Posts
2528
Following
648
Followers
1466
"I'm interested in all kinds of astronomy."
repeated

My talk for https://nsss.se/

Title: CVEMITRECVSSNVDCNAOSS WTF

Abstract:

Bogus CVEs, know-better organizations, conflicting databases, AI hallucinations, inflated severity scoring, security scanners, Jia Tan. As the lead developer in the curl project, Daniel describes some of the challenges involved and what you need to do to stay on top of security when working in a high profile Open Source project running in some twenty billion instances. Involving many examples from real life.

3
2
1
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Last year European Parliament and national parliaments rejected the “EU child porn scanner” that was set to be installed on every phone. Apparently this week we’re going to ignore all that parliamentary action and mandate such a scanner once more. Here’s what I wrote earlier on how this super scary thing would work in practice: https://berthub.eu/articles/posts/client-side-scanning-dutch-parliament/

1
4
1
repeated
repeated

🐮Re-moo-te Code Execution in mailcow!

Dive into our analysis of two vulnerabilities we found in the mail suite mailcow. Learn how attackers can go from XSS to RCE, and why it's important to sanitize your error messages:

https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages/?utm_medium=social&utm_source=mastodon&utm_campaign=blog&utm_content=blog-mailcow-rce-240618-&utm_term=&s_category=Organic&s_source=Social%20Media&s_origin=mastodon

0
4
0
repeated

Graham Sutherland / Polynomial

Edited 1 year ago

I watched the new Practical Engineering video on the bridge collapse, and Grady said words to the effect of "all the work was partitioned out. nobody had a complete view of the situation. the people who really saw the problems had no autonomy to do anything about them, and the people with the authority to do something never saw the full picture - all they got was a piece of paper with action items", and I've never nodded along to something so hard. This happens aaaaalllllll the time in security.

1
2
0
repeated

Hey you fine people: Our agenda for the birthday party is public now: https://troopers.de/troopers24/agenda/ See you next week! 🥳

0
3
0
repeated

Last year in "How I choose a security research topic", I used two unnamed attack concepts as case-studies for fast failure. I can now reveal both unnamed techniques were timing attacks. I'm happy to say my third attempt went better!
https://portswigger.net/research/how-i-choose-a-security-research-topic

0
2
1
repeated
repeated

Ian Coldwater 👻🌿

somebody asked how people who have historically been anti-copyright could be against AI content theft, so let me give this a shot:

Information wants to be free to enrich human knowledge. It does not want to be free to make human knowledge worse to enrich the pockets of assholes

9
20
0
repeated

Our tl;dr from @RealWorldCrypto
https://buff.ly/4c3J70h

0
1
0
repeated

FYI, there is a bug in systemd. So, running: "systemd-tmpfiles --purge" will delete your /home/ in systemd version 256.

Source: https://mathstodon.xyz/@bremner/112615591101488528 and https://x.com/DevuanOrg/status/1802997574695080067

14
18
1
repeated

This is a keynote that I quite enjoy and highly recommend. https://mastodon.social/@joxean/112631528543638454

1
1
0
repeated

Newly disclosed (and dismissed) vulnerability reports

"HTTP headers eat all memory:"
https://hackerone.com/reports/2552192

"Incorrect conversion in hostname"
https://hackerone.com/reports/2552179

"Unicode-to-ASCII conversion in cmdlines on Windows lead to argument injection"
https://hackerone.com/reports/2550951

Transparency baby.

0
1
0
repeated
Edited 1 year ago

The new Intel Skymont architecture details, as presented brilliantly by Chips & Cheese¹ (strongly recommended) have a very "inspiring" paragraph:

"Skymont duplicates microcode for the most common complex instructions across all three clusters, letting them handle those instructions without blocking each other. Intel gave gather instructions as an example, which can load from multiple non-contiguous memory locations."

Intel is calling this nanocode, I am calling this a new playground...

__
¹ https://chipsandcheese.com/2024/06/15/intel-details-skymont/

0
1
0
repeated

You open up a Commodore 64, and the box says "welcome to the world of friendly computing."

You turn on a modern PC, and it immediately threatens your data unless you agree to save your data to *their* cloud service.

That right there is why we talk about vintage computers. Folks need to be reminded of what's possible.

5
30
1
repeated

Cook’s “How complex systems fail” is the most personally impactful paper I have ever read, and yet I’m convinced that it would never have been accepted for publication in a peer-reviewed journal.

https://www.adaptivecapacitylabs.com/HowComplexSystemsFail.pdf

3
2
0
repeated

📢 Next week is week! We will celebrate 15 years of making the world a safer place and are looking forward to all of you. See you in . 🥳

1
1
0
repeated

A few years ago, a kid mourning his dad handed me over 300 DVDs his dad had made of local bands in his London Suburb in the 2010s before passing on. He didn't know what do with them. I did. All of them are up at Internet Archive, hundreds of hours of cover bands playing in a bar, and now, thanks to a volunteer, Ducky, we have them all with dates and descriptions, where known. Enjoy.

https://archive.org/details/hamiltonpubperformances

3
13
2
repeated

Our Program Analysis for Vulnerability Research class is filling up, if you were planning on attending Recon in a few weeks and were hoping to grab one of the last seats, you move quickly!

https://recon.cx/2024/trainingprogramanalysisforvulnerabilityresearch.html

0
2
0
repeated

Fuzzing can do more than find memory corruption vulnerabilities. With the right invariants, it can catch runtime errors and logical issues, as demonstrated by our custom testing harness for Fuel Labs. https://blog.trailofbits.com/2024/06/17/finding-mispriced-opcodes-with-fuzzing/

0
2
0
Show older