Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025!
Sharing research on discovering Rust dependencies in compiled binaries.
See you there! 🚀
#RECON2025 #RustLang #ReverseEngineering
RUMOURS are TRUE 🤷♀️
PHRACK will be releasing a SPECIAL #71.5 👉HARDCOVER👈
at https://www.offensivecon.org/
BERLIN ("The 𞅀-Day Edition").
Main #72 release THIS SUMMER at MULTIPLE conferences (main release at WHY2025). ❤️
As of recently, we also invite past, present and future bug hunters to submit proposals for guest blog posts on our team blog.
If you've discovered a potential vulnerability in Firefox, please see our way to get rewarded for your work. We do not require exploits. Just a bug description is enough.
Of course, we reward and encourage sending us more details (PoC, detailed report, regression range, potential fix). But to qualify for a bug bounty, all you need is a bug.
Please check our bounty FAQ at https://www.mozilla.org/en-US/security/bug-bounty/faq/
If you've discovered vulnerabilities in major browsers like Chrome, Safari, or Firefox, our program offers a fast, efficient way to get rewarded for your work. We focus exclusively on browsers with a large market share, ensuring your findings have real impact.
Our process is designed for efficiency—eliminating the usual delays and bureaucratic hurdles. You can submit vulnerabilities in minutes, receive detailed feedback within 72 hours, and be compensated with quick payouts within 15 days after validation.
We handle the full disclosure process, including vendor communications and paperwork, so you can focus on what matters: your research. Plus, you can maintain anonymity while receiving fair compensation for your contributions.
Check out the list of supported browsers and get started here: https://ssd-disclosure.com/product-index/
UVB-76 operator talking with a pirate - YouTube
https://www.youtube.com/watch?v=jKrNyPnTucQ
"Your call is so important to us, we have fired all the humans and replaced them with a terrible automated system that cannot understand you.
Please hold while we pay our executives another bonus for some reason.
Did you know you can use the Internet to discover our website can't answer your question?"
That SAP NetWeaver bug is pretty ouchy:
Sent by Remington from Seattle, Washington, U.S.A. on October 16, 1995. https://postcardware.net/?id=27-70
It's kinda been raised, but its nuts that (according to Mandiant/M-Trends) in 2025:
- vulnerabilities/exploits are the most frequently observed initial vector;
- the top 4 exploited vulns belong to security vendors.
What are we doing here? 🤯😱
“Going to the cloud” can mean renting services/servers that you could get from anywhere. There’s little lock-in. The same four words “going to the cloud” might also mean locking your operations to a specific cloud provider, forever. This difference is vital, yet often ignored: https://berthub.eu/articles/posts/beware-cloud-is-part-of-the-software/