Posts
3436
Following
714
Followers
1581
"I'm interested in all kinds of astronomy."
@sassdawe @ludicity 100%, I definitely not meant to piss on sw engineers in particular, median skill isn't great industry-wide.
0
0
1
[RSS] Building a Custom Architecture and Platform: Part 1

https://binary.ninja/2026/02/20/quark-platform-part-1.html

#BinaryNinja
0
1
3
@b0rk I miss a hotkey to search for "identifiers", e.g. if I want to search for `-x` I don't want to see `-X --xenomorph`. The situation is even worse for one character identifiers/symbols (think tmux, bash, etc.).

I also find it impossible to remember section/page arguments (argument order + what number means what in `man N printf`).
0
0
2
[RSS] "They even thanked the coders for giving them such a difficult challenge."

https://unsung.aresluna.org/they-even-thanked-the-coders-for-giving-them-such-a-difficult-challenge

On how Spyro PlayStation edition (2000) was cracked.
0
0
1
@ludicity I worked mostly at (pen)testing and have always been astonished how basics of basics were unclear for many people (e.g. "does this code run on the client or the server?"). My opinion in summary is that the general quality of sw engineering/ers declined since managers figured out they can bill by the hour instead of fulfillment under the guise of "agile" (see "I'm gonna write myself a new minivan this afternoon").
1
0
2
repeated

Try it out yourself: https://zellic.ai

1
1
0
repeated

Here it is, our biggest issue to date, Issue !
Read, share, enjoy!
https://pagedout.institute/?page=issues.php
Get prints here - https://www.lulu.com/search?page=1&pageSize=4&sortBy=PRICE_ASC&q=PAGEDOUT8&adult_audience_rating=00

And with that CFP for is open - deadline 30 April 2026

0
3
0
repeated

Wikipedia bans Archive.today after site executed DDoS and altered web captures
If DDoSing a blog wasn't bad enough, archive site also tampered with web snapshots.
https://arstechnica.com/tech-policy/2026/02/wikipedia-bans-archive-today-after-site-executed-ddos-and-altered-web-captures/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

3
5
0
repeated

RE: https://infosec.exchange/@timb_machine/116068550511596363

If there's anyone on here that works at GitHub, do you think you could remind your support team to check their emails.

For reasons unknown you decided to suspend my account a week ago and I'm yet to even get a response that a ticket has been opened to investigate. I'm sure there's a reason (although I suspect it's debatable) but it would at least be nice to hear from you that it's being looked at.

1
5
0
[RSS] Reverse engineering the Creative Katana V2X soundbar to be able to control it from Linux

https://blog.nns.ee/2026/02/20/katana-v2x-re/
0
0
0
[RSS] Discovery & Analysis of CVE-2025-29969

https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/

(Windows MS-EVEN RPC Remote Code Execution Vulnerability)
0
0
1
[RSS] OpenCFD OpenFOAM Code Stream directive arbitrary code execution vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2292
0
0
0
repeated
Edited 5 days ago

Before launch, Perplexity hired us to test the security of Comet, their AI browser assistant. We demonstrated how four prompt injection techniques could extract users' private information from Gmail. https://blog.trailofbits.com/2026/02/20/using-threat-modeling-and-prompt-injection-to-audit-comet/

0
2
1
@leyrer Wait till one of those techbros announce they reserved capacity for future weapons manufacturing...
0
0
2
repeated

SGI stack overflow 😱
booting the IRIS Indigo R3k..

4
8
1
repeated

Just shipped updates for rhabdomancer, haruspex, and augur. Now compatible with @HexRaysSA IDA 9.3 and @xorpse's idalib-rs 8.0.

These headless plugins are built for workflows where you want IDA's power without the GUI. This release brings a bunch of small improvements and bug fixes.

https://hnsecurity.it/blog/streamlining-vulnerability-research-with-the-idalib-rust-bindings-for-ida-9-2/

0
4
0
[RSS] CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

https://www.thezdi.com/blog/2026/2/19/cve-2026-20841-arbitrary-code-execution-in-the-windows-notepad

ZDI analysis of the notorious vuln
0
0
2
[RSS] "Good enough" emulation: Fuzzing a single thread to uncover vulnerabilities

https://blog.talosintelligence.com/good-enough-emulation/
0
0
0
Show older