Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

Holy shit, the Rijksmuseum used a 100MP Hasselblad camera to take almost eight and a half THOUSAND photos of the whole of Rembrandt's The Night Watch, for a total image size of 717 GIGAPIXELS. 😳

It's on their website as a zoomable image and you can zoom in so far you can see the individual cracks in the paint: https://www.rijksmuseum.nl/en/stories/operation-night-watch/story/ultra-high-resolution-photo

0
20
1
repeated

Project Zero Bot

New Project Zero issue:

Qualcomm KGSL: reclaimed / in-reclaim objects can still be mapped into VBOs

https://bugs.chromium.org/p/project-zero/issues/detail?id=2548

CVE-2024-23384
0
1
1
repeated
Edited 10 months ago

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
Hot off the press! CISA adds CVE-2024-38856 (CISA-ADP: 8.1 high) Apache OFBiz Incorrect Authorization Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation.

cc: @ntkramer @hrbrmstr

0
1
0
repeated

We provisioned cloud infrastructure the Max Power way, showing that AI tools often generate code that works but has terrible security properties.
https://buff.ly/3X54ZSN

0
4
0
"Restarting the system to load the new processor microcode will not be handled automatically, so you should
consider rebooting."

Was this message written by an LLM?
0
0
1
repeated
repeated

UPDATE: Chrome ZeroDay Vulnerabilities (CERT-EU Security Advisory 2024-088)

A critical zero-day vulnerability, CVE-2024-7971, has been identified and patched in Google Chrome. This marks the ninth such vulnerability discovered in 2024. The flaw, which has been actively exploited in the wild, is rooted in a type confusion issue within Chrome's V8 JavaScript engine. This vulnerability allows attackers to potentially execute arbitrary code on affected systems.
[New] On August 26, Google announced that it patched the tenth zero-day vulnerability in Chrome. This vulnerability is also reported as being exploited.

https://www.cert.europa.eu/publications/security-advisories/2024-088/

0
1
0
repeated

Back to School - Exploiting a Remote Code Execution Vulnerability in Moodle https://blog.redteam-pentesting.de/2024/moodle-rce/

0
1
0
repeated

Critical Vulnerability in SonicWall SonicOS (CERT-EU Security Advisory 2024-089)

On August 23, 2024, SonicWall issued a security advisory regarding a critical access control vulnerability (CVE-2024-40766) in its SonicOS. This flaw could allow attackers to gain unauthorised access to resources or cause the firewall crash.
It is recommended updating as soon as possible.

https://www.cert.europa.eu/publications/security-advisories/2024-089/

0
1
0
repeated

Project Zero Bot

New Project Zero issue:

Linux: LSM can prevent POSIX lock removal in fcntl/close race cleanup path

https://bugs.chromium.org/p/project-zero/issues/detail?id=2563

CVE-2024-41012,CVE-2024-41020
0
1
2
repeated

I released a poc & some details for CVE-2024-38063, a RCE vuln in tcpip.sys patched by MS last week: https://github.com/ynwarcs/CVE-2024-38063

0
8
0
repeated

Analyzing and Exploiting CVE-2024-38063, an RCE Vulnerability In the Windows TCP/IP Stack

https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html

7
10
0
repeated

IBM issued a fix to CVE-2024-27275 that mitigates an privilege escalation technique we published last year:

🥷https://blog.silentsignal.eu/2023/03/30/booby-trapping-ibm-i/
🧑‍🏭https://ibm.com/support/pages/node/7157637

The PTF restricts the use of the ADDPFTRG command - this is a breaking change documented in the Memo to Users.

0
1
0
repeated

Literally 20 years ago we said that French regulations to restrict cryptography without state approval would eventually bite; and we were right…
https://alecmuffett.com/article/110312

0
1
0
repeated

Charges against P. Durov (of Telegram). ... Telegram failed to obtain a State permit or registration to use encryption and other cryptography technology? Among others: "Supply of cryptology services to ensure confidentiality functions without functions without a declaration of conformity,
- Supply of a cryptographic means that does not exclusively provide authentication or authentication or integrity control functions without prior declaration,
...

Full text (french): https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-26%20-%20CP%20TELEGRAM%20.pdf

1
2
0
repeated

Apparently the Polaris Dawn crew are going to be the highest humans have been since the Apollo program, which is surprising given some of the kids I went to high school with.

0
2
1
No-go zones on our skin must be part of our future deal with mosquitos
0
0
3
repeated

This was a keynote I gave to our first BSides in Johannesburg recently. It covers what I think a community needs to do to create great hackers and warns of the dangers of racing to the bottom. While it focuses on South Africa - it’s, I think, more widely useful.

https://youtube.com/watch?v=Ri5DoRRnGWs (or on invidious https://yewtu.be/watch?v=Ri5DoRRnGWs)

0
2
0
repeated

On birdsite but is actually important:

I quote:

“Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU.”

__
¹ https://x.com/_markel___/status/1828112469010596347

7
7
0
repeated
Show older