Posts
3826
Following
724
Followers
1596
"I'm interested in all kinds of astronomy."
repeated

@kim_harding

Firefox-maker Mozilla … arguing the rollback shows the company pushed AI too far without enough regard for user choice.

So little self awareness.

0
2
0
repeated

Wrote about the attacker-defender asymmetry and why AI made it worse -- "AI for defense" is stuck polishing the top five turtles while adversaries live in the bottom ten. https://cje.io/2026/04/08/offense-scales-with-compute-defense-scales-with-committees/

0
5
0
@da_667 I ran a couple of tests and I'm disappointed: afaict you can export some specific plain stream types, but not a full PCAP. With -w the same encrypted stream is written out.

Sorry for the misdirection!
0
0
1
repeated
Edited 3 days ago

space_exp_artemis πŸš€ We just sent a team of humans to the moon and safely home.

Not one bit of generative AI was used or needed.

You don't need it in your office or organization, either.

We can do great things without pillaging public resources and funds for a scam.

0
7
0
@da_667 Now you nerdsniped me to do this with tshark (well, maybe tomorrow), I'd be utterly disappointed if this couldn't be done with a pcap output format:

https://tshark.dev/export/export_tls/
1
0
1
repeated
repeated

A sign of the times.

3
12
0
repeated
Edited 3 days ago

There is at least one Adobe Reader 0day being exploited in the wild:
https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

Edit: This is now fixed as CVE-2026-34621.

4
7
0
Edited 4 days ago
Artemis II mission planning:

"We strap you on a rocket, launch around the Moon based on some absurdly complicated mathematical formulas, then guide you back down the atmosphere at insane speeds, trying hard not to burn you alive.

Finally, we have to make sure you don't splash down at these particular areas of our planet, or some angry Earthlican may just shoot you."

Humanity is weird.
0
1
0
@kaoudis Wow, beautiful! After filtered Anthropic-related results from my search I still thought the images were LLM generated...
0
0
1
repeated

xyla!! πŸ€πŸ“ˆ

cpuid has been compromised, most downloads are serving a rat+infostealer as we speak, make sure you didn't get hit

0
4
0
repeated

We publish a major Citizen Lab report on Webloc, an ad-based mass surveillance system that monitors the movements and personal characteristics of hundreds of millions people globally based on data obtained from mobile apps and digital advertising.

Customers include ICE, El Salvador and Hungary.

Our research shows that ad-based surveillance is now used by military, intelligence and law enforcement agencies down to local police in several countries.

Full report here:
https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/

1
21
0
This comic needed an update
0
9
17
@timb_machine What kind of information do you hope to extract from this? KEV data is incomplete, CVE data is extremely noisy and incomplete.
0
0
0
repeated
repeated

Very slightly work adjacent: a "we've updated our privacy policy" email in my inbox reminded me of a thing that $work did, and that I wish every company did: we checked all our ToS and similar documents into a git repo and published it, so that when they change you can just go look at the damn diff and see what changed (https://github.com/tailscale/terms-and-conditions).

If you work someplace and have the authority to do this, I wish this was normalized and expected of corporations that expect us to ingest a short story worth of legalese and keep up with the changes over time.

4
8
0
Thanks to
@jasminecarter.bsky.social
my cumulative complexity calculator for #Ghidra now has a cute logo:

https://github.com/v-p-b/rabbithole
0
1
2
@obivan There is a lot of nuance to consider with these results, incl. feasibility with other models (I'm willing to believe it's doable). But e.g. the FP problem doesn't seem at all that limiting as some suggest and some of the results (with Mythos&others) are very hard to ignore as a vulnerability researcher.
1
0
2
Fair criticism of the latest @Bellingcat piece about leaked .gov.hu credentials (HU, use your favorite translator):

https://kiber.blog.hu/2026/04/09/tobb_szaz_magyar_kormanyzati_jelszo_kerult_ki_az_internetre_ja_de_mikor

There is *a lot* to report about in Hungarian politics/natsec, but digging up old credential dumps just misdirects attention and discredits relevant investigative work.
0
1
5
Show older