Just under a year ago I was planning to leave Google after 10 years. Since then I've been considering what's next (and doing some advisory work on the side).
I've slowly been giving more and more thought to how to give back in a sustainable way that works for me.
With that in mind, if you know of any organisations who offer security consulting/testing (pentesting) for NGOs or other worthy causes, please share π
(Please re-toot for reach)
ReactOS Celebrates 30 Years https://news.slashdot.org/story/26/01/27/0053233/reactos-celebrates-30-years?utm_source=rss1.0mainlinkanon
Are you ready to survive the night at RomHack Camp? π
We believe the best hacking stories happen after midnight. Thatβs why for RomHack Camp 2026, we are teaming up with Fibonhack to bring you another intense competition: "From Dusk Till Dawn"
This isnβt just another CTF. Itβs an on-site, 12-hour overnight marathon taking place at RomHack Camp.
The Roadmap to Glory
1οΈβ£ May 9-10: Open Online Qualifiers (24h)
2οΈβ£ The Selection: The Top 5 teams qualify for the Camp
3οΈβ£ Oct 2β3: The Finals. 19:00 to 07:00. On-site. No sleep. Pure skill.
From Web Security and Binary Exploitation to Cryptography and Reverse Engineering, Fibonhack is preparing a set of challenges that will push even the most seasoned researchers to their limit.
Mark your calendars. Sharpen your tools. The long night is coming.
π Follow Fibonhack and Cyber Saiyan for the upcoming quals registration link! π More info: https://romhack.io/ctf
#RomHackCamp #CyberSecurity #CyberSaiyan #CTF #Hacking #Rome #Fibonhack
Long shot: do I know anybody in Europe who can provide two dozen 12 row, 80 column punch cards, preferably punched with a specific text? (no advertising)
Background: August of this year marks 45th anniversary of a Nixdorf Computer apprenticeship, and we're meeting. I thought it would be cute to present colleagues with a punch card (which is what we first programmed on) as a souvenir.
Obviously I'd be very willing to pay for the service!
Boosts appreciated.
Just read this via repost from @HalvarFlake
https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/
This post from Sean Heelan is probably the most important post in that domain (being LLMs in offensive security contexts) in quite a while. We're already discussing this in my research group, and I have some initial thoughts. Exciting times!
Bit of a long shot, would anyone on here know how to get in touch with anyone from the Finnish demoscene group Future Crew, in particular Psi (Sami Tammilehto)? Are any on them on fedi? They must be in their 50's now.
I'd like to ask if he still has the Scream Tracker 3 source code, and if he would consider releasing it... It's such an important part of computing and music history. It deserves preservation.
Update: hearsay is that Psi is not interested in releasing the sources. See replies.
At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.
Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.
π Full technical write-up π
https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025
Odd anomaly caused Microsoft's network to mishandle example.com traffic
Company's autodiscover caused users' test credentials to be sent outside Microsoft networks.
https://arstechnica.com/information-technology/2026/01/odd-anomaly-caused-microsofts-network-to-mishandle-example-com-traffic/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social
My first blog post on Windows Administrator Protection is out. https://projectzero.google/2026/26/windows-administrator-protection.html probably the most interesting and complex bug out of the 9 I found, but that doesn't mean the rest weren't interesting as well, stay tuned :D
RE: https://infosec.exchange/@briankrebs/115962508398912420
This might actually be the point where I just refuse to go.
Not getting an Apple/Google-sanctioned phone with SafetyNet in order to enter a country.