Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
[RSS] CVE-2025-21756: Attack of the Vsock

https://hoefler.dev/articles/vsock.html

#linux
0
0
3
repeated

Intel's 386 processor (1985) moved the x86 architecture to 32 bits, but it needed to be backward compatible with earlier 16 and 8-bit processors. As a result, it needed complicated circuitry for its internal registers: six different circuits for 30 registers. Let's look at the silicon circuits. 1/N

1
6
0
BinPool: A Dataset of Vulnerabilities for Binary Security Analysis

https://github.com/SimaArasteh/binpool

/via @exploitsclub
0
0
2
repeated
@TuxOnBike thanks, so like 85% of the article is unrelated to the decision in question, right?
0
0
0
repeated

🔐 The SLB 9670VQ2.0 FW7.85 SPI TPM module sounds like something your cat would type mid-zoom call — but it's actually a serious piece of security hardware.

This TPM (Trusted Platform Module) chip is used in motherboards and SBCs to store crypto keys, generate true random numbers, and keep your hardware’s trust chain tight, even if the rest of your system isn’t Fort Knox. TPM 2.0 is even a requirement for modern OSes like Windows 11.

1
1
0
@troed I can't predict if this is going to be good or bad for researchers, but just hacking on shit is always a good strategy!
0
1
3
TP-Link is CNA now.
2
4
9
repeated

A BIG WELCOME to these 7 CVE Numbering Authority () partners that joined the Program in April!!!

* CTOne
* Insyde Software
* Jaspersoft
* Sandisk
* Spotfire
* The Qt Company
* TP-Link

Join: https://www.cve.org/PartnerInformation/Partner#HowToBecomeAPartner

0
1
0
repeated

How to win my instant support as a customer:

"We have decided not to focus on generative AI features, and instead reinvest heavily in quality assurance for our core products through hiring, training, and process development."

4
14
0
repeated

Since @wdormann is quoted in this piece and I can't find Dan Wade's handle, I'm tagging him in.

Is this suggesting that the RDP cred cache never gets updated? Ever ever?

Also what's up with this?

Old credentials continue working for RDP—even from brand-new machines.

That makes no sense at all.

https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that

3
2
0
repeated

@GossiTheDog @mttaggart
Thanks.
Yes, you can still RDP in with the old password after the account has been switched to passwordless. No Microsoft Authenticator required.

1
4
1
@Cali Well the title is parroting Meta's message in the first place, so I guess that's a fair assessment, but I'm still curious about what this decision is really about...
0
0
1
repeated

Tomorrow is Bandcamp Friday. I've got fuck all money for the next 2 weeks, someone bought my discography the other day and I won't starve to death but if you dig obscure indie music of the dark electro rock type pokemon, perhaps consider buying my music tomorrow via Bandcamp! Shares help. Checking my music out and commenting on it helps!

Https://Limneticvillains.bandcamp.com

Also I'm on Faircamp! https://negativevoid.art/limnetic

Thank you Fediverse.

0
4
0
This BBC article makes my head hurt:

https://www.bbc.com/news/articles/czd3mey1ej2o

- The main news is about Meta's consent or pay model makes users "choose between paying for a monthly subscription or letting Meta *combine data it has collected on Facebook and Instagram*", and how EU ruled this non-compliant with #DMA.
- It then links to another article about a model where where you can pay for *ad-free* Facebook. Ad-free is not the same as combining data from different platforms!
- There is no link to the EU source, but we get a full section about Meta's plans with AI, that has *nothing* to do with the original topic.
- In the middle of this mess we get a totally out of context paragraph explaining what Meta is?!

Was this all written by an LLM?

Does anyone happen to know what this regulation is actually about?

#EU #DMA #Meta #privacy #journalism
2
0
4
repeated

yossarian (1.3.6.1.4.1.55738)

my colleague @DarkaMaul has put out a new post on the @trailofbits blog on how we worked with @pypi's maintainers to slash PyPI test run times from ~160s to ~30s despite overall test counts growing by 17% (3900 to 4700+):

https://blog.trailofbits.com/2025/05/01/making-pypis-test-suite-81-faster/

this is some of my favorite kind of work: faster test suites means that developers run tests locally more often, and are less hesitant to add new tests (especially parametric ones). another great example of security and performance/reliability engineering dovetailing.

0
6
0
@saagar Thank you, now I feel my utter disgust against Apple UX a little bit justified!
0
0
0
Show older