Posts
2710
Following
681
Followers
1504
"I'm interested in all kinds of astronomy."
repeated

NEW, from DomainTools Investigations, today: Inside the Great Firewall Part 1: The Dump

I cannot tell you how excited I am to see this piece go live. Our researchers knocked it out of the park - and this is just part one.

https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/

0
7
0
repeated
repeated

πŸŽƒπŸŽƒ if you've got spooky business this weekend, don't forget to put on the Gameboy Halloween chiptune playlist! πŸŽƒπŸŽƒ

https://www.youtube.com/watch?v=henyMRqMBws

3
3
0
repeated
repeated

Microsoft:

As much as 30% of the company's code is written by AI.

Also Microsoft:
Somehow we managed to make it so that clicking the x in Task Manager doesn't close the app. Whoopsie daisy!

4
7
0
[RSS] [Blog] A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS

https://code-white.com/blog/wsus-cve-2025-59287-analysis/
0
0
0
[RSS] Micropatches Released for Windows Installer Elevation of Privilege Vulnerability (CVE-2025-50173)

https://blog.0patch.com/2025/10/micropatches-released-for-windows_30.html
0
0
0
@algernon I'd be surprised if the .ai TLD rejected money
0
0
0
repeated

We're spilling the TEE: We're disclosing vulnerabilities (CVE-2025-59054, CVE-2025-58356) in LUKS2 disk encryption affecting 8 confidential computing systems.

https://blog.trailofbits.com/2025/10/30/vulnerabilities-in-luks2-disk-encryption-for-confidential-vms/

0
8
0
repeated

AMD, Intel and Nvidia have poured untold resources into building on-chip trusted execution environments. These enclaves use encryption to protect data and execution from being viewed or modified. The companies proudly declare that these TEEs will protect data and code even when the OS kernel has been thoroughly compromised. The chipmakers are considerably less vocal about an exclusion that physical attacks, which are becoming increasingly cheap and easy, aren't covered by the threat model These physical attacks use off the shelf equipment and only intermediate admin skills to completely break all TEEs made from these three chipmakers.

This shifting Security landscape leaves me asking a bunch of questions. What's the true value of a TEE going forward?. Can governments ever get subpoena rulings ordering a host provider to run this attack on their own infrastructure? Why do the companies market their TEEs so heavily for edge servers when one of the top edge-server threats is
physical attacks?

People say, "well yes. just run the server in Amazon or another top tier cloud provider and you'll be reasonably safe." The thing is, TEEs can only guarantee to a relying party that the server on the other end isn't infected and couldn't give up data even even if it was. There's no way for the relying party to know if the service is in Amazon or in an attackers's basement. So once again aren't we back to just trusting the cloud, which is precisely the problem TEEs were supposed to solve?

https://arstechnica.com/security/2025/10/new-physical-attacks-are-quickly-diluting-secure-enclave-defenses-from-nvidia-amd-and-intel/

1
6
0
repeated

the most important question I have about this HackingTeam revival that was exposed by @oct0xor and co is if is still saving the day when the live demos fail during a sales pitch. or did they find a new Serge?

(anyone remember ? or am I just really old?)

3
1
0
repeated

🚨🚨🚨 Absolutely insane stuff here. @lorenzofb spent months working on this story.

Peter Williams, former L3Harris Trenchant boss β€” the division that makes cyber exploits, zero-days and spyware for Western governments β€” has pleaded guilty to selling Trenchant's exploits to Russia.

https://techcrunch.com/2025/10/29/former-l3harris-trenchant-boss-pleads-guilty-to-selling-zero-day-exploits-to-russian-broker/

3
10
0
repeated
Edited 11 days ago

There's an Azure outage, so in the Netherlands, rail services aren't working.

(Originally read "trains", but it's not the actual trains, it's ticket sales and planning)

https://nltimes.nl/2025/10/29/ns-hit-microsoft-cloud-outage-travel-planner-ticket-machines-affected

0
4
0
repeated

CatSalad🐈πŸ₯— (D.Burch) blobcatrainbow

If Azure isn't back up in 15 minutes, everyone can go home.

4
8
0
@electron_greg I'd vouch for some satellite equipment so I can send SOS because I can't survive on software and electricity (unfortunately)
1
0
2
Edited 11 days ago
[RSS] Python - Zip64 Locator Offset Vulnerability

https://github.com/google/security-research/security/advisories/GHSA-hhv7-p4pg-wm6p

Edit: This is CVE-2025-8291 (thx for all who noted!)
1
1
2
@erkhyan Give that person a medal or stg xD
0
0
1
Show older