Timeline cleanse: pleased to report that Greg is still blowing stuff up with electricity https://www.youtube.com/watch?v=Cse3pUxvecY
🚧 What do dancing babies, "under construction" signs, and bubble-gum-blowing Furbys tell us about digital preservation? In the latest essay for the Internet Archive's Vanishing Culture series, writer JD Shadel explores the rise, fall, and cultural legacy of early Internet GIFs—and why they matter today.
🔗 https://blog.archive.org/2025/02/05/vanishing-culture-what-early-internet-era-gifs-show-us-about-preserving-digital-culture/
🕳️ #VanishingCulture
"Thinkers like Jean-Paul Sartre and Hannah Arendt warned us that the point of this deluge is not to persuade, but to overwhelm and paralyze our capacity to act. More recently, researchers have found that the viral outrage disseminated on social media in response to these ridiculous claims actually reduces the effectiveness of collective action.
The result is a media environment that keeps us in a state of debilitating fear and anger, endlessly reacting to our oppressors instead of organizing against them."
https://www.404media.co/you-cant-post-your-way-out-of-fascism/
🪝Introducing HyperHook! 🪝
A harnessing framework for snapshot-based #fuzzing using Nyx. ⚒️
HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient!
🔗 Read more: https://neodyme.io/en/blog/hyperhook/
Cisco security advisories (PatchTuesday-ishing @shellsharks):
"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
In response to a popular demand, here is DOOM running on Apple Lightning to HDMI dongle
Veeam: CVE-2025-23114
CVE-2025-23114 (9.0 critical) A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code on the affected appliance server with root-level permissions. This CVE impacts multiple versions of Veeam Backup. No mention of exploitation. h/t: @cR0w
#veeam #cve #CVE_2025_23114 #infosec #vulnerability #cybersecurity
While working on a nday vulnerability research project, we stumbled upon a vulnerability in the core of the TCP subsystem of the Linux kernel. We reported it upstream, which was fixed in May of last year. This blog post shares how we came across it and our vulnerability analysis. It is a reference counter issue, and a mechanism in the Linux kernel usually prevents those issues from being exploitable. Still, in this case, it could even be with the mechanism present. Read it and see how it could be done.
Accidentally uncovering a seven years old vulnerability in the Linux kernel
Zyxel says it has no plans to release patches for two zero-days under active attack and is advising customers to replace vulnerable routers.
The company says these devices have been “end of life for years” - but the devices are not listed on Zyxel’s EOL page, and some are still available to buy on Amazon https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/
Embrace. This is the new #curl CVE I expect I will get a fair amount of... "traffic" about: https://curl.se/docs/CVE-2025-0725.html
We've been collecting and mirroring what we can find of public data scrapes of data that has recently gone missing from federal sites or is likely to in the near future. The repos here include public data from CDC, NIH, and NOAA. Be warned that some of these repos are quite large!
Unofficial #PatchTuesday continues with Google Chrome: Stable Channel Update for Desktop
Chrome 133.0.6943.53 (Linux) and 133.0.6943.53/54( Windows, Mac) includes 12 security fixes, 3 are externally reported:
No mention of exploitation.
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
NETGEAR did this earlier than #PatchTuesday on 01 February 2025 but here you go:
Top 10 web hacking techniques of 2024 https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
#PatchTuesday continues with Zyxel: Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE
Zyxel's security advisory confirms the existence of CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890 affecting end-of-life DSL CPE products. While they link to GreyNoise's blog post, Zyxel does not acknowledge the fact that CVE-2024-40891 (8.8 high) post-auth command injection is a zero-day being exploited in the wild by a Mirai botnet variant. They reiterate that EoL products don’t receive further support and:
"we strongly recommend that users replace them with newer-generation products for optimal protection."
Note: DSL CPE likely stands for Digital Subscriber Line Customer-Premises Equipment cc: @fellows for more Patch Tuesday Madness.
#zyxel #vulnerability #cve #CVE_2024_40891 #zeroday #eitw #activeexploitation #mirai #botnet #infosec #cybersecurity