Posts
2521
Following
646
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

I may be late to the party but today I’ve learned that ASML has installed a kill switch into an extreme ultraviolet lithography machine it has sold to TSMC, allowing it to be shut down if China invades Taiwan.

https://www.datacenterdynamics.com/en/news/asml-adds-remote-kill-switch-to-tsmcs-euv-machines-in-case-china-invades-taiwan-report/

0
1
0
repeated

GitHub copilot seems to be high.

I typed "A simple hash function.", then autocomplete kicked in.

1
10
0
repeated

This is absolutely nuts. SQL Injection 101 attack on a site authorized by DHS for TSA vetting of known crew members. I’d bet there aren’t even audit logs that would be able to show if the system was tampered with.

How many other auxiliary sites with deep ties into critical infrastructure are this poorly secured?

https://ian.sh/tsa

/cc @briankrebs @dangoodin

2
7
0
#music #prodigy #tgif
Show content
Amazing recoding of the legends:

https://www.youtube.com/watch?v=OswFpx5SDqA

Just realized this band is like X-Men with completely different kinds of weirdos fighting for freedom
1
0
3
repeated

"Just don't give a damn about what anybody else thinks of you!"

Well that is all nice and dandy, unless the 'anybody else' has the power and means to actively make your life harder.

Because at that point, you realize that not caring what anyone thinks is a privilege.

0
4
1
repeated

At the height of One Million Checkboxes's popularity I thought I'd been hacked. A few hours later I was tearing up, extraordinarily proud of some brilliant teens.

Here's my favorite story from running OMCB :)

https://eieio.games/essays/the-secret-in-one-million-checkboxes/

2
18
0
repeated

In light of the issue page for CVE-2024-5274 being made public. Me and @buptsb
have decided to make our exploit public. It's a bit different than the issue page POC.
https://github.com/mistymntncop/CVE-2024-5274/blob/main/exploit.js

1
3
0
repeated

I was happy to be quoted alongside security research leaders like @dustin_childs and @haifeili on the challenges with (good-faith) coordinated vulnerability disclosure. https://www.csoonline.com/article/3491353/is-the-vulnerability-disclosure-process-a-glitch-in-itself-how-cisos-are-being-left-in-the-dark.html

0
3
0
repeated

Project Zero Bot

The Project Zero issue tracker moved to another platform *checks notes* one week after the bot started, so there will be some downtime until we adjust.

Stay tuned!

https://project-zero.issues.chromium.org/issues
0
1
2
repeated

You can now use the ANGR decompiler with radare2. The old angr integration was renamed to r2angr-io.
Install it like this: r2pm -ci r2angr

0
3
0
Dawn of a new era in Search: Balancing innovation, competition, and public good

https://blog.kagi.com/dawn-new-era-search
0
0
0
repeated

Are you living near Paris, female*, and want to learn reverse engineering for free? 📱👩‍💻 There'll be a 4-day @blackhoodie training at Hexacon!

I'll be giving the training on two days, teaching iOS and Android reversing basics. Register now: https://reversing.training/hc24

3
7
0
Windows: I'm IPv6 now!
Me: I don't think that makes sense...
Windows: IT'S NOT JUST A PHASE!!
Me: You're in an IPv4-only network though.

Narrator: It was a phase.
0
0
0
repeated

LIKE-DBG is a great project to make Linux kernel debugging hassle-free. However, I wanted to use it without docker and I needed the ability to use an external build server. Long story short, I did a fork. Here you go https://github.com/raymontag/like-dbg

0
1
0
Looking for guides about reducing the power consumption of old Linux laptops (power mgmt primarily, vacuum cleaning is on the list).

(guess this falls under #permacomputing?)
2
6
5
repeated

New, by me: Google's Threat Analysis Group found evidence that a group of Russian government hackers, aka APT29, are using exploits that are "identical or strikingly similar" to those previously made by spyware makers Intellexa and NSO Group.

The exploits were found hidden on Mongolian government websites, and designed to steal cookies and passwords, most likely from government employees.

More: https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/

1
6
0
Sky’s the Limit – Quick Analysis and Exploitation of a Chrome ipcz TOCTOU Vulnerability

https://binarygecko.com/skys-the-limit-quick-analysis-and-exploitation-of-a-chrome-ipcz-toctou-vulnerability/

Geckos are blogging 🦎 👀

CVE-2023-2934
1
2
3
Show older