Posts
2343
Following
530
Followers
1242
A drunken debugger

Heretek of Silent Signal
[RSS] Objective-C Update (Binary Ninja)

https://binary.ninja/2024/10/16/objectivec-update.html
0
0
1
[RSS] Effects of classic return address tricks on hardware-assisted return address protection

https://devblogs.microsoft.com/oldnewthing/20241016-00/?p=110378
0
0
1
[RSS] Escaping the Chrome Sandbox Through DevTools

https://ading.dev/blog/posts/chrome_sandbox_escape.html
0
0
0
[RSS] [PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java

https://redrays.io/blog/poc-sap-note-3433192-code-injection-vulnerability-in-sap-netweaver-as-java/
0
0
0
[RSS] CVE-2024-45844: Privilege escalation in F5 BIG-IP

https://offsec.almond.consulting/privilege-escalation-f5-CVE-2024-45844.html
0
0
1
repeated
repeated

How often do you get a 75x speedup on a real workload in a compiler? Not often!

Here's the story of one in SpiderMonkey: https://spidermonkey.dev/blog/2024/10/16/75x-faster-optimizing-the-ion-compiler-backend.html

2
5
0
repeated

Fuck Microsoft and Fuck Nadella.

As expected, the 24H2 update installed 'Recall', it can't be uninstalled.

To disable the Microcoft spyware, run this as admin

C:\Windows\System32>Dism /Online /Disable-Feature /Featurename:Recall

Can't vouch that all the people you share your screen, code, IP, private details, will disable theirs. consider NOT sharing anything ever again.

8
33
0
repeated

Sandbox escape from extensions due to insufficent checks in chrome.devtools.inspectedWindow.reload and chrome://policy (reward: $20000) http://crbug.com/338248595

0
3
0
repeated

I'm amazed that there has been zero coverage of this:

EU's new Product Liability Directive got voted through last thursday.

No later than two years from now, software, stand-alone, cloud or embedded are subject to "no-fault liability" (ie: doesn't matter how or why, only that it is defective.)

Here's the directive:

https://data.consilium.europa.eu/doc/document/PE-7-2024-INIT/en/pdf

Gentlemen, start your panic…

PS: Yes, there is a FOSS exemption, but only "outside commercial activity". (Ie: The guy in Nebraska but not RedHat)

3
15
0
repeated

Breaking News: The threat actor known as "USDoD" (aka "EquationCorp" and other monikers") has been arrested by Brazilian Federal Police. USDoD is probably best known for his attacks on , Airbus, and his role in the recent National Public Data breach.

Media coverage indicates he was arrested this morning: https://g1.globo.com/politica/noticia/2024/10/16/pf-prende-hacker-de-33-anos-suspeito-de-invadir-sistemas-e-vazar-dados-de-policiais.ghtml

@brett @campuscodi

0
5
0
repeated

Aris Adamantiadis verifiedπŸ’²Paid

So, how true is it?

7
2
0
repeated
Edited 6 days ago

Proud to start sharing Google's strategy for tackling our remaining memory safety challenges: https://security.googleblog.com/2024/10/safer-with-google-advancing-memory.html

It's high level, but it outlines the long-term strategy. We'll be sharing more detailed posts in this series.

0
4
0
repeated

Google Chrome security advisory: Stable Channel Update for Desktop
New Google Chrome version 130.0.6723.58/.59 for Windows, Mac and 130.0.6723.58 for Linux has 17 security fixes, 13 externally reported. No mention of exploitation, and nothing sticks out.

0
1
0
#psytrance #music
Show content
0
0
1
repeated

Giorgio Maone πŸš«βœŠπŸ§…

Edited 6 days ago
0
4
0
repeated

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-30088 (7.0 high) Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
  • CVE-2024-9680 (9.8 critical) Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-28987 (9.1 critical) SolarWinds Web Help Desk Hardcoded Credential Vulnerability

0
1
0
repeated

Microsoft: Microsoft Digital Defense Report 2024
Microsoft has a 114 page PDF report covering the evolving cyber threat landscape: threat actors and their motivations, nation state threats, ransomware, fraud, identity and social engineering, and DDoS attacks. There's also Microsoft-specific recommendations as part of Secure Future Initiative. Of course, no annual threat intel report would be complete without artificial intelligence ✨. From AI-enabled cyber attacks to influence operations, and god forbid using AI for cybersecurity. There's a section on how governments and industry are approaching and advancing global AI security. This report also includes perspectives from different countries.

2
4
0
repeated

Donald Knuth on the rewards of computer programming

1
13
1
Show older