They finally did it. Microsoft has successfully over-engineered a text editor into a threat vector.
This CVE is an 8.8 severity RCE in Notepad of all things lmao.
Apparently, the "innovation" of adding markdown support came with the ability of launching unverified protocols that load and execute remote files.
We have reached a point where the simple act of opening a .md file in a native utility can compromise your system. Is nothing safe anymore? š
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841
#noai #microslop #microsoft #windows #programming #writing #windows11 #enshittification #cybersecurity #infosec #technology
Micropatches released for Windows Telephony Service Elevation of Privilege Vulnerability (CVE-2024-43626)
https://blog.0patch.com/2026/02/micropatches-released-for-windows.html
"I'm very glad," said Piglet happily, "that I thought of giving you Something to put in a Useful Pot."
šŖšŗ
"Switzerlandās military has terminated its contract with Palantir⦠following a security audit⦠concluded that U.S. intelligence agencies could potentially access sensitive Swiss defense data⦠significant reputational warning for the data analytics firm"
https://www.newscase.com/palantirs-swiss-exit-highlights-global-data-sovereignty-challenge/
Wheeee my presentation on parser differentials made it on the Top Ten Web Hacking Techniques of 2025
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025
Apple says it supports competition, privacy, and repair. AirPods say ānot for you.ā From EU feature lockouts to batteries you canāt replace, we unpack Appleās most disposable design at the link below.
https://www.ifixit.com/News/115572/apple-airpods-and-malicious-compliance
ā
#iFixit #RightoRepair #FixTheWorld
my friend @asciimoo built a thing again \o/ and it's great as always. read his own thoughts on this at https://hister.org/posts/how-i-cut-my-google-search-dependence-in-half/
and engage with the cringe on the orange site at https://news.ycombinator.com/item?id=46959554
This multi-part blog series is discussing an undocumented feature of Windows: instrumentation callbacks (ICs).
In part 4 we cover ICs from a more theoretical standpoint. Mainly restrictions on unsetting them, how set ICs can be detected and how new ones can be prevented from being set.
Learn more at https://cirosec.de/en/news/windows-instrumentation-callbacks-part-4/