Posts
2472
Following
662
Followers
1487
"I'm interested in all kinds of astronomy."
repeated

Seriously, this HAS to be insider trading.

Come on! First you announce tariffs, every stock tanks, you play the hard to get dude and proclaim with a swollen chest that there will be no delays, everything tanks even more.

And now you delay everything by 90 days? In the mean time your buddies bought everything at a low and now the stock recovers.

Come the fuck on!

1
2
0
repeated

pleased to hear the penguins have won the trade bargains

6
11
1
repeated

Lorenzo Franceschi-Bicchierai

Edited 5 months ago

NEW: A recently published court document shows the locations of WhatsApp victims targeted with NSO Group's spyware.

The document lists 1,223 victims in 51 countries, including Mexico, India, Morocco, United Kingdom, United States, Spain, Hungary, Netherlands, etc.

This targeting was over a span of around two months in 2019, according to WhatsApp's lawsuit against NSO Group.

http://techcrunch.com/2025/04/09/court-document-reveals-locations-of-whatsapp-victims-targeted-by-nso-spyware/

1
4
0
repeated

Just saw it mentioned on LWN, handy site for checking which distros enable a certain config option: https://oracle.github.io/kconfigs/?config=UTS_RELEASE&... Just replace UTS_RELEASE with whatever config option name minus CONFIG_, for example: https://oracle.github.io/kconfigs/?config=CFI_CLANG&...

0
1
0
repeated

Splitting water into hydrogen and oxygen takes more energy than it theoretically should, which is partly why it's not used on a large scale to generate hydrogen fuel.

Now scientists know why – and it's all down to a feat of nanoscale gymnastics.

https://physicsworld.com/a/splitting-water-takes-more-energy-than-theory-predicts-and-now-scientists-know-why/

0
2
1
@wdormann "defenders think in lists, attackers think in graphs" vibes
0
0
2
repeated

🔴 Our @reconmtl talk of last year has been published!

"Path of rev.ng-ance: from raw bytes to CodeQL on decompiled code"

Check it out: https://www.youtube.com/watch?v=0lrhCV14nVE

1
4
0
@disconnect3d The chosen implementation also depends on the copy size, right?
0
0
0
repeated

A call to memcpy() in a single binary that uses glibc may behave in 12 different ways depending on the features of the specific x86-64 CPU you run it on.

Here is a list of those impls in glibc:

https://github.com/bminor/glibc/blob/12a497c716f0a06be5946cabb8c3ec22a079771e/sysdeps/x86_64/multiarch/ifunc-impl-list.c#L1174-L1218

Fwiw this may matter a lot during binary exploitation. This was important in a challenge from PlaidCTF 2025. E.g. passing a negative (or: very huge) length allowed you to write past a buffer without a crash (the given implementation was not doing a wild copy).

2
6
0
repeated
repeated

This meeting could have been a nap. neocat_flop_sleep

3
7
1

Here’s the #Ghidriff output for CLFS.sys 10.0.20348.3328 vs. 10.0.20348.3453, likely corresponding to the CVE-2025-29824 use-after-free LPE:

https://gist.github.com/v-p-b/8c43fb8e0d72814dcd03764d478622ce

0
0
2
[RSS] A small bug in the signature verification of AOSP OTA packages

http://blog.quarkslab.com/aosp_ota_signature_bug.html
0
0
1
[RSS] Enter the IBM z17 mainframe with Telum II (more clues for Power11?)

https://www.talospace.com/2025/04/enter-ibm-z17-mainframe-with-telum-ii.html
0
0
1
repeated

Oh is it time for another Fortinet crit again? Unauthenticated admin password change in FortiSwitch.

CVE-2024-48887, CVSSv3 9.3

https://fortiguard.fortinet.com/psirt/FG-IR-24-435

2
5
0
@rickoooooo @GossiTheDog @sadarex Thanks, this is a great resource: I think the main point here is that it was the Secretary of Defense, and two USIP board members who "fired" Moose (see the linked letter on X). Whether they had the authority to do that is disputed, but nobody even claims DOGE has any authority in this case, they just showed up like flies around a carcass.

Amazingly, DOGE seems to be a meme: their power is that people assume they have power (note that the top article doesn't even mention DOGE).
0
0
1
Show older