Posts
2505
Following
651
Followers
1473
"I'm interested in all kinds of astronomy."
repeated

OK, this is crazy. I (think) I have finally found a clue as to what is causing the web server to slowly choke on too many open connections.

This thread from 2001 (!!!) explains the problem, AND IT IS STILL HAPPENING 24 years later.

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=25986

I'm rebuilding the server with the patch from 2013 (!!) to see if it helps.

2
5
0
repeated

Germany’s largest telecommunication provider Deutsche Telekom is owned by Chinese hackers. And its managed IT service subsidiaries are too. No media reporting on it yet. Deutsche Telekom (addicted to cheap Huawei equipment) chose not to go public. Wake up! https://blog.eclecticiq.com/china-nexus-threat-actor-actively-exploiting-ivanti-endpoint-manager-mobile-cve-2025-4428-vulnerability

2
2
0
repeated
repeated

@saagar OMG this [on combating footguns]. It's why I wrote this -- to provide an alternative to the footgun (well, really more of a foot-sledgehammer that people keep hitting themselves with harder and harder) :

https://blog.techsolvency.com/2025/04/managing-unique-wordlists-password-cracking.html

The steady stream of "how do I sort this 300GB file" folks in the cracking Discords is never-ending. This hurts less.

2
3
1
repeated
repeated
Edited 2 months ago

Interesting story about Google publishing someone's phone number on searches for them when they gave the number to Google for account verification/security:

https://danq.me/2025/05/21/google-shared-my-phone-number/

Reminds me of the time a company I worked for (AFAIK) accidentally used phone numbers obtained the same way for ad targeting and got fined $150M

0
7
0
[RSS] DBus and Polkit Introduction

https://u1f383.github.io/linux/2025/05/25/dbus-and-polkit-introduction.html

With analysis of CVE-2025-23222 and CVE-2021-3560
1
4
5
[RSS] CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows [Fortinet]

https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/
0
3
7
repeated

Graham Sutherland / Polynomial

Mateusz Jurczyk from GP0 has been been writing a blog series on the implementation details of the Windows Registry, and there's a truly monumental amount of work on show here.

this one post alone is 24,000 words long, and covers a huge range of security issues discovered across the registry attack surface.

practically mandatory reading if you're doing Windows appsec assessments. really incredible stuff.

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html

0
6
0
repeated

Sad times, John Young of Cryptome is no longer with us:

https://www.theregister.com/2025/05/24/john_young_obituary/

0
2
0
[RSS] Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE

https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
0
1
1
Attacking EDRs Part 4: Fuzzing Defender's Scanning and Emulation Engine (mpengine.dll)

https://labs.infoguard.ch/posts/attacking_edr_part4_fuzzing_defender_scanning_and_emulation_engine/

Great to see snapshot #fuzzing successfully applied to another AV product!
0
6
5
repeated
Edited 2 months ago

Happy hoopy froods everywhere!

We have five winners from our contest, and will be publishing their works on our site soon, along with details of our (members only) June competition, with an Curious King illustrated fine press edition of Hitchhiker's on offer!

0
1
0
repeated

Open Source Security mailing list

CVE-2025-48708: ghostscript can embed plaintext password in encrypted PDFs https://www.openwall.com/lists/oss-security/2025/05/23/2
the full command-line input, including the plaintext password, is embedded at the beginning of the generated PDF file

0
7
0
repeated

Happy towel day! We hope you know where your towel is, as one who still knows where their towel is, is clearly someone to be reckoned with.

And we also hope you know you have less then 24 hours to fill in the WHY2025 CfP!

https://cfp.why2025.org

0
3
0
repeated
repeated

Today we've released 11.4.81, our quarterly feature update. The announcement is at https://blogs.oracle.com/solaris/post/announcing-oracle-solaris-114-sru81 and lists the new features and software upgrades included.

1
2
0
Show older