Posts
2532
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

South Korean VPN provider IPany was breached in a supply chain attack by the "PlushDaemon" China-aligned hacking group, who compromised the company's VPN installer to deploy the custom 'SlowStepper' malware.

https://www.bleepingcomputer.com/news/security/ipany-vpn-breached-in-supply-chain-attack-to-push-custom-malware/

1
3
0
repeated
Edited 5 months ago
I just went through @drawio 's homepage so I can throw some money at them, but I just can't because disrupting unhealthy markets is its own reward it seems:

https://www.drawio.com/about

These people are pretty cool!
0
4
5
repeated
It's flattering when your work appears in the news, I just wish this piece wasn't so terribly wrong on so many important details :P

I'll reshare the original instead: https://blog.silentsignal.eu/2025/01/21/ibm-acs-password-dump/

(If you want to pull your hair out: https://cybersecuritynews[.]com/ibm-i-access-client-vulnerability-exposed/)
0
1
3
repeated

CVE-2025-0395: Buffer overflow in the GNU C Library's assert()

https://seclists.org/oss-sec/2025/q1/48

0
4
0
repeated
repeated
repeated

Oracle: Oracle Critical Patch Update Advisory - January 2025
It's a pain in the butt to read, but there's 300+ vulnerabilities and coupled with the Oracle VP of Security Assurance's blog post January 2025 Critical Patch Update Released, there's likely no mention of exploitation.

See related The Hacker News reporting: Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

0
2
0
repeated

What I call file format hexploring:
Read the specs, read parsers, craft pocs by hand if possible, explore the history and the features timeline, understand abuses, analyse at a low level…

1
2
0
repeated

The Trump administration removed all advisory committee members within the DHS, including those in CISA and CSRB, which was investigating Salt Typhoon (Becky Bracken/Dark Reading)

https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers
http://www.techmeme.com/250122/p3#a250122p3

0
2
0
repeated

Well that's awkward. @EQSTLab used a OS command injection bug, but it was one used last year. Alpine chose not to patch it since "in accordance with ISO21434...the vulnerability is classified as 'Sharing the Risk'." Yikes. The @EQSTLab team earns $5,000 and 1 Master of Pwn point.

0
4
0
repeated
repeated

American History Twitter

0
2
1
repeated

Trump pardons Ross Ulbricht after eleven years in prison. An incredible twist in the never-ending Silk Road saga.

https://www.wired.com/story/trump-frees-silk-road-creator-ross-ulbricht-after-11-years-in-prison/

3
4
0
repeated

Michał "rysiek" Woźniak · 🇺🇦

There's a "Signal deanonymized" thing going around:
https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117

Stay calm. Deep breaths.

👉 while this is a real consideration, the only thing the attacker gets from this is a very rough (kilometers or tens of kilometers radius) location

👉 other communication platforms that use any kind of caching CDN to deliver attachments are just as vulnerable

👉 you almost certainly should continue to use Signal, unless you specifically know that this is a big problem for you.

25
20
0
repeated
[oss-sec] AMD Microcode Signature Verification Vulnerability

https://seclists.org/oss-sec/2025/q1/45

"It looks like an OEM leaked the patch for a major upcoming CPU vulnerability"
0
3
4
[RSS] Why doesn't the Windows blue screen of death prominently identify the company that created the driver that crashed?

https://devblogs.microsoft.com/oldnewthing/20250121-00/?p=110788
0
1
3
Show older