Posts
2720
Following
681
Followers
1506
"I'm interested in all kinds of astronomy."
repeated

Open Source Security mailing list

CVE-2025-6965: SQLite: Integer truncation in findOrCreateAggInfoColumn https://www.openwall.com/lists/oss-security/2025/09/06/1
CVE-2025-7709: SQLite: Integer Overflow in FTS5 Extension https://www.openwall.com/lists/oss-security/2025/09/06/2

0
3
0
repeated

Germany's position has been reverted to UNDECIDED.

Despite expressing concerns about breaking end-to-end encryption, Germany refrained from taking a definitive stance on the Chat Control proposal during the September 12th LEWP meeting. A willingness to negotiate and compromise remains.

This is an unfortunate as Germany is crucial to defeating Chat Control.

Please make your voices heard! https://fightchatcontrol.eu/

Source: https://netzpolitik.org/2025/chatkontrolle-noch-haelt-sich-widerstand/

11
21
0
repeated

This is a Dystopian timeline: My wife was let go after 25 years working for the same bank this morning. In an apparent oops, the bank's IT department hard wiped ALL her IOS devices remotely, while she was on the road driving, relying on the GPS function.

The screw you cherry on top? Our apartment building in its infinite wisdom a couple years back switched all building locks to the Latch app.

So she was LOCKED OUT OF OUR HOUSE.

Oh, and the Latch maintained intercom at our front door is out of order.

Thanks for that. Sheesh.

19
20
0
[RSS] 2025 Hackaday Component Abuse Challenge: Let the Games Begin!

https://hackaday.com/2025/09/16/2025-hackaday-component-abuse-challenge-let-the-games-begin/
0
0
1
@lcamtuf mercury arc rectifiers +1
0
0
0
[RSS] Translating the STATUS_STACK_BUFFER_OVERRUN status code into customer-ready text

https://devblogs.microsoft.com/oldnewthing/20250916-00/?p=111602

Nothing to see here, move along!
0
0
1
[RSS] Translating the STATUS_STACK_BUFFER_OVERRUN status code into customer-ready text

https://devblogs.microsoft.com/oldnewthing/20250916-00/?p=111602

"Nothing to see here!"
0
0
2
repeated

▶️ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant.
✅️ Bonus: it even outperforms Google's prototype. 👀
Full write-up here: https://neodyme.io/en/blog/pqc-fido/

2
2
0
[RSS] Becoming a Kernel Developer (1/3): Posting Your First Patch

https://www.linaro.org/blog/becoming-a-kernel-developer-part1-posting-your-first-patch/
0
1
1
R.I.P. Bishop :,(
0
3
6
repeated

🚨 Malicious update to @ctrl/tinycolor on npm is part of an active supply chain attack hitting 40+ packages across multiple maintainers. Audit & remove affected versions.

Our analysis of the malware: https://socket.dev/blog/tinycolor-supply-chain-attack-affects-40-packages

0
1
0
repeated

I've updated my and tools to use the latest version of @binarly_io award-winning bindings, which support @HexRaysSA IDA Pro 9.2 and their freshly open-sourced SDK.

- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.
https://github.com/0xdea/rhabdomancer

- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.
https://github.com/0xdea/haruspex

- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.
https://github.com/0xdea/augur

For additional details:
https://security.humanativaspa.it/streamlining-vulnerability-research-with-ida-pro-and-rust/

0
3
0
repeated

1900s: Computers allow me to do things.
Early 2000s: Computers do things for me.
Now: Computers do things to me.

2
3
0
repeated

🚨 New advisory was just published! 🚨

A path traversal in LG webOS TV allows unauthenticated file downloads, leading to an authentication bypass for the secondscreen.gateway service, which could lead to a full device takeover.
This vulnerability was disclosed during our TyphoonPWN 2025 LG Category and won first place:
https://ssd-disclosure.com/lg-webos-tv-path-traversal-authentication-bypass-and-full-device-takeover/

1
2
0
repeated
Edited 1 month ago

"Abusing an 0day to steal the data that fuels macOS AI"

"In a nutshell, plugins can only access files when the Spotlight subsystem requests it and, in theory, should only return extracted information back to Spotlight—nobody else! But is Apple’s sandboxing sufficient? 🤔

Today, we’ll present a 0-day that leverages a bug from almost a decade ago(!) — one that can still be exploited from a Spotlight plugin, even on macOS Tahoe, to access TCC-protected files, including sensitive databases that log user and system behaviors that can power Apple’s AI features 😈"

https://objective-see.org/blog/blog_0x81.html

0
3
0
repeated
repeated
repeated

This is the future, guys

0
5
0
Show older