In 50 minutes I’ll present some awesome hardware hacking on Apple’s new USB-C controller at #38c3 - would love to see you there!
Remark concerning #Azerbaijan #Airlines #Flight #8243:
We would do well to remember the names of the pilots who died.
They fought for over an hour with a mortally wounded plane to get it as good as possible to the ground.
They had now yaw, no rudder, no ailerons, no flaps, only the power level of the engine as means of control.
Air Traffic Control denied them the use of the closest airports and sent them to cross a sea.
What they have shown is courage in the face of insurmountable odds. They knew exactly what their chances were. Their airmanship was on the highest possible level.
Their names are Igor Kshnyakin and Aleksandr Kalyaninov.
To the media: please don’t give any airtime to the obviously disinformation spreading speaker of the Kremlin and report about those who saved 29 lives.
TIL that with a linker script, you can have emojis as ELF section names.
I need an opportunity to use this knowledge.
Picard management tip: Take your leisure time seriously. A relaxed captain is a sane captain.
Here's a no-cost, non-denominational, last-minute gift idea.
Reach out to people who made a positive difference in your life but with whom you have not been in touch for a while. Tell them that they were a force for good in your life. Thank them.
Be generous -- pass on this idea. Spread some joy.
One the twelfth day of Christmas, the true goat gave to thee: https://infosec.press/screaminggoat/patch-tuesday , which is a list of vendors' security advisory landing pages and their #PatchTuesday schedule.
Disclaimer: Not every vendor is listed, and their patching cycle may be different than what I categorized them as, but it's a good starting point. Ideally, you'd be tracking the ones you care about using RSS anyway.
Merry Christmas Infosec Mastodon
Hewlett Packard report that they are spotting AI-generated malware in the wild, not through complex analysis or watermarking, but because… it is weirdly well-commented. https://threatresearch.ext.hp.com/wp-content/uploads/2024/09/HP_Wolf_Security_Threat_Insights_Report_September_2024.pdf
CVE-2024-40896 Analysis: libxml2 XXE due to type confusion
https://www.openwall.com/lists/oss-security/2024/12/25/2
#cve #linux #libxml2 #xxe #vulnerability #exploitation #bug #typeconfusion