Posts
2467
Following
661
Followers
1486
"I'm interested in all kinds of astronomy."
repeated

Kubernetes is a lot of fun. Here's the layout of a 3-node HA cluster that's doing... absolutely nothing.

I have played me for an absolute fool!

0
2
0
Finally got to the reel-to-reel museum at Keszthely #Hungary, highly recommended!
1
0
5
repeated

📣I will be reaching out all the speakers next week, in order to confirm the details of every presentation and get the schedule published in September!

If you are willing to present the closes in October! Reach me out if you have questions or half-shaped proposals to show!

0
3
0
repeated

linker errors per Planck time

0
1
0
repeated

Interesting links of the week:

Strategy:

* https://wero-wallet.eu/ - a European replacement for PayPal, Google and Apple

Threats:

* https://the-sequence.com/rustypages-malware-part-i - some nice new shiney malware for OS X
* https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/ - don't you just hate being poked with bamboo?

Detection:

* https://camel-security.github.io/ - LLM guard rails from GOOG
* https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging?view=powershell-5.1#enabling-script-block-logging - MSFT's protected logging feature for PS
* https://adsecurity.org/?p=4510 - mm, honey
* https://blog.pypi.org/posts/2025-08-18-preventing-domain-resurrections/ - preventing domain resurrections in PyPI

Bugs:

* https://www.heise.de/en/news/Docker-Desktop-Critical-vulnerability-allows-host-access-10560707.html - attackers may no longer be contained
https://bughunters.google.com/blog/5800341475819520/a-fuzzy-escape-a-tale-of-vulnerability-research-on-hypervisors - I hate being supervised, do you?

Exploitation:

* https://arxiv.org/abs/2507.09411 - feasibility of generating variant malware using LLMs
* https://phrack.org/issues/72/5_md#article - @phrack #72 lands and it's a goodie... aforementioned link is to @orange's work on PHP
* https://versprite.com/blog/the-shell-was-restricted-but-the-kernel-memory-was-wide-open/ - attacking Linux-based firmware for LPE via the kernel
* https://blog.anh4ckin.ch/posts/netexec-workshop2k25/ - nosing around an AD lab

,

0
3
0
repeated

Sam Altman calls AI a “bubble” while seeking $500B valuation for OpenAI
"Someone will lose a phenomenal amount of money," says CEO while fundraising at record prices.
https://arstechnica.com/information-technology/2025/08/sam-altman-calls-ai-a-bubble-while-seeking-500b-valuation-for-openai/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

8
7
0
Edited 25 days ago
LLM's let's you use natural language to extract data from computers.

POML is a way to wrap your natural language prompts to XML to give them structure again:

https://github.com/microsoft/poml

Seriously.
0
0
4
repeated

Well AMD just made an oopsie! They accidentally posted the complete source code to FSR4, then tried to remove it, but uhhhhh... here's the repo: https://github.com/GPUOpen-LibrariesAndSDKs/FidelityFX-SDK/tree/01446e6a74888bf349652fcf2cbf5f642d30c2bf
and here's the commit history: https://github.com/GPUOpen-LibrariesAndSDKs/FidelityFX-SDK/commit/01446e6a74888bf349652fcf2cbf5f642d30c2bf
MIT license, have fun!

0
11
0
[RSS] exploits.club Weekly Newsletter 83 - Windows P20 Wins, LLMs + CodeQL, MCP Takes Down DEFCON CTF, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-83-windows-p20-wins-llms-codeql-mcp-takes-down-defcon-ctf-and-more/
0
0
2
@ana The bubble may burst, but the asbestos will stay!
0
0
1
repeated

@blackhoodie_re will be back at @hexacon_fr this year, and we're currently looking for former BlackHoodies who would be willing to give a training, between Oct 6 and 9! https://blackhoodie.re/Hexacon2025/

0
3
0
repeated

longing for the day when computers are advanced enough to handle 65k bytes of plaintext

1
3
1
repeated
Edited 26 days ago

NEW: Earlier this month, two hackers published their findings in Phrack magazine after hacking into the computer of a North Korean government hacker. Now, in speaking with @lorenzofb, the hackers explain why they went public — even though their breach was probably illegal.

https://techcrunch.com/2025/08/21/hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it

2
3
0
repeated
repeated

side channel attacks per hour

1
1
0
repeated

⚠️: If you are using Docker for Desktop you need to update it TODAY to v4.44.3. Critical CVE-2025-9074 in previous versions allows malicious containers to access host system:

👇
https://www.heise.de/en/news/Docker-Desktop-Critical-vulnerability-allows-host-access-10560707.html

0
4
0
Fresh Windows VM crashes the kernel debugger, great...
0
0
0
Show older