Posts
2469
Following
662
Followers
1486
"I'm interested in all kinds of astronomy."
repeated

https://osspledge.com/

Two rules (from @getsentry who started this):

1. Give money to the open source projects which are probably 90% of your code base. $2000 per developer on your staff, although you can and should do better than that. (@buttondown are doing better than that.)
2. Report every year on whether and how you did it.

This seems like a good idea today, and a thing where non-participation should feel weird tomorrow.

2
6
0
repeated

PoC Exploit Released for Windows Hyper-V Zero-Day Vulnerability CVE-2024-38080 https://securityonline.info/poc-exploit-released-for-windows-hyper-v-zero-day-vulnerability-cve-2024-38080/

0
2
0
repeated

Personal update: if you need a guy who is passionate on innovative in-the-wild zero-day exploit detection and advanced vulnerability research, please let me know. DM open. :)

0
4
0
repeated

Australia's biggest radiology clinic I-MED has handed over private medical scans from potentially 100,000s of Australians to buzzy tech startup Harrison. ai to train their AI — and patients had no idea.

Neither company responded to questions about it.

https://www.crikey.com.au/2024/09/19/patient-scan-data-train-artificial-intelligence-consent/

3
7
0
repeated
repeated

Well, it's about f@ time.
https://www.authorsalliance.org/2024/09/17/antitrust-lawsuit-filed-against-large-academic-publishers/
The situation with publishers has been a growing issue for years now, and it's good to see some action taken about it. But this should have come long ago from national regulators, not some UCLA professor. Petition your national agency to join or replicate locally.

0
2
0
[RSS] Analysis of CVE-2024-20439 in Cisco Smart Licensing Utility

https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
0
0
0
[RSS] 0-Click RCE in MediaTek Wi-Fi Chipsets -- 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways

https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
0
1
2
repeated

Shameful how some people objectify Palo Alto Networks.

2
2
0
[RSS] Lessons from the buzz - What have we learned from fuzzing the eBPF verifier [PDF]

#fuzzing #eBPF

https://lpc.events/event/18/contributions/1946/attachments/1473/3119/Lessons%20from%20the%20buzz%20-%20LPC.pdf
0
0
2
repeated

So Cards Against Humanity just sued M*sk for ruining a piece of land they bought in Texas for their customers...

https://www.elonowesyou100dollars.com/

2
11
0
repeated

How it started, how it's going

1
1
0
repeated
repeated

📢 We’re now releasing weekly mass testing results 📢

https://mass.rev.ng

Here you can find a weekly report on using revng to decompile tons of binaries.

There’s information about crashes, timeouts and nice graphs.

Our goal is to now bring them all down week-by-week 🦾

1
1
0
Edited 1 year ago
Oracle may have been experimenting with LLM's for longer than we'd assume.

Remember those essays by M.A.D.?

https://web.archive.org/web/20150811052336/https://blogs.oracle.com/maryanndavidson/entry/no_you_really_can_t
1
0
2
90's edition (h/t @SensorLock for the idea)
0
0
5
repeated

Been doing a fun new reverse engineering project: Figuring out the file formats of the 1999 Windows/PS1 game Attack of the Saucerman. It's the first time I'm doing this on a 3D game. I'm now at a point where I can partially display the levels, and extract most of the assets:
https://github.com/lethal-guitar/SaucerMapViewer

I already made an attempt many many years ago, but was only armed with a hex editor at the time and couldn't make any sense of the data. (cont.)

1
2
0
Show older