Posts
2521
Following
646
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

Qualcomm: February 2025 Security Bulletin
Qualcomm has 7 propriety vulnerabilities (1 critical, 5 high, 1 medium severity) and 17 open source vulnerabilities (1 critical, 9 high, 7 medium). That critical vulnerability CVE-2024-49837 (7.8 high) is Improper Validation of Array Index in Automotive OS Platform QNX. No mention of exploitation. h/t @cR0w

0
2
0
[RSS] Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows

https://connormcgarr.github.io/km-shadow-stacks/
0
0
1
repeated
repeated

Today's insanity:

4
7
0
repeated

What is the origin of the word "mainframe"? Digging through archives, I traced it back to 1953. The IBM 701 computer was built from "frames": power frames, a storage frame, a drum frame, and the main frame. This 1953 drawing from the Installation Manual shows the dimensions of the "main frame". 1/n

4
19
0
repeated

Neodog with Glasses Plushie neodog_glasses waow

New way to get customer support just dropped

2
15
1
[RSS] TRAVERTINE - An absolutely wild race condition in the macOS kernel (CVE-2025-24118)

https://jprx.io/cve-2025-24118/
0
1
1
[RSS] Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)

https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/
0
0
2
repeated

“For Sale: Binaries Compiled From Hand-Crafted Artisanal Code”

https://jasonbrownlee.me/blog/posts/hand-crafted-code/

0
2
0
repeated

So Apple has open-sourced the XCBuild system used internally by Xcode as Swift-Build: https://github.com/swiftlang/swift-build

Based on their previously open-source llbuild project.

It includes support for Windows and Linux (using clang-cl on Windows), but does not currently seem to have a way to make use of it outside of Swift package manager or Xcode.

0
3
0
repeated

Coming up this weekend: PE & Mitra!

0
1
0
[RSS] Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)

https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
0
0
1
repeated

Cheers to 11 years of AppSec Ezine! 🎉 Huge thanks to the security community for sharing and the supporters who made this journey possible. Here's to another year of knowledge-sharing! 🚀

572nd Edition: https://pathonproject.com/zb/?871f09331bbd8d13#6ahftCLH0VYSLjlk8M+FtRW8EibTcKL+J5qO7xUUPpk=

Repo: https://github.com/Simpsonpt/AppSecEzine

1
4
0
repeated

The second blog is about an interesting bug class in COM servers that implement IDispatch, which allows you to potentially create other objects in the process. For example every OOP COM server with IDispatch allows you to create a STDFONT object which isn’t really designed to be safely used cross process. To demo its usefulness I then use the trick to get code injection in a Windows-PPL process from where you could open protected LSASS etc. https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html

2
7
1
repeated

CVE-2025-21325 - 2025-Jan - ARM64 - Windows Secure Kernel Mode Elevation of Privilege

full diff 👀 https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e

Incorrect permission assignment? 🧐 https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e#skmicommitpte-diff

0
3
0
repeated

Please share: Our Max Planck Institute recently left X and is present here on Mastodon. Give them a follow! Beautiful pictures from the science of light!

@maxplanckgesellschaft

From: @MPI_ScienceOfLight
https://wisskomm.social/@MPI_ScienceOfLight/113906463840724222

7
18
0
repeated

You gotta be kidding me with this bullshit.

"But DeepSeek & Meta’s recent research suggests that more AI capabilities (& efficiency savings) could be gained by going down a more dangerous path — where AIs develop their own alien language."

The journalists amplifying this garbage will not be held accountable when the hype cycle is gone because the next cycle of journalists will do the same thing during the next hype cycle.

I don't want to amplify the article so not posting the actual article.

2
7
0
repeated

Alright, new rule.

NIST settled this shit before half of you twerps in NetSec or IT could drive.

If I have to change a password because it's expired one more fucking time, I am finding the least secure possible phrase that fits the security rules.

I don't even have to remember the damn things, the PM will take care of it, but you are burning my time that I'm already not being paid enough to give you.

0
3
0
Show older