Posts
3574
Following
722
Followers
1586
"I'm interested in all kinds of astronomy."
repeated

RE: https://furry.engineer/@soatok/116082533052740652

ok the ghost vuln is quite funny. the WAF example really sounds like an array is involved there and it would have bet 20 bucks that its a type confusion (because despite it being 2026 its really easy to shoot yourself in the foot if your types get quirky)

but - spoilers - nope, its really just straight up string interpolation into raw sql like in the good ol days lmao. oh well, happens

0
3
0
[RSS] When Audits Fail Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise (CVE-2025-32355, CVE-2025-59793)

https://www.rcesecurity.com/2026/02/when-audits-fail-from-pre-auth-ssrf-to-rce-in-trufusion-enterprise/
0
1
2
repeated

nono - kernel-enforced capability sandbox for AI agents https://nono.sh

0
2
0
repeated

I’ve been working on this for a while, but let’s make it official: I started a little Tumblr-like microblog about software craft and quality!

You can sign up via RSS or a weekly newsletter digest. There’s already almost two months of content in there, if you just want to check it out.

Hope you like it!

https://unsung.aresluna.org/

4
3
0
repeated

Just got this link on my discord - https://www.kickstarter.com/projects/bitman/bootblock-rebels - passing it along because this book looks fun!

0
3
0
repeated

The past two months, I've been working on a little pet project, lovingly called OnlyJunk.Fans: hosted iocaine. For free. Because I could, and wanted to.

It's going to officially launch on the 17th of February, in just a few days. But I thought I'll blog about it before the launch, because I won't have time to do so later.

1
3
0
repeated

🚨 New advisory was just published!

Source code review of the Novarain/Tassos framework uncovered 3 critical primitives: unauthenticated file read, unauthenticated file deletion, and SQL injection enabling arbitrary DB reads, affecting 5 widely deployed Joomla! Extensions. Chained together, these bugs allow reliable RCE and administrator account takeover on unpatched Joomla! Instances: https://ssd-disclosure.com/joomla-novarain-tassos-framework-vulnerabilities/

0
2
0
repeated

LittleAlex 🇺🇦🇮🇱🇩🇪🇳🇴

Edited 25 days ago

EDIT: alt text added

4
11
0
@cR0w Good enough, where do I send the money?
0
0
1
@cR0w Do you have experience in pulling information out of thin air? Because I know of no other sources but need the bits...
0
0
0
repeated

❤️ Thank you to the Wiki maintainers! ❤️

in general, and maintainers of documentation most of the time get way too little recognition for their contributions to .

ArchWiki is one of the pearls of the internet! That's why I dedicated my this year's post to the maintainers!

https://k7r.eu/i-love-the-work-of-the-archwiki-maintainers/

4
6
0
Naming things is freaking hard...
0
0
2
repeated

The final chapter? The statement from Ars:

On Friday afternoon, Ars Technica published an article containing fabricated quotations generated by an AI tool and attributed to a source who did not say them. That is a serious failure of our standards. Direct quotations must always reflect what a source actually said.

https://arstechnica.com/staff/2026/02/editors-note-retraction-of-article-containing-fabricated-quotations

3
6
0
repeated

Ars Technica retracted an article about how AI is making the world worse because...
the Ars article itself contained AI-generated quotes in it.

https://arstechnica.com/staff/2026/02/editors-note-retraction-of-article-containing-fabricated-quotations/

Welp, we had a decent run, folks. But it's time to call it.

2
7
0
repeated

Not sure if it’s useful for anyone. 0 dependency parser for plist (xml only) in the browser

https://codecolor.ist/tinyplist/

0
2
0
[RSS] vitoplantamura/BugChecker: SoftICE-like kernel debugger for Windows 11

https://github.com/vitoplantamura/BugChecker
0
1
0
repeated

r2web now has a built-in code editor 🤟, Edit radare2 scripts right in-browser, Fully mobile UI friendly as always.

0
4
0
@sjn Assuming by AI we mean LLMs, this stamp would essentially say "no one cared to think this through".
0
0
6
repeated

2026, the year of the AI-driven attacker that could do back flips, they said.

Meanwhile, there's a magic number that allows Auth Bypass against Ivanti EPM (CVE-2026-1603)

something about a pledge 🙄

3
9
0
Show older