Posts
3368
Following
712
Followers
1580
"I'm interested in all kinds of astronomy."
@froge @hacks4pancakes It depends how you define the "market". If you have pentests/a SOC solely because they're regulatory requirements, your perfect provider is one with a gang of amateurs working for peanuts. It's not only cheaper than the alternative, but you won't even have to deal with non-trivial vulnerabilities/alerts!

(Yes, there are is such a market.)
0
0
1
@hacks4pancakes "none of the jobs I just named are the typical entry level tracks of 'junior pen tester' and 'SOC analyst'"

I can only talk about pentesting but my stance has for long been that pentesting shouldn't have been an entry level position in the first place. Inviting people to this path with 0 experience in dev or ops is a scam that has long-term negative effects on the industry as a whole.
2
1
6
repeated
Edited 10 months ago

Hello friends. The dreaded and long awaiting blog on WHAT THE FUCK HAPPENED TO THE CYBERSECURITY JOBS MARKET has arrived.

https://tisiphone.net/2025/04/01/lesley-what-happened-to-the-cybersecurity-skills-shortage/

I'm sorry.

16
12
0
@wdormann @cy @cR0w I'm not saying pw guessing is not in the picture, but metadata can be a good prefilter (and also something to count with when testing).
1
0
1
repeated

I enjoyed this idea that authoritarian states are more like the movie Brazil than the book 1984 - because authoritarianism breeds incompetence.

https://observer.com/2025/02/terry-gilliams-brazil-at-40-more-prescient-than-orwell/

1
2
0
repeated

oh fuck, val kilmer is dead

4
3
0
@wdormann @cy @cR0w Not sure this came up while I was sleeping, but regular ZIP archives don't encrypt metadata (file names) so "trying to send an executable in a pw protected archive" may be grounds for a block too.
1
0
1
This follow-up to CVE-2024-57882 by Solar Designer also worth reading:

https://seclists.org/oss-sec/2025/q2/3

"A reason CVE-2024-57882 may have stayed unpatched in a distro is it could have been wrongly believed to be a NULL pointer dereference only due to a specific crash reported by Syzbot."

"net.mptcp.enabled can be set from inside an unprivileged net namespace"
0
0
3
"bribing a senator with a 9-letter name will alter the last letter in their name on their subsequent appearances"

https://banyaszvonat.github.io/breaking-videogames/2025/03/30/off-by-one-or-is-it-two.html

#gamehacking #Disgaea
0
1
1
@GossiTheDog @cisakevtracker Thanks for the heads up! I'm quite skeptical though given the previous FUD reports, can't wait to see more info about any observed attacks!
0
0
2
repeated
@kajer @256 Good one! .HLP was also a vector for a long time, pretty sure there was some parser bug in the thumbnailer, *gestures wildly* Internet Explorer...
0
0
0
@kajer @256 I'm like 3 minutes in, and I remember at least 3 remotely exploitable vulnerabilities in the presented features, fun times!
1
0
2
repeated
@cR0w @wdormann I mean it's the logical next step if you want to pretend you can solve an unsolvable problem.
0
0
2
@cR0w @wdormann Probably? Gmail definitely does that. Zero-click attack surface ftw!
1
0
3
Linux kernel: CVE-2024-57882 fix did not prevent data stream corruption in the MPTCP protocol

https://seclists.org/oss-sec/2025/q2/0

"The analyze(sic!) of the patch (https://web.git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=cbb26f7d8451fe56ccac802c6db48d16240feebd) reveals that the root cause of the bug has been partially fixed."
0
0
1
Show older