Posts
2734
Following
681
Followers
1505
"I'm interested in all kinds of astronomy."
[RSS] The hidden JTAG in your Qualcomm/Snapdragon device's USB port

https://www.linaro.org/blog/hidden-jtag-qualcomm-snapdragon-usb/
0
0
4
repeated

75% of web traffic flows through Google's Chromium. Apple controls Safari. American companies control how billions access the web.

Building a competitive browser alternative: ~€50-70M annually, 3-4 years. @servo proves it's technically possible with a small team.

The challenge isn't technical, it's institutional: can democratic societies coordinate long-term tech projects?

Read more: https://tarakiyee.com/digital-sovereignty-in-practice-web-browsers-as-a-reality-check/

1
7
0
repeated
Edited 4 months ago

Some professional news:

1. I’m now a Special Rapporteur for the Cyber Resilience Act.

2. My company is hiring EU subcontractors with network and security expertise!

Bow Shock Systems won a contract with ETSI to lead development of "vertical" cybersecurity standards for specific products. I'm leading the one for operating systems.

We're looking for people with technical expertise and leadership ability to lead three other verticals.

1/n

1
6
0
repeated
Edited 4 months ago

'On November 28th, 2012, Randall Munroe published an xkcd comic that was a calendar in which the size of each date was proportional to how often each date is referenced by its ordinal name (…) "In months other than September, the 11th is mentioned substantially less often than any other date. It's been that way since long before 9/11 and I have no idea why." After digging into the raw data, I believe I have figured out why.'

https://drhagen.com/blog/the-missing-11th-of-the-month/

1
19
1
repeated
[RSS] BinDSA: Efficient, Precise Binary-Level Pointer Analysis with Context-Sensitive Heap Reconstruction

https://dl.acm.org/doi/10.1145/3728928
0
0
0
[RSS] When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365"

https://modzero.com/en/blog/when-backups-open-backdoors-synology-active-backup-m365/
0
1
1
repeated

It is ridiculously hot in Europe, unbearably so, and yet we are building systems which are needlessly complex and power-hungry.

Something is very wrong with us.

3
4
0
repeated

Interesting links of the week:

Strategy:

* https://www.enisa.europa.eu/publications/the-eu-cybersecurity-index-2024 - EU's 2024 cyber security index
* https://assets.publishing.service.gov.uk/media/67cad8b18c1076c796a45c25/Cyber_Security_Sectoral_Analysis_Report_2025.pdf - HMG cyber security sectoral analysis 2025
* https://www.nao.org.uk/wp-content/uploads/2025/01/government-cyber-resilience.pdf - NAO paper on making UK more resilient
* https://www.ncsc.gov.uk/collection/security-principles-protecting-most-sensitive-personal-information-in-datasets - NCSC ideas on protecting data
* https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/ - protest early, protest safely, protest often

Threats:

* https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/umbrella-stand/ncsc-mar-umbrella_stand.pdf - NCSC exposes UMBRELLA STAND
* https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/shoe-rack-tipper/ncsc-tip-shoe_rack.pdf - ... and SHOE RACK
* https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia - GOOG reports on how Russia is targetting academics

Exploitation:

* https://sud0ru.ghost.io/windows-inter-process-communication-a-deep-dive-beyond-the-surface-part-4/ - a nice set of posts on Windows IPC's attack surface
* https://eprint.iacr.org/2025/1042 - whacking Falcons with a hammer
* https://forums.oracle.com/ords/r/apexds/community/q?question=interpositioning-in-java-2701 - had your caffeine? seamlessly injecting into Java

Hard hacks:

* https://skemman.is/handle/1946/50456 - emulating icey routers

Hardening:

* https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.html - calling cc safely
* https://spiffe.io/docs/latest/spiffe-about/community-presentations/ - better authentication primitives for bots
* https://workos.com/blog/mcp-authorization-in-5-easy-oauth-specs - bring OAuth to MCP

Nerd:

* https://www.metoffice.gov.uk/forms/name-our-storms-call-for-names - so you want to work in marketing for storms
* https://activitypub.academy - so you want to learn about how the Fediverse works?

,

0
3
0
repeated

Project Zero Bot

New Project Zero issue:

Double-fetch of root_size in fastrpc_pack_root_sharedpage leads to buffer overflow

https://project-zero.issues.chromium.org/issues/399463073

CVE-2025-21485
0
1
1
[RSS] Decrement by one to rule them all: AsIO3.sys driver exploitation

https://blog.talosintelligence.com/decrement-by-one-to-rule-them-all/
0
0
1
[RSS] exploits.club Weekly Newsletter 77 - MS-RPC Fuzzing, Printer Hacking, Arbitrary Decrement Primitives, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-77-ms-rpc-fuzzing-printer-hacking-arbitrary-decrement-primitives-and-more/
0
0
1
CephFS Permission Escalation Vulnerability in Ceph Fuse mounted FS

https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm

CVE-2025-52555
0
1
1
repeated
repeated
Edited 4 months ago

Interesting Git repos of the week:

Strategy:

* https://github.com/timb-machine/security-research-governance-toolkit - I started releasing Portcullis' old security research governance toolkit

Detection:

* https://github.com/sandflysecurity/sandfly-forensic-scripts - @SandflySecurity have release scripts for collecting Linux artefacts

Exploitation:

* https://github.com/stealth/injectso - @steaith demonstrates how to inject .so files into running processes at will
* https://github.com/NeffIsBack/wsuks - have you ever wanted to MITM WSUS?

Data:

* https://github.com/public-api-lists/public-api-lists - does what it says on the tin

Development:

* https://github.com/sapdragon/syscalls-cpp - headers for direct syscall invocation

, ,

0
3
0
repeated

Actively exploited vulnerability in CVE-2024-54085 in AMI MegaRAC gives attackers extraordinary control over server fleets by allowing a remote attacker to create an admin account without any authentication:
👇
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/

0
2
0
repeated

What's not to love about third-party software injecting itself into Firefox and causing crashes in the Rust standard library?

https://github.com/rust-lang/rust/issues/143078

3
6
0
Show older