Posts
2956
Following
697
Followers
1541
"I'm interested in all kinds of astronomy."
repeated

💻 Have you read our recent publication?

Two Use After Free (UAF) vulnerabilities were discovered within Chrome’s Browser process by one of our researchers at SSD Labs: https://ssd-disclosure.com/ssd-advisory-miracleptr-sandbox/

1
2
0
repeated
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Edited 7 months ago

I've written an unhealthy amount of words on "the cloud" and specifically Europe's woes. In the post below I tie many articles together into a hopefully useful overview. It may be good to know that nothing I write on the cloud is novel or original, I mostly hope to report things as they are. Which is scary enough already! https://berthub.eu/articles/posts/cloud-overview/

3
4
0
repeated

One-Click RCE in ASUS’s Preinstalled Driver Software https://mrbruh.com/asusdriverhub/

0
2
0
@singe I get it, just another data point
0
0
0
repeated
This weeks statistics:
- Random shitpost: 25 repeats, 61 favs
- Original technical content: 3 repeats, 3 favs

#social
2
1
5
repeated
repeated

"Hey, we're gonna take a screenshot of your PC every five seconds to feed our AI, mmkay? Oh wait, you want a screenshot of a meeting slide? Heck no we don't want your COMPANY to sue us!"

-Microsoft, definitely

https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-will-soon-block-screen-capture-during-meetings/

9
10
0
repeated

I am surprised this isn’t getting the attention it deserves: Hungarian military intelligence is apparently mapping what the response in parts of Ukraine will be when Orban would march in with his army. Ukraine has several Hungarian populated pockets and Putin encouraged orban several times to grab that land from Ukraine. War is not a game, so this should be seriously addressed, Kaja Kallas and Mark Rutte!

https://ssu.gov.ua/en/novyny/sbu-vpershe-v-istorii-ukrainy-vykryla-ahenturnu-merezhu-voiennoi-rozvidky-uhorshchyny-yaka-shpyhuvala-proty-nashoi-derzhavy-video

0
2
0
Why the UK's IBM Failed by Asianometry

https://www.youtube.com/watch?v=EkTHDgYTh64
1
0
3
[RSS] Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages

https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
0
0
2
repeated

"Wrong but plausible" is a feature and not a bug for LLMs if you're looking for a system to deploy where you can use it, say, to fine-tune insurance reimbursements to the exact dollar amount you wanted and have it produce the justifications needed to get there at an industrial scale

1
4
0
repeated

XWiki has been compromised, and all personal wikis have been deleted. That includes mine, named XHE for "XML Hacking Encycopledia" 😢

a baby is making a sad face wh...

0
3
0
repeated

Binary Ninja 5.0 brings big updates to the debugger: a cleaner adapter settings UI, smarter analysis that won’t slow down your session, and new backends including rr and Corellium. Faster and more flexible debugging, whether local or remote! https://binary.ninja/2025/04/23/5.0-gallifrey.html#debugger

0
3
0
repeated

German President Steinmeier's speech commemorating the 80th anniversary of the end of World War II:

https://www.bundespraesident.de/SharedDocs/Reden/EN/Frank-Walter-Steinmeier/Reden/2025/250508-End-WWII.html

You want to read the whole thing, but the part below and the emphasis on the importance of learning from the past instead of describing it as a "cult of guilt" were powerful and eloquent. No words were minced, and we need more of that.

0
5
0
repeated

Now this looks like a pretty kick ass project: FUZZUER: Enabling Fuzzing of
UEFI Interfaces on EDK-2 https://www.ndss-symposium.org/wp-content/uploads/2025-400-paper.pdf and source at https://github.com/BreakingBoot/FuzzUEr

0
2
0
repeated
Edited 7 months ago

Finally a paper on malware fuzzing! PFUZZER: Practical, Sound, and Effective Multi-path Analysis of
Environment-sensitive Malware with Coverage-guided Fuzzing https://www.diag.uniroma1.it/~delia/papers/eurosp25-pfuzzer.pdf

0
1
0
@wdormann @GossiTheDog @deepthoughts10 Tamper Protection usually implements anti-debugging so you won't be able to attach a debugger even to the low-priv UI process of the AV. This is not normally a security boundary so there are of course bypasses, what you just showed basically goes back to having a UAC bypass + admin account.
0
0
1
Show older