Posts
2512
Following
611
Followers
1350
"I'm interested in all kinds of astronomy."
repeated

Paragon Initiative Enterprises

New from our team: A PHP implementation of RFC 9180 (HPKE - Hybrid Public-Key Encryption):

https://github.com/paragonie/hpke-php

This should serve as building block for more secure protocols (i.e., RFC 9420 a.k.a. Messaging Layer Security)/

This would, in turn, enable PHP developers to write software that communicates with MLS-compatible end-to-end encrypted messaging services.

0
4
0
repeated

Google Android zero-day: Android Security Bulletin February 2025
46 CVEs in Framework (1 critical, 45 high severity) cc: @buherator

Note: There are indications that CVE-2024-53104 may be under limited, targeted exploitation.

0
2
0
repeated

Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w

3
12
0
repeated

Qualcomm: February 2025 Security Bulletin
Qualcomm has 7 propriety vulnerabilities (1 critical, 5 high, 1 medium severity) and 17 open source vulnerabilities (1 critical, 9 high, 7 medium). That critical vulnerability CVE-2024-49837 (7.8 high) is Improper Validation of Array Index in Automotive OS Platform QNX. No mention of exploitation. h/t @cR0w

0
2
0
[RSS] Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows

https://connormcgarr.github.io/km-shadow-stacks/
0
0
1
repeated
repeated

Today's insanity:

4
7
0
repeated

What is the origin of the word "mainframe"? Digging through archives, I traced it back to 1953. The IBM 701 computer was built from "frames": power frames, a storage frame, a drum frame, and the main frame. This 1953 drawing from the Installation Manual shows the dimensions of the "main frame". 1/n

5
20
0
repeated

Neodog with Glasses Plushie neodog_glasses waow

New way to get customer support just dropped

2
15
1
[RSS] TRAVERTINE - An absolutely wild race condition in the macOS kernel (CVE-2025-24118)

https://jprx.io/cve-2025-24118/
0
1
1
[RSS] Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)

https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/
0
0
2
repeated

โ€œFor Sale: Binaries Compiled From Hand-Crafted Artisanal Codeโ€

https://jasonbrownlee.me/blog/posts/hand-crafted-code/

0
2
0
repeated

So Apple has open-sourced the XCBuild system used internally by Xcode as Swift-Build: https://github.com/swiftlang/swift-build

Based on their previously open-source llbuild project.

It includes support for Windows and Linux (using clang-cl on Windows), but does not currently seem to have a way to make use of it outside of Swift package manager or Xcode.

0
3
0
repeated

Coming up this weekend: PE & Mitra!

0
1
0
[RSS] Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)

https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
0
0
1
repeated

Cheers to 11 years of AppSec Ezine! ๐ŸŽ‰ Huge thanks to the security community for sharing and the supporters who made this journey possible. Here's to another year of knowledge-sharing! ๐Ÿš€

572nd Edition: https://pathonproject.com/zb/?871f09331bbd8d13#6ahftCLH0VYSLjlk8M+FtRW8EibTcKL+J5qO7xUUPpk=

Repo: https://github.com/Simpsonpt/AppSecEzine

1
4
0
repeated

The second blog is about an interesting bug class in COM servers that implement IDispatch, which allows you to potentially create other objects in the process. For example every OOP COM server with IDispatch allows you to create a STDFONT object which isnโ€™t really designed to be safely used cross process. To demo its usefulness I then use the trick to get code injection in a Windows-PPL process from where you could open protected LSASS etc. https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html

2
7
1
repeated

CVE-2025-21325 - 2025-Jan - ARM64 - Windows Secure Kernel Mode Elevation of Privilege

full diff ๐Ÿ‘€ https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e

Incorrect permission assignment? ๐Ÿง https://gist.github.com/clearbluejar/318abe5d072eef55b9ea7c23a591726e#skmicommitpte-diff

0
3
0
Show older