Posts
2477
Following
654
Followers
1480
"I'm interested in all kinds of astronomy."
repeated

FooneπŸ³οΈβ€βš§οΈ

Edited 24 days ago

Neat game glitch explanation: Why signed integers lead to flirting with dogs

https://www.youtube.com/watch?v=ADenqrgMUgA

0
4
0
repeated

Part of the job as a cybersecurity professional is in fact arguing to purge and not log information about your customers.

Data is not oil. It's risk.

15
11
0
repeated
@timb_machine Aegis even forces you to export/backup periodically
1
0
0
[RSS] CVE-2025-20281: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability

https://www.thezdi.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability
0
0
2
@amethyst My best guess is Savaged by Systemd must have something to do with it.
0
0
1
@bert_hubert oooh do you happen to know what OS it runs on?
1
0
0
repeated

You know those non-vulnerabilities that companies get forced to fix for compliance reasons? I've found a full bypass for a common patch strategy. I'm half-tempted to keep it secret for the greater good πŸ˜‚

2
5
1
@albinowax the value of such deed is greatly underestimated, thank you!
0
0
0
repeated

At DistrictCon's inaugural Junkyard competition, we achieved full remote execution on two popular home network devices: a Netgear WGR614v9 router and BitDefender Box V1 security appliance.

Our exploitation techniques included chaining four buffer overflow vulnerabilities with authentication bypass on the router, plus a novel "bashsledding" ROP technique that sprays shell commands into NVRAM for reliable code execution.

Read the blog: https://blog.trailofbits.com/2025/07/25/exploiting-zero-days-in-abandoned-hardware/

0
4
0
repeated
repeated

If you're looking at this thinking 'wait, CVE-2025-6543 is a denial of service vuln?', it's not - it turns out Citrix knew orgs were getting shelled but chose to not tell the public. The implants persist after patching.

2
6
0
repeated
today's interesting website: running https on port 3, just so the URL has :3 in it

https://silliest.website:3/
1
12
2
@janeishly @mttaggart by translation I mean the level of G translate&co, that we know from practice are useful. They shouldn't be used to translate e.g. full books of course.
0
0
1
[RSS] New Binary Ninja release: 5.1 Helion

https://binary.ninja/2025/07/24/5.1-helion.html
0
1
2
[RSS] exploits.club Weekly Newsletter 80 - ITW Windows Bugs, Deterministic iOS Exploits, Pwn2Own Firefox Vulns, and More

https://blog.exploits.club/exploits-club-weekly-newsletter-80-itw-windows-bugs-deterministic-ios-exploits-pwn2own-firefox-vulns-and-more/
0
0
1
[RSS] Micropatches Released for Windows Disk Cleanup Tool Elevation of Privilege Vulnerability (CVE-2025-21420)

https://blog.0patch.com/2025/07/micropatches-for-windows-disk-cleanup.html
0
1
2
repeated
repeated

πŸ› οΈ RIFT just got an upgrade!
Now supports FLIRT signature generation on Linux 🐧
Perfect for reverse engineering Rust malware πŸ¦€
πŸ”— https://github.com/microsoft/RIFT

0
3
0
Show older