Posts
2515
Following
649
Followers
1466
"I'm interested in all kinds of astronomy."
repeated

Interestingly enough, MS disabled the "Use my Windows user account" checkbox when connecting to Wi-Fi on the lock screen to address CVE-2024-38143 in the August Patch Tuesday.

This change completely remediates the "Airstrike" attack as well. 🤯

https://support.microsoft.com/en-us/topic/august-13-2024-kb5041585-os-builds-22621-4037-and-22631-4037-76655cde-e2ee-49d4-a415-cf9a4d3c3a04

0
2
0
Details of the commitee hearing about the VBÜ hack were classified for 29 years.

I guess I have to change my lifestyle a bit if I want to know the details...

(or hack some gov DB, which I would never ever do ofc!)
0
0
1
repeated
repeated
repeated

The V Programming Language

The Advent of Code for V has started, uncovering a new challenge every day! Check them out!

https://github.com/vlang/adventofcode

0
3
0
repeated

The V Programming Language

Unused functions are now skipped by default. This reduces generated C dramatically. Give it a try! if you have issues, use v -no-skip-unused ... and report them.
After making this option by default, CI times went down significantly:

0
2
0
repeated
Edited 7 months ago

I've noticed a concerning trend of "slop security reports" being sent to open source projects. Here are thoughts about what platforms, reporters, and maintainers can do to push back:

https://sethmlarson.dev/slop-security-reports?utm_campaign=mastodon

2
10
0
[RSS] Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris) - @MDSecLabs

https://www.mdsec.co.uk/2024/12/extracting-account-connectivity-credentials-accs-from-symantec-management-agent-aka-altiris/
0
0
0
repeated

Fucking PaloAltoNetworks...

two major CVEs come out, guidance says X version is fine and unaffected. I upgrade everything to that version.

PaloAlto then changes the CVE details to say that ""LOL version Y is good, X sucks.""

I don't want to have to keep checking CVE pages for changes.... blobfacepalm

1
2
0
repeated

CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-11667 (7.5 high) Zyxel Multiple Firewalls Path Traversal Vulnerability
  • CVE-2024-11680 (9.8 critical) ProjectSend Improper Authentication Vulnerability
  • CVE-2023-45727 (7.5 high) North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability

1
1
0
repeated

Chesterton’s Fence: A Lesson in Thinking

https://fs.blog/chestertons-fence/

0
1
0
repeated

We just released AFL++ v4.30c - deprecate afl-gcc/clang, fast resume support, lots of improvements. https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.30c

0
6
0
repeated

I work in IT and hate friends/family asking me to fix their home computers, now everytime I fix someones computer and hand it back I whisper "Dirty bastard!" and the look of pure horror on their face gets me everytime. Nobody asks now so it worked a treat.

0
1
0
repeated

My team college @rame found the CVE-2024-8001 vulnerability in VIWIS LMS 9.11. Congrats! 🥳 https://vuldb.com/?id.284352

0
1
0
repeated

excuse #281:

The co-locator cannot verify the frame-relay gateway to the ISDN server.

0
1
0
repeated

One thing I find difficult in Radare2 is its advanced syntax. Not sure where it's documented + the naming logic.

For example: db $in:5 @ main - in yesterday's Advent of Radare (https://radare.org/advent/02.html). Where does $in come from?

Or ?$? ... ouch!
Or $$+10
or @10!20
or @@10 ...

Any good pointers to read?

cc: @radareorg

1
1
0
repeated
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

In an interview with the BBC in 2021, the British head of intelligence, Sir Richard Moore, MI6, describes the dangers of digital dependencies. The Foreign Intelligence Service speaks of a “data trap”: “If you allow another country to gain access to really critical data about your society, it will over time undermine your sovereignty, as you no longer have control over this data.” - https://gi.de/themen/beitrag/alarmzeichen-deutschland-demnaechst-im-goldenen-microsoft-kaefig

1
4
0
[RSS] An analogy about register preservation rules in calling conventions

https://devblogs.microsoft.com/oldnewthing/20241202-00/?p=110595
0
0
4
Show older