I heard someone complaining "Why did they have to put pixel art on the Museum of Ethnography?!"
Reader, they are traditional cross stitch patterns.
Man, I just spent two hours ricing tmux instead of writing my article that's due next week. #Linux really is the ultimate procrastination tool.
My talk for https://nsss.se/
Title: CVEMITRECVSSNVDCNAOSS WTF
Abstract:
Bogus CVEs, know-better organizations, conflicting databases, AI hallucinations, inflated severity scoring, security scanners, Jia Tan. As the lead developer in the curl project, Daniel describes some of the challenges involved and what you need to do to stay on top of security when working in a high profile Open Source project running in some twenty billion instances. Involving many examples from real life.
Last year European Parliament and national parliaments rejected the “EU child porn scanner” that was set to be installed on every phone. Apparently this week we’re going to ignore all that parliamentary action and mandate such a scanner once more. Here’s what I wrote earlier on how this super scary thing would work in practice: https://berthub.eu/articles/posts/client-side-scanning-dutch-parliament/
The Mines of Kakadûm: Blindly Exploiting Load-Balanced Services #OffensiveCon24
https://www.youtube.com/watch?v=oBHdSGHvoKE
Memory disclosures are close to my heart, so it was a delight to see such a vuln exploited in Google’s prod :)
Also: JPEG2000 weird machine!
Analysis of CVE-2024-2738 Apache HugeGraph https://blog.securelayer7.net/remote-code-execution-in-apache-hugegraph/
🐮Re-moo-te Code Execution in mailcow!
Dive into our analysis of two vulnerabilities we found in the mail suite mailcow. Learn how attackers can go from XSS to RCE, and why it's important to sanitize your error messages:
I watched the new Practical Engineering video on the bridge collapse, and Grady said words to the effect of "all the work was partitioned out. nobody had a complete view of the situation. the people who really saw the problems had no autonomy to do anything about them, and the people with the authority to do something never saw the full picture - all they got was a piece of paper with action items", and I've never nodded along to something so hard. This happens aaaaalllllll the time in security.
Hey you fine people: Our agenda for the birthday party is public now: https://troopers.de/troopers24/agenda/ #TROOPERS24 See you next week! 🥳
Last year in "How I choose a security research topic", I used two unnamed attack concepts as case-studies for fast failure. I can now reveal both unnamed techniques were timing attacks. I'm happy to say my third attempt went better!
https://portswigger.net/research/how-i-choose-a-security-research-topic
Enjoy this month’s nasty VMWare vulns, including a CVSS 9.8 potential RCE: https://www.theregister.com/2024/06/18/vmware_criticial_vcenter_flaws/
Direct advisory link: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
#ThreatIntel #CVE_2024_37079 #CVE_2024_37080 #CVE_2024_37081
somebody asked how people who have historically been anti-copyright could be against AI content theft, so let me give this a shot:
Information wants to be free to enrich human knowledge. It does not want to be free to make human knowledge worse to enrich the pockets of assholes
Our tl;dr from @RealWorldCrypto
https://buff.ly/4c3J70h
FYI, there is a bug in systemd. So, running: "systemd-tmpfiles --purge" will delete your /home/ in systemd version 256. #linux
Source: https://mathstodon.xyz/@bremner/112615591101488528 and https://x.com/DevuanOrg/status/1802997574695080067
This is a keynote that I quite enjoy and highly recommend. https://mastodon.social/@joxean/112631528543638454