Microsoft is investigating reports that some Windows 11 devices are failing to boot with "UNMOUNTABLE_BOOT_VOLUME" errors after installing the January 2026 Patch Tuesday security updates.
AMD4700S Root Key 0 SHA256: 95333bf313b67f653e2b80518d39e39cbc8f481f61a86f6052d2b277217206d3
AMD4700S Root Key 1 SHA256: e2e0e8f8e0c66339c28ed3ee66e2fc9499ac5a5332009f57df556b4b319a73a7
AMD4700S Root Key 2 SHA256: f87833eb4a152f25d07051e73b23a5923fa8ddbdac879940eb1703fa5f9a4d09
AMD4700S Root Key 3 SHA256: 5163e65a31dab1bb833802390dc0bc0d330c8592e20f31133f2be27dbec109b8
Hash values calculated using the raw key bytes. If you get something else, try reversing all key bytes.
stumbled into the Logitech subreddit and found out that Logitech's code signing certificate for macOS expired a few weeks ago, which caused Logitech Options+ to be unable to launch, which stopped everyone's mice from working until Logitech updated it.
so much stupid involved here.
There is an open position on my team:
https://crowdstrike.wd5.myworkdayjobs.com/en-CA/crowdstrikecareers/job/United-Kingdom---Remote/Security-Researcher--Malware-Triage--Remote-_R26466
While this is not currently listed here, I am certain that U.S. remote is an option and if you're in Canada, I strongly expect that this would work as well.
“What if I Simply put tailscale in initramfs?”: statements dreamed up by the utterly deranged (that is, @jyn ). Very cool blog post on remotely unlocking an encrypted boot partition: https://jyn.dev/remotely-unlocking-an-encrypted-hard-disk/
So who at Argo CD is sleeping? 68 days old report of RCE with POC reported accordig to procedure as it should, tried poking slack, mail... No ack. Wondering if just full disclosure is the way. Please ping me, not my finding but will relay.
📣 Help needed! For our upcoming #RSAC talk, @boblord and I are studying cyber near misses, moments where serious harm was narrowly avoided, and what we can learn from them. These near misses might apply to software development, or to network defense. (Please boost for reach! 🙏)
We are hoping to surface general patterns using some (anonymized) examples.
If you’re willing, reply with a high-level response to one or two of these prompts. Anonymize as appropriate, and/or send to us in DMs if you prefer:
* What lesson did an organization fail to learn after a near miss, even though it seemed obvious at the time?
* Describe a time when you discovered something and thought “If we didn’t catch this now, it would have been baaaaad”.
* Describe a time when you dealt with a software vulnerability in your systems that was being actively exploited elsewhere, but (as far as you could tell), not in yours. What saved the day?
* What repeated “almost failures” do you see getting normalized or waved away as acceptable risk?
* Can you recall a near miss triggered by a third party such as a researcher report, customer question, bug bounty submission, or vendor advisory that revealed a bigger issue than expected?
* Can you think of a near miss where the most important factor was not a security control, but a human action like someone double-checking, questioning an alert, or escalating a “weird feeling”?
Thanks!