Fuck I gotta unlock my bootloader asap https://social.linux.pizza/@MichaelRoss/115342003180134350
My Dad's on the lookout for a reasonable e-book reader. No Android, no color, no LCD screen - eInk only.
It's been over a decade I last bought an ebook reader, and the Kindle Paperwhite we bought back then still functions great (it never connected to the internet), so I'm a bit out of my depth.
I was looking at a Kobo Clara BW, and I seem to recall reading favourable reviews of Kobo devices.
Is this a good one? Or is there any better one in a similar price range?
For various reasons, not interested in second hand devices, nor DIY or hacked customs. Dad needs something that can be bought off the shelf of a random local shop (or ordered online, shipping to Hungary without horrible tarrifs).
If you have a bash command line of "exec program ..." and you can control the "..." can you make it not run the exec and do something different? The answer is yes. Even if "..." is somewhat sanitised for shell metacharacters. If you can inject $[+] it will make bash error on that line and run the next. This is how https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 works.
In our final ksmbd research post, @sine provides a detailed walkthrough for exploiting a local privilege escalation vulnerability. If you're interested in learning more about exploitation on modern systems - check it out!
Cybersecurity Awareness Month is dumb. Here are some alternatives.
No Vendor November Do some free shit to improve your posture. You know your users, systems and business better than they do.
Defaults December Security by design and default deny.
Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)
https://blog.0patch.com/2025/10/micropatches-released-for-windows.html
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. https://www.zerodayinitiative.com/blog/2025/10/6/crafting-a-full-exploit-rce-from-a-crash-in-autodesk-revit-rfa-file-parsing
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984
We just posted our AttackerKB @rapid7 Analysis for the recent Cisco ASA 0day chain; CVE-2025-20362 and CVE-2025-20333. The auth bypass appears to be a patch bypass of an older 2018 vuln. The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to be overflowed and memory corruption to occur. Full technical root cause analysis here: https://attackerkb.com/topics/Szq5u0xgUX/cve-2025-20362/rapid7-analysis
Just learned how relocations within a binary work:
I wonder if Microsoft secretly wants everyone to switch to Linux. There are certainly fewer reasons to stick to Windows every day: https://www.theverge.com/news/793579/microsoft-windows-11-local-account-bypass-workaround-changes
I am constantly feeling like parents have to take daily Alignment checks during Autumn Snot Season. Checks are administered by daycare/school staff.
I'm gonna need an alignment chart for this 😄