CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center https://cymulate.com/blog/cve-2025-64669-windows-admin-center/
Wrote down what I learned so far and open questions in this new doc: https://docs.google.com/document/d/16QNavHjds1OdkKsfqLYx6EF0ohA-Qh_dZc8OK9TFrQk/edit?tab=t.0#heading=h.z1r9lwho309s
…in case you are interested in seeing where I am and what are my next steps, and maybe have new ideas. Thanks in advance! The doc is free to comment, or you can always ping me here.
EDIT: Please do not tag/bother Tim Berners-Lee. Angle brackets happened many years before he started working on HTML.
Bellingcat’s Kolina Koltai uncovers the Hungarian national behind two deepfake porn websites. The key figure rakes in profits and vacations in luxury hotels in Dubai and Bali, whilst website visitors create sexually explicit images and videos.
Find out how we uncovered the administrator behind the deepfakes by reading the full investigation here: https://www.bellingcat.com/news/2025/12/15/mark-resan-reface-deepfake-porn/?utm_source=mastodon
For those of you who remember ScreamingGoat, they're currently looking for a new role. Ideally something in the threat Intelligence space and DC local. Y'all know how he is with emerging vulnerabilities. Let me know what you've got and I'll make sure it makes it to them.
just released liboprf-0.9.3
liboprf is a library implementing the OPRF from https://www.rfc-editor.org/rfc/rfc9497.html and in addition it also provides a threshold variant (tOPRF) and a distributed key generation (DKG) protocol for the tOPRF shared secret, as well as a key update protocol for the tOPRF shared secret. it comes with a high level python frontend that supports servers on TLS, USB and Bluetooth LE
We need to normalize declaring software as finished. Not everything needs continouos updates to function. In fact, a minority of software needs this. Most software works as it is written. The code does not run out of date. I want more projects that are actually just finished, without the need to be continuously mutated and complexified ad infinitum.
Microsoft will pay bug bounties even for 3rd party components:
https://www.theregister.com/2025/12/12/microsoft_more_bug_payouts
Does anyone have a copy of the following paper:
https://doi.org/10.1016/0167-4048(82)90003-7
Robert H. Courtney, Jr., "A systematic approach to data security", in Computers & Security Volume 1, Issue 2, June 1982 (pgs. 99-112)
I have tried Sci-Hub and Anna's but no luck 
(it is paywalled at https://www.sciencedirect.com/science/article/abs/pii/0167404882900037 for $30 which seems criminal)
make a programming language and then make a game in it.
https://itch.io/jam/langjamgamejam
https://langjamgamejam.com/
#langjam #gamejam #langjamgamejam