Posts
3948
Following
729
Followers
1602
"I'm interested in all kinds of astronomy."
repeated

Hoshino Lina (星乃リナ) 🩵 3D Yuri Wedding 2026!!!

I worked at a fairly big tech co years before the AI boom. People did large scale refractoring across huge code bases back then. With refactoring tools. And properly written robots.

Applying changes to code at scale, opening PRs automatically, basic interaction with human reviewers, making sure tests pass, getting things merged when ready. All that already existed before LLMs. And it was actually reliable and not capable of hallucinating terrible things.

It's like we've forgotten how to automate things without LLMs and openclaw now...

3
8
0
repeated

TrendAI Zero Day Initiative

Amaze! Amaze! Amaze! Orange Tsai of DEVCORE Research Team was able to exploit Edge with a sandbox escape! If confirmed, we wins $175K. He's off to the disclosure room to explain how he did it.

0
3
0
repeated

TrendAI Zero Day Initiative

Boom! Valentina Palmiotti wastes no time kicking off Berlin in style. She requires just a few second to get code execution on the NV Container Toolkit. She heads off to the disclosure room to provide all the details.

0
3
0
repeated
Edited 5 days ago

I have published 3.4.0. Now you can install it in IDA by just running this:

$ hcli plugin install diaphora

https://github.com/joxeankoret/diaphora/releases/tag/3.4.0

2
3
1
repeated

A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens https://projectzero.google/2026/05/pixel-10-exploit.html

0
2
0
repeated
Edited 5 days ago
2
2
5
@sassdawe "If a man promises to fix something, he'll fix it. No need to remind him every year!"
0
1
1
repeated
Edited 2 days ago

Hey nerds!

I made a thing!

It's a "chore tracker*, but I took a somewhat unique take on the subject 🙈

It tracks when did you last completed a chore and how close are you to the desired frequency you set for that particular chore.

You can access it here: https://chores-mvp.azurewebsites.net/

There is policy as well. I hope it will answer most of the questions.

You can self-host it if you're into that sort of things, get it from GitHub: https://github.com/sassdawe/chores

Design goal #1: when popular and eventually hacked leading to user info being leaked @troyhunt should only be able to say: can't add it to HiBP because there is no email address anywhere. ✅

Design goal #2: No passwords because they are bad for security. ✅

Design goal #3: make the users the Most Valuable Partner in doing the Chores. ✅👀

PS: And let me know whether you played around with the Demo and did it spark joy?

6
3
0
repeated

The Junkyard Call for Bugs is officially open! 👾
www.districtcon.org/junkyard

For additional information, please reference our Disclosure Guidance doc: lnkd.in/ewjswJyf

And if you missed last years presentations, check them out on YouTube now: https://www.youtube.com/@DistrictCon/shorts

0
3
0
Edited 6 days ago
Officially lost track of Linux page cache LPE's - see also: "cache invalidation and naming things":

https://github.com/v12-security/pocs/tree/main/fragnesia

This is CVE-2026-46300
0
2
2
repeated
repeated

Missing peripheral in QEMU? Adding it yourself is easier than you think.

We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to . Register by register, using U-Boot's own source as the spec.

🔗 http://www.eshard.com/blog/u-boot-cve-tta-qemu-part-2

0
3
0
repeated

When you hear people abandoning Open Source because of the AI exploit threat, ask them if we should keep our laws secret as well.

Because there is a huge industry of accountants and lawyers specialized in finding exploits in those.

No? Thought so.

4
7
0
repeated

Our new multi-model agentic security system brings together more than 100 specialized agents across frontier and custom models to find exploitable bugs, delivering top performance on the CyberGym benchmark.

We used it ahead of Patch Tuesday to help find and fix 16 vulnerabilities. Today we’re announcing that customers can sign up to test it in private preview.

https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/?v=1

0
2
0
repeated

Will you please stop wasting time on Mythos-associated FUD and try to understand that you need to build reliable and dependable software, not stuff which changes weekly, to get security?

Mythos & LLM only bring breadth and depth to automated searching, they find nothing conceptually new, if no-one had come up with buffer overflows there would be no buffer overflows coming out of Mythos.

There will be a flood of issues, as if suddenly thousands of people were dedicated to finding bugs, then it will stop.

It is an excellent chance to ask yourselves "why?" and realise that no, we don't need software like it is being built now, you need software like it was built back when downtime mattered.

4
5
0
Show older