Posts
2585
Following
628
Followers
1404
"I'm interested in all kinds of astronomy."
@swapgs I don't follow, could you point to specific parts of the repo/give an example?
1
0
0
repeated
repeated

Currently available Go fuzzing tools were missing critical features - some don’t play well with the latest Go toolchain. So we set out to change that.

@bruno, Nils Ollrogge, and colleagues explored more powerful ways to fuzz Go binaries. By tapping into Go’s native instrumentation — which is compatible with libFuzzer — we enabled effective fuzzing of Go code using LibAFL.

We’ve documented our approach and shared insights in our latest blog post: https://www.srlabs.de/blog-post/golibafl---fuzzing-go-binaries-using-libafl

Repo: https://github.com/srlabs/golibafl

2
9
1
repeated

Micropatches Released for NTLM Hash Disclosure Spoofing Vulnerability (CVE-2025-24054)

1
3
0
repeated

The Ivantis, Solarwinds and Fortinets right now.

1
3
1
repeated

Sweet, now we can go back to Full Disclosure! Just like it's the 90s again!

6
8
0
repeated

Just a reminder: Vulnerability Lookup isn’t just about finding CVEs. It supports the full chain, collection from multiple sources, continuous distribution, and allocation within a coordinated vulnerability disclosure (CVD) process. 100% open source.

🔗 An online version maintained by @circl https://vulnerability.circl.lu/

🔗 https://www.vulnerability-lookup.org/

🔗 https://github.com/vulnerability-lookup/vulnerability-lookup

1
4
0
repeated

So it's official: TLS certificate lifetimes will reduce from the current max of 398 days to:
* 200 days in March 2026
* 100 days in March 2027
* 47 days in March 2029

For web servers/proxies etc. it's reasonably simple, at least for smaller orgs but for e.g. network kit it might be more of a challenge. Having a timeframe to aim at definitely focusses the mind!

Via @riskybiz / https://risky.biz/risky-bulletin-ca-b-forum-approves-47-day-tls-certs/

3
7
0
repeated

And all of the sudden, we have solved supply chain security.

No CVE, no vulnerabilities!

6
13
1
I've been wondering for a long time if #DirectoryTraversal vulnerabilities could be mitigated by a safe path handling library (similarly to e.g. ORM's). As a side-quest, I stared to implement a prototype for Python, and I'm super interested in your unfiltered opinions:

https://github.com/v-p-b/SafePath/
1
5
7
repeated

Looks like the US Government are going to lose control of CVE. https://www.thecvefoundation.org/

8
8
0
[RSS] Microsoft Windows dxkrnl Untrusted Pointer Dereference Local Privilege Escalation Vulnerability | HackSys Inc

https://hacksys.io/advisories/HI-2025-001

CVE-2025-29812
0
0
1
Up-to-date documentation for #Ghidra 11.3.2 now available at:

https://scrapco.de/ghidra_docs/

Documentation changes:

https://gist.github.com/v-p-b/976f67dda1f5281c31c8e65579d309b8
0
1
1
repeated
Edited 12 days ago

Hackers, educators, tinkerers:
The 2025 Hacker Initiative grant cycle is open. We're funding individuals and groups who are:
🔹 Advancing hacker culture
🔹 Promoting digital rights
🔹 Educating the public

If you're building tools, sharing knowledge, or shaking things up apply here 👉 https://hackerinitiative.org/apply-now/

Signal boost appreciated.

0
7
0
repeated

A quick reminder that discounted registration rates for for the workshop end tomorrow, April 14, at 11:59 pm PDT, and the conference hotel block rates end shortly after. Details at https://langsec.org/spw25/important-dates.html
We hope to see you all in San Francisco on May 15, 2025!

0
4
0
repeated
repeated

-2025-21419 2025-Feb Windows Setup Files Cleanup Windows Setup Files Cleanup Elevation of Privilege

uncovering arbitrary delete vulnerabilities 👀 🔍

Patch introduced new function DeleteFileEx_MSRC. Not your typical function name... 🧐

A patch diffing 🧵...

1
1
0
repeated
Edited 12 days ago

Regardless of what happens with CVE/NVD, the PSF will continue publishing advisories for CPython through our OSV database and to the security-announce@python.org mailing list.

Please subscribe to those data sources to guarantee delivery of vulnerability data about CPython.

https://github.com/psf/advisory-database

0
3
0
Show older