because I want static tooling :/
0
0
1
@greg Maybe disqualifying coc because of node was a mistake on my end...
1
0
0
@hajovonta Apparently people did the implementation, but documentation is seriously lacking. Unfortunately I don't feel I have the experience to contribute, otherwise I'd just open PR's like crazy.

Do you happen to have a solution for Emacs to generate call hierarchies (func1--calls-->func2) without LSP?
0
0
0
In case anyone is wondering why people use VSCode: I spent most of the day configuring LSP's for graybeard editors (vim/emacs) and God my head hurts!
1
0
5
[RSS] Advisory X41-2025-001: Multiple Vulnerabilities in OpenSlides

https://x41-dsec.de/lab/advisories/x41-2025-001-OpenSlides/
0
1
1
re: Twitter
Show content
@wdormann Their new name is "Xformerlytwitter". Catchy!
0
0
1
#hupol
Show content
@boby_biq @algernon I wrote this yesterday, based on the press since then seems like Tisza is on the same stance: https://infosec.place/notice/AsCvnGrmXQ1uSf5Ix6
0
0
2
How is that Sourcetrail development was not picked up by anyone?

https://github.com/CoatiSoftware/Sourcetrail
1
0
4
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Edited 1 month ago

Useful piece. Solar panels are largely cloud managed, and now in The Netherlands alone create the same power as 50 of our nuclear power plants. If you switch this 25GW on/off remotely, the consequences could be huge. And we do not regulate these cloud platforms at all: https://www.dw.com/en/how-hackers-capture-your-solar-panels-and-cause-grid-havoc/a-71593448

7
13
0
repeated

It seems that our Veeam CVE-2025-23120 post is live.

I would never do this research without @SinSinology He insisted a lot, thx man. 😅

If you know CVE-2024-40711, this vuln can be patch-diffed and exploit armed in 5 minutes. Unfortunately, it's super simple at this point.

https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/

0
6
0
Show older