Posts
3390
Following
713
Followers
1581
"I'm interested in all kinds of astronomy."
repeated

TrendAI Zero Day Initiative

Confirmed! Hyeonjin Choi of Out Of Bounds earns $15,000 for a third round win and 3 Master of Pwn Points by successfully using a type confusion bug to escalate privileges in

0
2
0
repeated

Those annoying “consent” cookie pop ups that Big Tech has been using as part of their malicious compliance efforts to convince you that data protection law in the EU is a nuisance?

Turns out they’re illegal.

https://www.iccl.ie/digital-data/eu-ruling-tracking-based-advertising-by-google-microsoft-amazon-x-across-europe-has-no-legal-basis/

5
19
0
repeated

❓ ❓
🐱 🌵

0
3
0
repeated

New podcast is now live! This podcast episode goes over the career of pinkflawd, how she got into malware reversing, advice on being in the industry, how to deal with failures, and some exciting content about some interesting piece of malware she has analyzed !

https://www.buzzsprout.com/2400544/episodes/17145918-pinkflawd-malware-reverse-engineering

https://open.spotify.com/episode/4ln1X3zd6LqM3sm6rTI527?si=eT-ERmW1Q-GN7fLaoniMSg

Thank you so much to @pinkflawd for coming on and talking about her story. Hope you enjoy 🤩

0
4
0
repeated

TrendAI Zero Day Initiative

Success! Hyeonjin Choi of Out Of Bounds targeting Microsoft Windows 11 wasted absolutely no time at all to successfully demonstrate his Local Escalation on - he is off in the disclosure room now!

0
2
0
repeated

TrendAI Zero Day Initiative

After a dramatic pause in getting things setup Billy and Ramdhan of STAR Labs preformed a Docker Desktop escape to pop calc - and they are also now off to the disclosure room - good luck!

0
2
0
repeated

TrendAI Zero Day Initiative

We have another collision - Viettel Cyber Security targeting NVIDIA Triton Inference Server successfully demonstrated their exploit - however it was known to the vendor, but not yet patched. They still earn $15,000 and 1.5 Master of Pwn Points

0
2
0
repeated

TrendAI Zero Day Initiative

As expected, in his first attempt, Marcin Wiązowski showed of his Windows 11 privilege escalation. He went from a standard user SYSTEM in the blink of an eye. He's off to the disclosure room with his white paper of knowledge.

0
3
1
repeated

TrendAI Zero Day Initiative

Sweet! Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori were able to escalate to root on Red Hat Enterprise Linux. They head off to the disclosure room to cover the details of their exploit.

0
2
0
repeated
Edited 9 months ago

Coinbase filed an 8K with the SEC for a breach. They believe multiple insiders have sold customer information to a threat actor who is now extorting them.

It looks like a very significant breach as it includes customers passport scans.

https://www.sec.gov/ix?doc=/Archives/edgar/data/1679788/000167978825000094/coin-20250514.htm

6
9
0
repeated

TrendAI Zero Day Initiative

With our first confirmation, our results blog is now live. We'll be updating this blog throughout the day with the latest results. https://www.zerodayinitiative.com/blog/2025/5/15/pwn2own-berlin-2025-day-one-results

0
2
0
repeated

TrendAI Zero Day Initiative

We have a bug collision. Although Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) successfully demonstrated his exploit of Triton, the bug he used was known by the vendor (but not patched). He still earns $15K and 1.5 Master of Pwn points.

0
2
0
repeated

TrendAI Zero Day Initiative

Confirmed! Chen Le Qi of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on 11. He earns $30,000 and 3 Master of Pwn points.

0
2
0
repeated
[RSS] [CVE-2025-47916] Invision Community <= 5.0.6 (customCss) Remote Code Execution

https://karmainsecurity.com/KIS-2025-02
0
0
1
@raptor @TarkabarkaHolgy I imagine this is similar how the brain can recover from certain kinds of damage, reassigning tasks of damaged tissue to other parts?
1
0
2
repeated

Sleep deprivation is a form of torture.

Unless you are a parent, in which case it is a form of "children are a blessing, you wanted this, you're on your own, suck it up, good luck."

6
3
0
repeated

Time to update microcode on your Intel processors (gen >9)...

New speculative prediction bug lets you capture /etc/shadow with 99% reliability. They didn't make anything like it work on AMD or ARM... yet...

https://comsec.ethz.ch/research/microarch/branch-privilege-injection/

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html

https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512

0
7
0
repeated

there's something beautifully wrong about trying to advertise copilot to a windows 98 machine.

4
10
0
repeated

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.

https://www.ibm.com/think/x-force/operationalizing-browser-exploits-to-bypass-wdac

0
6
0
Show older