Posts
2598
Following
623
Followers
1384
"I'm interested in all kinds of astronomy."
repeated

New Connect Secure — I'm sure we'll see Mandiant and MSTIC write-ups shortly on whichever threat campaign/actor was hitting CVE-2025-0282. https://www.rapid7.com/blog/post/2025/01/08/etr-cve-2025-0282-ivanti-connect-secure-zero-day-exploited-in-the-wild/

1
2
0
repeated

Blort™ 🐀Ⓥ🥋☣️

I'm very happy to see @kagihq joining Peertube with their inaugural video below about what makes Kagi independent search special!

https://tilvids.com/w/twGQeYV9c1TGwMmbdXtY2q

Remember to follow their Peertube account at @kagi and boost to encourage and show them the effort is appreciated! Also do check out their excellent lenses feature, shown in the video.

0
3
0
[RSS] Two Network-related vunlnerabilities Analysis

https://u1f383.github.io/linux/2025/01/08/two-network-related-vulnerabilities-analysis.html

#Linux kernel - CVE-2023-6932 CVE-2023-0461
0
1
0
[RSS] Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

https://www.netspi.com/blog/technical-blog/cloud-pentesting/hijacking-azure-machine-learning-notebooks/
0
0
0
repeated

GitLab security advisory 08 January 2025: GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5

  • CVE-2025-0194 (6.5 medium) Possible access token exposure in GitLab logs
  • CVE-2024-6324 (4.3 medium) Cyclic reference of epics leads resource exhaustion
  • CVE-2024-12431 (4.3 medium) Unauthorized user can manipulate status of issues in public projects
  • CVE-2024-13041 (4.3 medium) Instance SAML does not respect external_provider configuration

No mention of exploitation

1
2
0
repeated

Hi all. Given the recent announcement from Meta about AI personas and allowed behavior, I am moving threads.net back to a limit, and will likely move them to a block in the future on infosec.exchange. I can’t ignore the reality that the changes they’re making are specifically intended to permit attacks on many of the people that call this place home. I won’t rule out that they walk the changes back, which is why I’m not jumping to sever the nearly 4000 mutual follow relationships between people on threads and here.

25
18
1
repeated

🚨 Deadline Extended 🚨

By popular demand, the submission deadline is now January 14, 2025 (AoE)! 🗓️

You still have 1 week to send your papers and join us in San Diego!

📜 Submit here: https://madweb25.hotcrp.com
🔗 Details: https://madweb.work

Spread the word!

0
2
0
repeated

There are rumor swirling that there might be some upcoming Ivanti Connect Secure (ICS) CVEs being released soon.

I feel bad for anybody needing to decipher what Ivanti product versions are vulnerable to what CVE.

The Ivanti advisories use confusing language that is unclear if it's referring to which versions are fixed, and which are affected. The CVE entries don't mention which versions contain the fix. And the release notes...
Can somebody smarter than myself decipher what order the security patches are listed in? It's not by order of CVE ID, and it's not by order of ICS version. Which leaves... ?

If we are indeed about to have an Ivanti fire drill, good luck folks.

4
3
0
repeated

In case it wasn't posted here already, Project Zero is hiring!
See https://t.co/bA3FT6ZbzH

0
12
0
repeated

Gynvael Coldwind (@gynvael.bsky.social)

(please RT for reach - thank you!)
Learned a cool new Linux trick? Know an interesting quirk in a network protocol? Or have something else to share?

Write a 1-page article for the issue of Paged Out! :)
https://pagedout.institute/?page=cfp.php

Soft deadline is Feb 1st.

0
4
0
repeated

From over at the Bad Place:
https://gist.github.com/alfarom256/f1342f14dc6a742de7ea4004a1b6d7ed

IObit Malware Fighter has a driver device called IMFForceDelete123.
When you call the only exposed IOCTL to this device, 0x8016E000, along with a specified path, the Windows kernel will delete the specified file/directory. NTFS ACLs don't matter because we're the kernel.

Who is allowed to interact with this device? EVERYONE.

The more software you have on your system, the less secure it is.

2
7
1
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Progress WhatsUp Gold SnmpExtendedActiveMonitor path traversal vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2089

CVE-2024-12105
0
1
0
repeated

The art of programming is the art of organizing complexity, of mastering multitude and avoiding its bastard chaos as effectively as possible.

— E. W. Dijkstra

0
3
0
repeated

Backdooring Your Backdoors - Another $20 Domain, More Governments - watchTowr Labs https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/

0
3
0
repeated
repeated

This is it! Its on!

Save the date and polish your speaking or training skills-> call for papers, workshops, trainings, sponsors and volunteers open!

Submit: https://pretalx.com/bsidesluxembourg-2025/cfp

PS: sponsor package options available on info@bsides.lu!

2
6
0
repeated

Please support one of our own! If you ever have been to defcon, needed network security, used MFA, touched HAM radio, etc… dearest cjunkie made your life better one way or another - one of the most awesome human beings I know (and I know tons of them!) https://www.gofundme.com/f/support-marc-rogers-road-to-recovery

0
2
0
repeated
Confirmed. ChatGPT is actively indexing the Fediverse, even small servers like mine who have not explicitly consented to their indexing.

So while people on Mastodon got angry about Mastodon having built-in discovery features, ChatGPT just went ahead and slurped up all your posts.
18
22
0
repeated
Show older