Someone knows Bash disgustingly well, and we love it.
Here's our analysis of the Ivanti EPMM Pre-Auth RCE vulnerabilities - CVE-2026-1281 & CVE-2026-1340.
This research fuels our technology, enabling our clients to accurately determine their exposure.
This is the first video of a series, stay tuned for the next episodes.
Presentation: https://pad.rev.ng/p/jOHs-gJjn#/
Also available on YouTube: https://www.youtube.com/watch?v=TPgCIysN0tA
🔴 Clift: a new MLIR dialect for decompiling C
Clift is the AST-like IR that the rev.ng decompiler uses as the last stage before emitting C code.
Clift is an MLIR dialect, a sort of "meta IR" that enables you to define your own types and instructions
Good news. We just published the Firefox Security & Privacy newsletter for 2025 Q4
https://attackanddefense.dev/2026/01/30/firefox-security-privacy-newsletter-2025-q4.html
This is wild, there have been changes on the Cain&Able repository lately (yes that tool you used in your first IT security hands-on class 20 years ago) https://github.com/xchwarze/Cain #itsecurity #hacking
County Pays $600,000 To Pentesters It Arrested For Assessing Courthouse Security https://it.slashdot.org/story/26/01/29/2147207/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security?utm_source=rss1.0mainlinkanon
RE: https://tech.lgbt/@ShadowJonathan/115979646528496303
Give me Universal Basic Income and watch me obsessively plant fruit and nut trees in the entire city.
Hey Hey, People.
Just updated my book-in-progress - Suricata: An Operator's guide.
This update finally closes out chapter 7, a scenarios/exercises chapter to help readers grasp the concepts of threat research and data pivoting, and how the data acquired gets turned into Suricata rules.
There are three scenario exercises in total:
Scenario 1: PolarEdge Botnet
Scenario 2: Myth Stealer
Scenario 3: Oyster backdoor
As always, the book is available for free, and I'm not expecting anyone to pay for my half-finished work. Download a copy here:
https://leanpub.com/suri_operator
the exercises chapter is made much more fun for readers, if they can follow along, so I've updated the github supplementaries repo with pcaps for both the second and third exercise. You can find that repo here:
https://github.com/da667/Suricata-An-Operators-Guide-Supplementaries
Future plans:
Chapter 8 is going to be another somewhat hands-on chapter, where readers learn how to "throw" and capture pcaps of proof-of-concept exploits, and/or forge their own pcaps based on threat research write-ups. I'm not 100% sure which CVEs/vulns I'll be picking on here, but I'll be doing three of them, just for some variety.
As a former K-12 technology educator, let me break this down for you. If a "toy" comes with an app, it isn't a toy; it's a data collection mechanism, and likely a brand loyalty engine.
Kids don't need these things. In fact, they're much, much better off without them.