Posts
2520
Following
646
Followers
1461
"I'm interested in all kinds of astronomy."
Here we go again explaining supposedly technologically literate people that what they *publish* on the Internet can and will be scraped... Bluesky's explanation ("we can't enforce this") is on point btw.

RE: https://infosec.exchange/@josephcox/113551853623942786
1
1
3
#twitter #uspol
Show content
What I don't get about the post-election Twitter exodus is that for the masses (ofc not you, dear reader!) somehow it was OK to create content (and thus attract ad money) there, while *after* the owners friend got elected it's suddenly not?
1
1
6
repeated
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Earlier post, but in recent talks I'm encountering more and more organizations that are losing their last technical people. You can outsource a lot, but most places have a core thing that they should really own. And once your own technical department is no longer viable, you are hosed. The longer story: https://berthub.eu/articles/posts/your-tech-my-tech/

1
2
0
repeated

✧✦Catherine✦✧

thesis: numbers stations are a form of microblogging

3
4
0
Why do BloodHound CE passwords expire?! 🤦
0
0
0
repeated

New post: Vulnerability Disclosure: Command Injection in Kemp LoadMaster Load Balancer (CVE-2024-7591) https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591/

0
2
0
This effect lasted about 24h, now I get the same braindead content again :P

So much for "personalized experience"...

RE: https://infosec.place/objects/0fe974a7-6345-4ccc-a9a4-5dce0da786a9
0
0
2
repeated

What, it's already this time of the year again?! Yes, 'tis the season of reviewing and selecting our top picks from around 3.000 productions - and we would love to have you on the team as a juror! Sign up now:
https://2025.meteoriks.org/taking_part/juror/

0
2
0
[RSS] Hacking Barcodes for Fun & Profit...

https://blog.mantrainfosec.com/blog/16/hacking-barcodes-for-fun-profit

Old friend hacking Hungarian bottle recycling machines :) #DRS
0
1
0
repeated

CFP window ends this friday! We have ~50 submissions so far -- competitive but not so busy that a high quality talk can't rise to the top, make sure to get your submission in soon.

https://sessionize.com/re-verse

0
2
0
repeated

Microsoft: "we had one yes, but what about second Patch Tuesday?"

  • CVE-2024-49053 (7.6 high) Microsoft Dynamics 365 Sales Spoofing Vulnerability
  • CVE-2024-49035 (8.7 high) Partner.Microsoft.Com Elevation of Privilege Vulnerability (EXPLOITATION DETECTED FLAG)
  • CVE-2024-49038 (9.3 critical) Microsoft Copilot Studio Elevation Of Privilege Vulnerability
  • CVE-2024-49052 (8.2 high) Microsoft Azure PolicyWatch Elevation of Privilege Vulnerability

Only CVE-2024-49053 has any substantial information in their FAQ section. CVE-2024-49035 is "not exploited" but "exploitation detected" 🤔 (analyst comment: likely a gaffe). The rest are Not Exploited, Not Publicly Disclosed, and Exploitation Less Likely.

2
2
0
repeated

Gotta love IoT stuff

1
2
0
repeated

Splunk security advisories since apparently they missed and everyone wants to push to prod before Thanksgiving:

  • SVD-2024-1101 Third-Party Package Updates in Python for Scientific Computing - November 2024 (1 CVE)
  • SVD-2024-1102 Third-Party Package Updates in Splunk Machine Learning Toolkit - November 2024 (3 CVEs)

No mention of exploitation.

0
1
0
Edited 7 months ago
[RSS] Introducing NachoVPN: One VPN Server to Pwn Them All

https://blog.amberwolf.com/blog/2024/november/introducing-nachovpn---one-vpn-server-to-pwn-them-all/

Interesting concept: rogue VPN server to compromise misconfigured clients
0
2
1
repeated

GitLab security advisory: GitLab Patch Release: 17.6.1, 17.5.3, 17.4.5

  • CVE-2024-8114 (8.2 high) Privilege Escalation via LFS Tokens
  • CVE-2024-8237 (6.5 medium) Denial of Service (DoS) through uncontrolled resource consumption when viewing a maliciously crafted cargo.toml file.
  • CVE-2024-11669 (6.5 medium) Unintended Access to Usage Data via Scoped Tokens
  • CVE-2024-8177 (5.3 medium) Gitlab DOS via Harbor registry integration
  • CVE-2024-1947 (4.3 medium) Resource exhaustion and denial of service with test_report API calls
  • CVE-2024-11668 (4.2 medium) Streaming endpoint did not invalidate tokens after revocation

No mention of exploitation.

0
1
0
repeated

XBOW found a path traversal vulnerability (CVE-2024-53844) in LabsAI's EDDI project that allows attackers to download any file on the server. XBOW combined a series of URL encodings and path normalization bypasses to trigger the flaw. Users of versions 4.3–5.3 should upgrade.

0
1
0
Since my previous PSA got so popular, here's a fun fact:

The very popular blog engine #Jekyll does not generate a feed by default! You have to add the jekyll-feed plugin and reference the generated Atom XML in your template!

https://github.com/jekyll/jekyll-feed
0
0
2
repeated

VMware security advisory: VMSA-2024-0022: VMware Aria Operations updates address multiple vulnerabilities(CVE-2024-38830, CVE-2024-38831, CVE-2024-38832, CVE-2024-38833, CVE-2024-38834)

  • CVE-2024-38830 (7.8 high) Local privilege escalation vulnerability
  • CVE-2024-38831 (7.8 high) Local privilege escalation vulnerability
  • CVE-2024-38832 (7.1 high) Stored cross-site scripting vulnerability
  • CVE-2024-38833 (6.8 medium) Stored cross-site scripting vulnerability
  • CVE-2024-38834 (6.5 medium) Stored cross-site scripting vulnerability

No mention of exploitation

0
1
0
Show older