Posts
2409
Following
584
Followers
1295
A drunken debugger

Heretek of Silent Signal
repeated

There's only a week or so left on the RE//verse submissions! If you're interested in speaking at the inaugural event, make sure to get your submission in ASAP! Submissions will be closing some time after Nov 1.

https://sessionize.com/re-verse

0
1
0
repeated

Hello, I am planning to go to CCC this year. The only thing missing are the tickets. I would really appreciate it if you could help me and my wife get tickets. Thank you!

0
1
0
repeated

I presented about file formats identifiers at HackLu:
https://youtu.be/PBbld8xB2Bo

1
2
0
repeated

CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA Could Lead to Credential Leakage https://www.tenable.com/blog/cve-2024-8260-smb-force-authentication-vulnerability-in-opa-could-lead-to-credential-leakage

0
1
0
repeated

MS Streaming Service Privilege Escalation PoC https://github.com/Dor00tkit/CVE-2024-30090

0
2
0
repeated

PoC for the Untrusted Pointer Dereference in the ks.sys driver https://github.com/varwara/CVE-2024-35250

0
2
0
repeated
repeated

Confirmed! In the penultimate attempt of Day 2, @daankeuper, @xnyhps, and @notkmhn from @sector7_nl combined 4 bugs, including a command injection and a path traversal to going from the QNAP QHora-322 to the TrueNAS Mini X. They earn $25,000 and 10 Master of Pwn points.

0
2
0
[RSS] Pluralistic: You should be using an RSS reader (16 Oct 2024)

https://pluralistic.net/2024/10/16/keep-it-really-simple-stupid/
0
0
0
repeated

Unfortunately, the Viettel Cyber Security (@vcslab) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
repeated

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-37383 (6.1 medium( RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
  • CVE-2024-20481 (5.8 medium) Cisco ASA and FTD Denial-of-Service Vulnerability

0
2
0
repeated

An idea I recently heard on a parenting podcast really resonated with me. Tech has created a generation of people used to instant gratification.

Hungry? Open an app. Want to listen to music? Open an app. Bored? Open an app.

However a lot of needs in life can’t be gratified instantly and we now have many people, both adults and kids, who simply don’t know how to handle that. We now have entire subcultures whose main dysfunction is they can’t just get what they want without work and they’re mad.

4
4
0
[RSS] LibRaw: Uninitialized memory disclosure via LibRaw_buffer_datastream::read

https://github.com/google/security-research/security/advisories/GHSA-cmhf-chvw-6c7j

<3 these :)
0
0
1
[RSS] DTLS ClientHello Race Conditions In WebRTC Implementations

https://packetstormsecurity.com/files/182303/webrtc-hello-race-conditions-paper.pdf
0
0
0
repeated

After I refused a bribe to remove a @web3isgreat post about alleged crypto pyramid scheme co-founder Roman Ziemian, I’ve now received a fraudulent copyright claim aimed at forcing me to take it down

19
20
0
OH: "We had a problem. We thought we'd solve it with the cloud. Now we have a horizontally scalable set of problems."
0
11
22
Edited 2 months ago
Anyone remembers that research about using compromised AV/EDR management consoles as C2 servers?

I remember someone was working on it but I don't remember seeing it released.
1
1
1
repeated

The Irish Data Protection Commission fines LinkedIn €310M over using personal data for behavioral analysis and targeted ads under GDPR, after a 2018 complaint (Ian Curran/The Irish Times)

https://www.irishtimes.com/business/2024/10/24/microsoft-owned-linkedin-fined-310m-by-irish-data-protection-commission/
http://www.techmeme.com/241024/p13#a241024p13

0
4
0
repeated

Our first collision of Day Three: the group from STEALIEN Inc. successfully popped the Lorex camera, but the bug they used had already been demonstrated in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
2
0
Show older