okay I can finally show off these things- Sun SPOTs, weird little java on metal microcontrollers from 2005/2006!
Aww yiss another critical Citrix vuln.
Detection/remediation details here: https://docs.netscaler.com/en-us/netscaler-console-service/instance-advisory/remediate-vulnerabilities-cve-2026-3055
@james_inthe_box @campuscodi VPNs have that problem where they don't solve the problem that the people selling VPNs say they solve
Coding with LLMs and agents is a generational opportunity to throw the last decade's hard won lessons on secure coding and appsec out of the window. Definitely something that trust and safety teams, threat actors and possibly even your parents are seizing on with glee when they bypass all of your policies and procedures around installing new software, data governance, validated designs, code reviews, principles of least privilege and regular security assessments. Best of luck.
I popped a Pwn2Own $40k target with a directory traversal in hypervisor
Plenty of buffer overflows there, too
https://bird.makeup/users/abantdogal/statuses/2036132328599089230
i love that we went from "zero trust" as a fundamental buzzword to "trust autonomous nondeterministic agents everywhere in your stack"