Posts
2584
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
"A shell script for Linux that obfuscates + encrypts + packs any binary."

https://github.com/hackerschoice/bincrypter
0
2
5
repeated

It finally happened - I got phished. Impact is limited to the Mailchimp mailing list for my blog, brief blog post with details here and more to come later: https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/

14
11
0
repeated

When you get invited to the NatSec group chat....

3
22
1
repeated

Today, Wiz (Woogle?) released an advisory detailing an attack chain they’ve dubbed IngressNightmare, which, if left exposed and unpatched, can be exploited to achieve remote code execution by unauthenticated attackers. The advisory, covering five separate vulnerabilities, was published after a brief embargo period, once the Kubernetes folks got their patches together.

You can find a brief writeup and search queries for runZero at: https://www.runzero.com/blog/ingress-nightmare/

2
4
0
repeated

this is a text block, can you guess which spot that goes in? thats right, the div hole. and how about this spacer? that one, it goes in there too. up next, we got this picture, can you guess where that goes? thats right, it goes in the div hole. and up next, an unordered list. hmm. i think that goes in, the div hole. now i also got this ordered list right here, do you see a tag that would fit the ordered list? thats right! its the div hole. ‘kay. up next, its the underline, we all know what tag that goes into, right? thats right,. the div hole. and up next , we have the audio ., you guessed it, it goes in the div hole.

-carrie

0
5
1
repeated

@ojensen @mhoye I know where the 23andme building is, I can guess which ewaste facility they'd end up in

0
1
0
ICYMI my RSS->Bsky cross-poster now handles images:

https://github.com/v-p-b/rss2bsky.py
0
0
1
repeated

Open source maintainers, did you receive your first vulnerability report? Don't panic! Handling vulnerability reports doesn’t have to be stressful. Read on to find out how you can tackle security issues efficiently and confidently with the right tools and approach. https://github.blog/security/vulnerability-research/a-maintainers-guide-to-vulnerability-disclosure-github-tools-to-make-it-simple/

0
3
0
repeated

Project Zero Bot

New Project Zero issue:

Linux >=4.12: USB CDC-ACM: missing size check in acm_ctrl_irq() leads to OOB write

https://project-zero.issues.chromium.org/issues/395107243

CVE-2025-21704
0
2
4
#test
Show content
5 images, let's see how bsky (and my x-poster) handles this...
0
0
0
repeated

Here's the paywall-free version of today's insane must-read: The Atlantic's Jeffrey Goldberg was added to a Signal chat including SECDEF, VPOTUS, and others that discussed the Houthi strikes. In addition to being illegal, it's just dumb. A foreign adversary's dream come true

https://archive.is/JEYep

1
4
0
repeated

@4ttil4sz1a @andreyknvl (and also provided those fixes back to Canonical, though I haven't tracked what was done with them). Crazy that the Linux CNA is issuing CVEs for unsigned crafted kernel modules (which can execute arbitrary code, modify arbitrary data) but not for things that have real exploits.

1
3
0
repeated

@4ttil4sz1a @andreyknvl Was that the reason the CVE got issued by Canonical instead? Our system saw it come through Feb 14th and was flagged as having no upstream commit (while recognizing it affected upstream), we backported Canonical's fix that day and also fixed 10 memory leaks the fix introduced

2
1
0
repeated
repeated

@mcc I mostly take the behaviour of AI scrapers as evidence that this style of machine learning is a form of violation. Like, whether or not it's philosophically or legally theft, AI companies are behaving more like smash-and-run robbers than anyone who believe they have a legitimate claim to the data they take (and take, and take and take...)

0
3
0
#test
Show content
0
3
7
#test
Show content
2
2
12
@freddy an exploit is an exploit (haven't tested it though)
0
0
0
Show older