Posts
2439
Following
583
Followers
1291
A drunken debugger

Heretek of Silent Signal
repeated

I haven't even had my first cup of coffee and we have another ../ CVE. This time it's Synology: https://nvd.nist.gov/vuln/detail/CVE-2024-11398

3
3
0
[RSS] The Great Google Password Heist: 15 years of hacking passwords to test our security (and build team culture!)

https://bughunters.google.com/blog/6355265783201792/the-great-google-password-heist-15-years-of-hacking-passwords-to-test-our-security-and-build-team-culture
0
2
2
repeated

Exactly 11 (!) years ago we released an advisory for an rsync 0-day.

Two days earlier the Gentoo Linux mirror I was hosting and maintainig was compromised with it.

What a ride.

https://forums.gentoo.org/viewtopic.php?t=111779

https://lists.samba.org/archive/rsync-announce/2003/000011.html

0
6
0
repeated

bert hubert 🇺🇦🇪🇺

Maybe fun to know - using means that the US government has bulk access to your data, which matters if you are a government yourself. Supporters of Microsoft will tell you you can easily use "double key encryption" to protect your MS365 data against US government snooping. This is how easily you can do that. Hint, it involves GitHub and compiling code: https://learn.microsoft.com/en-us/purview/double-key-encryption-setup

6
8
0
repeated

My VirusBulletin presentation: A web of surveillance was uploaded to YouTube: https://www.youtube.com/watch?v=iERGg1dUVNE

0
3
0
You are holding your Internet wrong.
1
2
2
[RSS] Your Bluesky Posts Are Probably In A Bunch of Datasets Now

https://www.404media.co/bluesky-posts-machine-learning-ai-datasets-hugging-face/

Surprise: you%27ve published them on the Internet.
0
0
2
[RSS] Vodka maker Stoli says August ransomware attack contributed to bankruptcy filing

https://therecord.media/stoli-group-usa-bankruptcy-filing-ransomware

Bastards!
0
0
0
[RSS] Tricks from product support: We're not smart enough to debug the problem, can you help us?

https://devblogs.microsoft.com/oldnewthing/20241203-00/?p=110601

"It looks like the anti-malware software is interfering with our ability to debug the problem." :)
0
1
0
repeated

New whitepaper and exploit code from @stephenfewer on 5 new vulnerabilities he chained to achieve unauthenticated RCE on Lorex 2K Indoor Wi-Fi security cameras. The exploit works in two phases and comprises an auth bypass, a stack-based buffer overflow, an out-of-bounds heap read, and a null pointer dereference — and that's just to start (because it was, like, Tuesday for Stephen or whatever) 📈

Whitepaper: https://www.rapid7.com/globalassets/_pdfs/research/pwn2own-iot-2024-lorex-2k-indoor-wi-fi-security-camera-research.pdf

Exploit: https://github.com/sfewer-r7/LorexExploit

0
5
0
repeated

Interestingly enough, MS disabled the "Use my Windows user account" checkbox when connecting to Wi-Fi on the lock screen to address CVE-2024-38143 in the August Patch Tuesday.

This change completely remediates the "Airstrike" attack as well. 🤯

https://support.microsoft.com/en-us/topic/august-13-2024-kb5041585-os-builds-22621-4037-and-22631-4037-76655cde-e2ee-49d4-a415-cf9a4d3c3a04

0
2
0
Details of the commitee hearing about the VBÜ hack were classified for 29 years.

I guess I have to change my lifestyle a bit if I want to know the details...

(or hack some gov DB, which I would never ever do ofc!)
0
0
1
repeated
repeated
repeated

The V Programming Language

The Advent of Code for V has started, uncovering a new challenge every day! Check them out!

https://github.com/vlang/adventofcode

0
3
0
repeated

The V Programming Language

Unused functions are now skipped by default. This reduces generated C dramatically. Give it a try! if you have issues, use v -no-skip-unused ... and report them.
After making this option by default, CI times went down significantly:

0
2
0
repeated
Edited 1 month ago

I've noticed a concerning trend of "slop security reports" being sent to open source projects. Here are thoughts about what platforms, reporters, and maintainers can do to push back:

https://sethmlarson.dev/slop-security-reports?utm_campaign=mastodon

2
9
0
[RSS] Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris) - @MDSecLabs

https://www.mdsec.co.uk/2024/12/extracting-account-connectivity-credentials-accs-from-symantec-management-agent-aka-altiris/
0
0
0
repeated

Fucking PaloAltoNetworks...

two major CVEs come out, guidance says X version is fine and unaffected. I upgrade everything to that version.

PaloAlto then changes the CVE details to say that ""LOL version Y is good, X sucks.""

I don't want to have to keep checking CVE pages for changes.... blobfacepalm

1
3
0
Show older