Posts
3566
Following
722
Followers
1586
"I'm interested in all kinds of astronomy."
@EUCommission

"federated Telco-Edge-Cloud infrastructure that merges telecoms and cloud computing."
"Our goal is simple"

Oxymoron much?
0
0
3
repeated

RE: https://ec.social-network.europa.eu/@EUCommission/116211334179600320

this is a meme and not in the good meaning of the word

even less than GAIA-X, just rofl :/

1
1
0
@huronbikes I guess you just drop those in the dark gray pots?
1
0
1
repeated

Lorenzo Franceschi-Bicchierai

SCOOP: The iPhone mass hacking toolkit used by Russian spies was developed at U.S. military contractor L3Harris, former employees said.

The Coruna toolkit was used against Ukrainians during the war and by Chinese cybercriminals, according to Google.

But the toolkit was initially developed for governments in the Five Eyes spy alliance, and it was used in Operation Triangulation, according to one source.

https://techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/

1
4
0
@ciaranmak Yes, accidentally blowing them up is an accepted risk.
0
0
1
Hear me out: The boiling point of ethanol is well within the range of operating temperatures of GPUs, so we could use all those AI datacenters to brew moonshine!
5
9
19
repeated

Released a tool to erase X-Gold 608 (06.15.00 iPad) baseband.
https://github.com/tihmstar/bberase_ultrasn0w

This is useful if you want to downgrade your iPhone 3G to iOS 2.0 with the matching baseband.

The exploit/payload was taken from redsn0w and some code from xerub. There isn't really anything novel here, but until now there wasn't a straightforward way to erase the baseband or to downgrade to iOS 2.0 baseband on the iPhone 3G.

0
2
0
@dale_price The fact that browsers used to make you click through a warning window when you encountered a HTTPS site still makes me giggle
0
0
1
TFW LLM keeps hallucinating
0
2
7
repeated

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

https://cyllective.com/blog/posts/lenovo-vantage

0
3
0
@joxean Have we tried applying microcode updates?
1
0
4
@dmnk ...that will do unexpected shit at the worst possible times?
0
0
1
This agent could've been 10 lines of Bash.
2
0
4
repeated

🚨 New advisory was just published!

A critical vulnerability in UNISOC modem firmware allows one User Equipment (UE) to remotely attack another over the cellular network. By sending specially crafted malformed SDP within SIP signaling messages, an attacker can trigger memory corruption in the target modem, potentially leading to remote execution of arbitrary native code on the victim device: https://ssd-disclosure.com/unisoc-t612-rce/

0
2
0
@Sandfish6811 I can't dive deeper into this rn, but the linked GHSA confirms the essence of the vulnerability and the way it was introduced.

I checked and you are right that the hash is not sent back during auth, I'll probably leave a comment about this on /r/ so they can clarify.
1
0
0
repeated

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover https://cymulate.com/blog/cve-2026-26117-azure-arc-windows-lpe-cloud-identity-takeover/

0
3
0
[RSS] Breaking Pingora: HTTP Request Smuggling & Cache Poisoning in Cloudflare's Reverse Proxy

https://xclow3n.github.io/post/6
0
3
2
Show older