Posts
2510
Following
574
Followers
1284
A drunken debugger

Heretek of Silent Signal
repeated

Open to Exploitation: The Security Risks of Unauthenticated Pager Networks https://telescope.ac/petazzoni/kl9ki6zsn62bsb03l694dz

0
1
0
repeated

Aris Adamantiadis verified💲Paid

Status this morning :)

0
2
0
repeated

Planck lengths per qubit

1
2
0
repeated

Binwalk v3 now under active development. Faster, smarter, Rustier.

Beta testers and bug reports welcome!

https://github.com/ReFirmLabs/binwalk/tree/binwalkv3

0
5
0
repeated

Working on some photos and videos from our ribbon cutting event for the new Adafruit factory in Industry City, Brooklyn, NY - USA! Here's a preview! 🎀✂️🏭🗽🇺🇸 Special thanks to the President of the Brooklyn Chamber of Commerce, the Managing Director of Industry City, and the Vice President of Partnerships at the NYC EDC! More soon, it's Sunday after a loooong week and we are zonked!

1
1
0
repeated
Edited 3 months ago

This is crazy. Someone managed to run (v4.4) on an 4004 from 1971, one of the first commercially available microprocessors ever.

The craziest part: It became possible by writing a in 4004 that fits into the 4096 bytes¹ of addressable memory. The emulator then runs the kernel. My mind is blown.

https://dmitry.gr/?r=05.Projects&proj=35.%20Linux4004

¹) The memory was eventually expanded to 8192 bytes via some bank switching trickery as the article explains

1
13
0
repeated

https://osspledge.com/

Two rules (from @getsentry who started this):

1. Give money to the open source projects which are probably 90% of your code base. $2000 per developer on your staff, although you can and should do better than that. (@buttondown are doing better than that.)
2. Report every year on whether and how you did it.

This seems like a good idea today, and a thing where non-participation should feel weird tomorrow.

2
6
0
repeated

PoC Exploit Released for Windows Hyper-V Zero-Day Vulnerability CVE-2024-38080 https://securityonline.info/poc-exploit-released-for-windows-hyper-v-zero-day-vulnerability-cve-2024-38080/

0
2
0
repeated

Personal update: if you need a guy who is passionate on innovative in-the-wild zero-day exploit detection and advanced vulnerability research, please let me know. DM open. :)

0
4
0
repeated

Australia's biggest radiology clinic I-MED has handed over private medical scans from potentially 100,000s of Australians to buzzy tech startup Harrison. ai to train their AI — and patients had no idea.

Neither company responded to questions about it.

https://www.crikey.com.au/2024/09/19/patient-scan-data-train-artificial-intelligence-consent/

3
7
0
repeated
repeated

Well, it's about f@ time.
https://www.authorsalliance.org/2024/09/17/antitrust-lawsuit-filed-against-large-academic-publishers/
The situation with publishers has been a growing issue for years now, and it's good to see some action taken about it. But this should have come long ago from national regulators, not some UCLA professor. Petition your national agency to join or replicate locally.

0
2
0
[RSS] Analysis of CVE-2024-20439 in Cisco Smart Licensing Utility

https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
0
0
0
[RSS] 0-Click RCE in MediaTek Wi-Fi Chipsets -- 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways

https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
0
1
2
repeated

Shameful how some people objectify Palo Alto Networks.

2
2
0
[RSS] Lessons from the buzz - What have we learned from fuzzing the eBPF verifier [PDF]

#fuzzing #eBPF

https://lpc.events/event/18/contributions/1946/attachments/1473/3119/Lessons%20from%20the%20buzz%20-%20LPC.pdf
0
0
2
Show older