Posts
2521
Following
647
Followers
1462
"I'm interested in all kinds of astronomy."
repeated

PoC Exploit Released for Windows Hyper-V Zero-Day Vulnerability CVE-2024-38080 https://securityonline.info/poc-exploit-released-for-windows-hyper-v-zero-day-vulnerability-cve-2024-38080/

0
2
0
repeated

Personal update: if you need a guy who is passionate on innovative in-the-wild zero-day exploit detection and advanced vulnerability research, please let me know. DM open. :)

0
4
0
repeated

Australia's biggest radiology clinic I-MED has handed over private medical scans from potentially 100,000s of Australians to buzzy tech startup Harrison. ai to train their AI — and patients had no idea.

Neither company responded to questions about it.

https://www.crikey.com.au/2024/09/19/patient-scan-data-train-artificial-intelligence-consent/

3
7
0
repeated
repeated

Well, it's about f@ time.
https://www.authorsalliance.org/2024/09/17/antitrust-lawsuit-filed-against-large-academic-publishers/
The situation with publishers has been a growing issue for years now, and it's good to see some action taken about it. But this should have come long ago from national regulators, not some UCLA professor. Petition your national agency to join or replicate locally.

0
2
0
[RSS] Analysis of CVE-2024-20439 in Cisco Smart Licensing Utility

https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
0
0
0
[RSS] 0-Click RCE in MediaTek Wi-Fi Chipsets -- 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways

https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
0
1
2
repeated

Shameful how some people objectify Palo Alto Networks.

2
2
0
[RSS] Lessons from the buzz - What have we learned from fuzzing the eBPF verifier [PDF]

#fuzzing #eBPF

https://lpc.events/event/18/contributions/1946/attachments/1473/3119/Lessons%20from%20the%20buzz%20-%20LPC.pdf
0
0
2
repeated

So Cards Against Humanity just sued M*sk for ruining a piece of land they bought in Texas for their customers...

https://www.elonowesyou100dollars.com/

2
11
0
repeated

How it started, how it's going

1
1
0
repeated
repeated

📢 We’re now releasing weekly mass testing results 📢

https://mass.rev.ng

Here you can find a weekly report on using revng to decompile tons of binaries.

There’s information about crashes, timeouts and nice graphs.

Our goal is to now bring them all down week-by-week 🦾

1
1
0
Edited 9 months ago
Oracle may have been experimenting with LLM's for longer than we'd assume.

Remember those essays by M.A.D.?

https://web.archive.org/web/20150811052336/https://blogs.oracle.com/maryanndavidson/entry/no_you_really_can_t
1
0
2
90's edition (h/t @SensorLock for the idea)
0
0
5
repeated

Been doing a fun new reverse engineering project: Figuring out the file formats of the 1999 Windows/PS1 game Attack of the Saucerman. It's the first time I'm doing this on a 3D game. I'm now at a point where I can partially display the levels, and extract most of the assets:
https://github.com/lethal-guitar/SaucerMapViewer

I already made an attempt many many years ago, but was only armed with a hex editor at the time and couldn't make any sense of the data. (cont.)

1
2
0
repeated

Qubes OS Summit 2024 just started

You can assist live on YouTube

https://vpub.dasharo.com/e/16/qubes-os-summit-2024/

1
2
0
Show older