Posts
2528
Following
649
Followers
1466
"I'm interested in all kinds of astronomy."
repeated

look i am not going to be a recall defender, nor am i a fan of the “uac is not a security boundary” bit, but this commentary seems… disingenuous. yes, your data is restricted to your user. yes, admins have full control over the machine meaning they can access your data. this shouldn’t be surprising. windows admin security boundaries are basically non-existent, i wish that wasn’t the case but that’s how it’s always been and will be for the foreseeable future

3
1
1
repeated

AhnLab researchers warn about phishing HTML files attached to emails that prompt users to directly paste (CTRL+V) and run commands. https://asec.ahnlab.com/en/66300/

0
1
0
repeated

Ooh cool @travisgoodspeed has written a book on Microcontroller Exploits. Will certainly be adding this to my collection!

https://nostarch.com/microcontroller-exploits

0
2
0
repeated

Anyone have security contacts at Google? One of their IP addresses is spamming my ssh server, apparently as part of a botnet. Seems someone got compromised.

34.71.138.230 is the guilty party.

2
2
0
repeated

I added disabling Recall to my HardeningKitty list:
https://github.com/0x6d69636b/windows_hardening

Disable Recall - User
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

Disable Recall - Machine (not yet official)
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

1
2
0
repeated

Introducing Honeykrisp: the world's first conformant Vulkan® 1.3 driver for Apple Silicon.

https://rosenzweig.io/blog/vk13-on-the-m1-in-1-month.html

1
8
0
repeated
repeated

It happened again. We accidentally broke another check-in . This time Mr O'Yolo triggered a problem, crashed the Allegro Scenario Player and escaped the mode, which enabled access to the Windows Desktop: https://www.pentagrid.ch/en/blog/ariane-allegro-hotel-check-in-terminal-kios-escape/

0
2
0
repeated

@recon is hosting BlackHoodie again this year, with a training on Reverse Engineering Ransomware brought to you by the incomparable Suweera DeSouza and Alex Delamotte. Registration is still open https://blackhoodie.re/Recon2024/ please share!

0
4
0
repeated

🎉 Go 1.22.4 and 1.21.11 are released!

🔒 Security: Includes security fixes for archive/zip and net/netip

🔈 Announcement: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k

⬇️ Download: https://go.dev/dl/#go1.22.4

0
3
0
repeated
repeated
the only thing worse than "WHY IS THIS BROKEN" is "WHY DOES THIS WORK"
0
3
0
repeated

Adobe introduces the One Click Stalin tool.

0
6
1
repeated

Ever wanted to feed the decompiled C code into source code analysis tools?
With rev.ng you can! 💪

We emits syntactically valid C code!

Here's a PoC did with Clang Static Analyzer. 😎

0
2
1
repeated
repeated
repeated

How does F5's Secure Vault, its "super-secure SSL-encrypted storage system" work? Response in this article by team member @myst404

https://offsec.almond.consulting/deep-diving-f5-secure-vault.html

0
2
0
repeated

🚨 New advisory was just published! 🚨

A vulnerability in the Linux kernel allows local attackers to escalate privileges on affected installations of Linux Kernel:
https://ssd-disclosure.com/ssd-advisory-linux-kernel-nft_validate_register_store-integer-overflow-privilege-escalation/

0
1
0
repeated
repeated
Show older