Fun times with Telerik UI and DoS by default (it will hit for a long time I think). Sometimes it may lead to more fun, like RCE :)
Gadgeting inspired by @pwntester Oleksandr and @stevenseeley
Blog:
Dear Infosec people who have looked at XML and XXE before: I am trying to get an understanding of Blind XXE.
Many of the descriptions I find are lacking an important detail which makes the attack much less practical. Blind XXE works by building an URL which contains content of a file, allowing to exfiltrate content. However, in all my tests, that *only* works if the file contains no newlines, as those are not allowed in URLs. Am I missing something?
🧵
That means the attack is only relevant if a) you have a file with a secret, but no newlines&other characters breaking an URL, b) you know the path.
That seems rather unlikely in practice.
It may be that there are implementations that will ignore that and still open the URL. Or that will auto-encode newlines. Or that there's some trick I don't know. But that's all speculation. If you know of any *working* scenario where exfiltration with newlines works, I'd be interested to hear about it.
DOMPurify 3.3.0 will soon be released, with this likely being the most important change in a long time:
2025 Component Abuse Challenge: Load Cell Anemometer
https://hackaday.com/2025/10/09/2025-component-abuse-challenge-load-cell-anemometer/
So far I’m seeing two reports of system disruption with the Crowdstrike sensor update on r/Crowdstrike, but haven’t seen any substantiation anywhere else.
Anyone seeing more?
Finding a buggy driver is one thing, abusing it is another🧠
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀
➡️ https://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061_part2.html
A few technical examples of when C++/Rust interop is complicated. #EuroRust
Fascinating job alert: TikTok
Analyst, Influence Operations - Global Security Organization
RE: https://infosec.exchange/@BleepingComputer/115344618285071730
Remember that whole "only about 5% of customers were impacted" line? And how it got people to stop paying attention? Yeah...
Open Source isn't going to help.
There's a way to invisibly compromise all software.
A perfect, self-replicating "sin" passed down for generations of compilers.
It's not just theoretical, and Ken Thompson showed us how.
Fuck I gotta unlock my bootloader asap https://social.linux.pizza/@MichaelRoss/115342003180134350
My Dad's on the lookout for a reasonable e-book reader. No Android, no color, no LCD screen - eInk only.
It's been over a decade I last bought an ebook reader, and the Kindle Paperwhite we bought back then still functions great (it never connected to the internet), so I'm a bit out of my depth.
I was looking at a Kobo Clara BW, and I seem to recall reading favourable reviews of Kobo devices.
Is this a good one? Or is there any better one in a similar price range?
For various reasons, not interested in second hand devices, nor DIY or hacked customs. Dad needs something that can be bought off the shelf of a random local shop (or ordered online, shipping to Hungary without horrible tarrifs).
If you have a bash command line of "exec program ..." and you can control the "..." can you make it not run the exec and do something different? The answer is yes. Even if "..." is somewhat sanitised for shell metacharacters. If you can inject $[+] it will make bash error on that line and run the next. This is how https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 works.