That's a wrap for #Pwn2Own Ireland 2024! Over last 4 days, we awarded $1,066,625 for over 70 0-day bugs. That makes 4 contests in a row that exceeded the million-dollar mark. Congratulations to the Viettel Cyber Security team for winning Master of Pwn with 33 points and $205,000.
Seasonal Spells for #ToddlerDnD
Toddler's Vicious Snot: This spell initially impacts the member of the party with the lowest HP. It lasts for 2 days. After that it affects all other members of the party, is immune to Healing, and you need a 20+ Con saving throw to recover from it.
Fall Back: This spell interrupts the target's Long Rest one hour too soon. Every time. For about two weeks.
Toddler's Disappearing Accessories: This spell affects hats, gloves, scarves, and boots.
The thing where companies make websites for their own executives, who never visit them, instead of their customers, who are forced to.
This makes me want to scream and pull out my hair.
"Reduce your vocabulary by 10-20% to prove you're a human."
The Apple Security Research blog now has an RSS feed, though it’s not properly advertised.
A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://ssd-disclosure.com/ssd-advisory-common-log-file-system-clfs-driver-pe/
Has anyone attempted to calculate the overall environmental / energy consumption of Electron, vs if the most popular applications using it were rewritten in a more efficient native framework?
It has now been twelve years since the paper "The most dangerous code in the world: validating SSL certificates in non-browser software" was published.
My blog post about it from back then: https://daniel.haxx.se/blog/2012/10/25/libcurl-claimed-to-be-dangerous/
It'd be interesting to know how much HTTPS clients are still skipping cert verification in the wild. I bet it is still widespread.
"Inside the U.S. Government-Bought Tool That Can Track Phones at Abortion Clinics"
An excellent @404mediaco investigation into "Locate X", a tracking tool that uses ad-tracking tech -- specifically, "mobile advertising identifiers" -- to follow people around
https://www.404media.co/email/f4992514-a605-4579-9a75-3d0707758e03/
Today I learned that GNU tar does network connections if you say "foo:bar", it tries to resolve "foo". FFS, wasn't the Unix philosophy to do one thing and do it well? Luckily there's a "--force-local" option to GNU tar to avoid it doing remote connections.
Sorry if you're in trouble now, either reviewing your tar calls in your application and whether they can take user input as filename -- or if this was part of your exfiltration or attack on a system.
VR News To Your Inbox Every Thursday 📰 EC 44 out now ‼️
@reodus_ gives you a virtual memory refresher
SELinux bypasses from @klecko0
@zeroclicksh VirtualBox Escape write-up
A binder bug analysis from @maherazz2
+ jobs and more 👇
Glad this is finally live: https://security.apple.com/documentation/private-cloud-compute
Getting started with the Virtual Research Environment: https://security.apple.com/documentation/private-cloud-compute/virtualresearchenvironment
"The PCC Virtual Research Environment (VRE) requires a Mac with Apple silicon with at least 16GB of unified memory and the latest macOS 15.1 Developer Preview. For optimal VRE performance, we recommend using a Mac with at least 24GB of unified memory.”