More than funds, what Wikipedia really needs is more good editors. The number of people who regularly edit articles in English Wikipedia hasn't grown substantially in years, while the number of articles has, and editor demographics remains skewed. The foundation itself largely stays away from editing, leaving it to volunteers. While articles that get a lot of attention are often good, it's not hard to find ones with biased and promotional content in less-visited topics, and in other languages.
Oh my god, I just learned of a hilariously obvious bug that Nintendo (of all companies) failed to fix.
So, NES & SNES games often have a problem with pressing left+right and up+down, at the same time. This is because that's not supposed to be possible. It's physically prevented from happening by the design of the controller itself.
Elon Musk has ordered everyone to stop donating to Wikipedia.
I never started, until this morning.
https://donate.wikimedia.org is the link, if anyone feels like disobeying a direct order from a billionaire jerkwad.
Happy Holidays to my oncall buddies today. I wish you all a quiet and uneventful shift.
The slides for the keynote our Cristofaro Mune(@pulsoid) has given at @h2hconference
"False Injections: Tales of Physics, Misconceptions and Weird Machines" are now available here:
Enjoy!
In light of the Crowdstrike outage over 5 months ago, what specific changes has your organization made to your enterprise security program? What changes to policies, procedures, training, alerting, testing, and your written IRP have you made? Please share!
European Space Agency's official web shop was hacked as it started to load a piece of JavaScript code that generates a fake Stripe payment page at checkout.
Announcing #CodeQL Community Packs
https://github.blog/security/vulnerability-research/announcing-codeql-community-packs/
Maybe we should stop calling them *Notifications* and instead refer to *Interruptions*.
"Working on some stuff so I've turned off interruptions for a while."
"Right on."
⚡ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP code—resulting in remote code execution.
» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
» Java users: Incorrect configurations = higher risk.
» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here 👉 https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
Using @voooooogel control vector library to backdoor a model so that it introduces command injection vulnerabilities rather than using safer subprocess methods
Hi all. In order to make the Defensive Security Podcast content a bit more approachable and easier to navigate, I've created a playlist of individual stories/segments we cover here: https://www.youtube.com/playlist?list=PLzHXsgtVDQEq9JiCbwJojE4nd9dRVAT5l
Note: I've only gone back 4 episodes, but will be doing this for all episodes going forward.
Happy holidays!