Count Dracula was 412 when he moved to England in search of new blood.
Sauron was 54,000 years old when he forged The One Ring.
Cthulhu had seen galaxies flare
into life and fade to darkness before he put madness in the minds of men.
It's never too late to follow your dreams!
New blog post: Vulnerability Spotlight - CVE-2023-32692.
Learn about the remote code execution vulnerability in CodeIgniter4 and try out our Dev-Container based test environment to follow along!
https://mogwailabs.de/en/blog/2026/05/vulnerability-spotlight-cve-2023-32692/
DOMPurify XSS via `selectedcontent` re-clone
https://github.com/cure53/DOMPurify/security/advisories/GHSA-87xg-pxx2-7hvx
This is one of the most interesting bypasses we have seen in a long time, and it feels that this new HTML element will cause lots of trouble in the future.
The Nightmare-Eclipse repo clearly credits James Forshaw with the CVE-2020-17103 vulnerability that MiniPlasma is based off of.
Did Nightmare-Eclipse modify MiniPlasma to use a variant of CVE-2020-17103 that still works on modern Windows, which surely contains the fix?
NO. MiniPlasma IS the poc from the GPZ write-up, but with a minor tweak to do something (LPE).
Why does it work on current Windows?
Well, instead of fixing CVE-2020-17103, they decided to break the PoC instead. And yeah, with Win10 Dec 2020 and Win11 RTM, the GPZ PoC doesn't work.
But somewhere between Win11 RTM and 22H2 (I have neither the VM snapshots nor the patience to determine when exactly), whatever thing Microsoft did to break the CVE-2020-17103 PoC regressed. An because it wasn't a fix, then surely Microsoft had no regression test to detect that the fix was no longer present.
So here we are. MiniPlasma is the GPZ PoC, but modified slightly to achieve LPE by way of Volatile Environment and wermgr.exe instead of creating DEMODEMO in the registry.
Since Microsoft didn't bother fixing CVE-2020-17103, will CVE-2020-17103 simply be updated with the MiniPlasma recognition that it wasn't actually fixed in December 2020? Get real. This will surely get a new CVE, as CVEs are for Microsoft updates, not vulnerabilities. 😂
GitHub Copilot AI token charges go up 10×–100×
how Enterprise Software as a Service works
https://www.youtube.com/watch?v=-A9FjHGcFWg&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
https://pivottoai.libsyn.com/20260518-github-copilot-ai-token-charges-go-up-10x-100x - podcast
time: 7 min 33 sec
https://pivot-to-ai.com/2026/05/18/github-copilot-ai-token-charges-to-go-up-10x-100x/ - blog post
Clownstrike share price basically tripled since the 2024 fuckup... There is no such thing as long term damage in cyber stocks LOL :PPPPPPPP
🐞 Linus Torvalds says AI-powered bug hunters have made Linux security mailing list ‘almost entirely unmanageable’
“So just to make it really clear: If you found a bug using AI tools, the chances are somebody else found it too. If you actually want to add value, read the documentation, create a patch too, and add some real value on *top* of what the AI did. Don't be the drive-by ‘send a random report with no real understanding’ kind of person. OK?”
RubyGems suspends new Signups after Hundreds of Malicious Packages are Uploaded.
RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack."
"We're dealing with a major malicious attack on Ruby Gems right now," Maciej Mensfeld, senior product manager for software supply chain security at Mend.io, said in a post on X. "Signups are paused for the time being. Hundreds of packages involved – mostly targeting us, but some carrying exploits."
https://x.com/maciejmensfeld/status/2054164602577940619
⁉️Visitors to RubyGems sign up page are now greeted with the message: "New account registration has been temporarily disabled."⁉️
#rubygems #security #privacy #media #secure #ruby #programming #developer #infosec #tech #news
so, umm, this is a 16 bytes intro
16 bytes
!!!!!!!!!!!!!!!!