Posts
2437
Following
590
Followers
1307
A drunken debugger

Heretek of Silent Signal
repeated

Well that's awkward. @EQSTLab used a OS command injection bug, but it was one used last year. Alpine chose not to patch it since "in accordance with ISO21434...the vulnerability is classified as 'Sharing the Risk'." Yikes. The @EQSTLab team earns $5,000 and 1 Master of Pwn point.

0
4
0
repeated
repeated

American History Twitter

0
2
1
repeated

Trump pardons Ross Ulbricht after eleven years in prison. An incredible twist in the never-ending Silk Road saga.

https://www.wired.com/story/trump-frees-silk-road-creator-ross-ulbricht-after-11-years-in-prison/

3
4
0
repeated

Michaล‚ "rysiek" Woลบniak ยท ๐Ÿ‡บ๐Ÿ‡ฆ

There's a "Signal deanonymized" thing going around:
https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117

Stay calm. Deep breaths.

๐Ÿ‘‰ while this is a real consideration, the only thing the attacker gets from this is a very rough (kilometers or tens of kilometers radius) location

๐Ÿ‘‰ other communication platforms that use any kind of caching CDN to deliver attachments are just as vulnerable

๐Ÿ‘‰ you almost certainly should continue to use Signal, unless you specifically know that this is a big problem for you.

24
23
0
repeated
[oss-sec] AMD Microcode Signature Verification Vulnerability

https://seclists.org/oss-sec/2025/q1/45

"It looks like an OEM leaked the patch for a major upcoming CPU vulnerability"
0
2
3
[RSS] Why doesn't the Windows blue screen of death prominently identify the company that created the driver that crashed?

https://devblogs.microsoft.com/oldnewthing/20250121-00/?p=110788
0
1
3
repeated

Well that's a first. @ScepticCtf, @diff_fusion), & @SeTcbPrivilege of fuzzware.io used a power drill to gain access to a port and exploit the Autel MaxiCharger. They head off to explain their work - except for the drill - we understand that part.

2
3
0
repeated

K. Reid Wightman verified ๐ŸŒป

Just upped my donation to my server (if you're on infosec.exchange, here's where to donate, straight from the llama's mouth: https://infosec.exchange/@jerry/109581969726975197 ).

If you're on some other server, find out who runs it, find out if they need financial support to help run it, and donate some money if you can. Servers don't grow on trees. Etc.

0
3
0
repeated
repeated

Struggling to reverse Rust binaries? Cindy Xiao @cdxiao breaks down the Rust type system and shares practical techniques to reconstruct Rust structures. Learn how to tackle Rust malware & analyze binaries like a pro.

1
5
0
repeated

PSA FOR AUTHORS: some dipshit put a pirate edition of my latest book on Apple Books with a "50% OFF" medallion on the cover illo. They used an obscure unicode glyph in the author name so that searches for "Charles Stross" find it but the bookstore won't merge it.

Where there's one there'll be others!

My publisher's piracy team is handling it.

If you have a book that came out this year, beware! It's a relative of the IDN homograph attack only targeting ebook stores:

https://en.wikipedia.org/wiki/IDN_homograph_attack

1
7
0
repeated

CALLING ALL MUSICIANS!

Our jury for Best Soundtrack could urgently use one or two more jurors - are you able to help out?
We reactivated our application form just for you! Thank you humbly, everyone!

https://2025.meteoriks.org/taking_part/juror/

0
2
0
repeated

Trammell Hudson

It looks like oil paintings on wikipedia are being infected by phone camera software that automatically "fixes" skin textures.

3
5
0
repeated

HPE has confirmed it's investigating a data breach after a well-known hacker claimed to have stolen sensitive information from the company https://techcrunch.com/2025/01/21/hpe-investigating-security-breach-after-hacker-claims-theft-of-sensitive-data/

0
4
0
Why on Earth would you choose Ctrl-Break as a hotkey for anything in 2025?!
0
0
1
repeated

JetBrains security advisory: TeamCity 2024.12.1 Bug Fix Is Now Available
It's time for security theater as JetBrains announces a TeamCity update but refuses to tell us what vulnerabilities actually got fixed. ๐Ÿคก There are no release notes for 2024.12.1 at the time of this toot.
There is no dropdown option for TeamCity 2024.12.1 in Fixed security issues page. A CVE of "TeamCity" doesn't show any new CVEs since December 2024. On average, they update their security bulletin with CVEs 4-30 days after announcing security updates.

1
3
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

Any editors around who can help? We are trying to get the article on #CHERI added. It's so far been rejected three times:

First, it did not have enough independent citations. We added a lot to news articles about CHERI.

Second, it was insufficiently detailed and lacking context. We added a timeline of development, a load of cross references, and a simple introduction.

It was then rejected again because it lacks an explanation that a 15-year-old could understand. This is true of 90% of science-related articles on Wikipedia, so I'm not sure how we fix it. An explanation at that level is something I can write (I have done for the book!) but it would then make the page 3-4 times as long and not suitable for an encyclopaedia (I've previously seen pages rejected because Wikipedia is not the right place for tutorials).

I don't understand the standards for Wikipedia and I really need some guidance for how to resolve and progress this.

4
2
0
Show older