Posts
3189
Following
706
Followers
1562
"I'm interested in all kinds of astronomy."
repeated

‘The political press may not understand what’s happening (or may be too afraid to say it out loud), but those of us who’ve spent decades studying how technology and power interact? We see it and we can’t look away.
So, here’s the bottom line: when WaPo’s opinion pages are being gutted and tech CEOs are seeking pre-approval from authoritarians, the line between “tech coverage” and “saving democracy” has basically disappeared. It’s all the same thing.’
https://www.techdirt.com/2025/03/04/why-techdirt-is-now-a-democracy-blog-whether-we-like-it-or-not/

0
10
0
[RSS] New Method to Leverage Unsafe Reflection and Deserialisation to RCE on Rails

https://www.elttam.com/blog/rails-sqlite-gadget-rce/
0
0
1
[RSS] Case Study: Traditional CVSS scoring missed this actively exploited vulnerability (CVE-2024-50302)

https://old.reddit.com/r/netsec/comments/1j3tvof/case_study_traditional_cvss_scoring_missed_this/
0
0
1
repeated

I've written a blog post on analysing and getting RCE on some of the bugs in the AIxCC Nginx challenge: https://roundofthree.github.io/posts/nginx-aixcc-pwn/

0
4
0
repeated

Any Apple engineer feel like debugging some hypervisor-related macOS kernel panic?

(Looks like failure by the guest to properly flush TLB panics the host, and seems easiest to repro on M2 Max?)

https://github.com/utmapp/UTM/issues/6919#issuecomment-2565338603

0
3
0
repeated

Graham Sutherland / Polynomial

was not expecting to be writing a vulnerability report for Command & Conquer Generals: Zero Hour today but here we are

https://github.com/TheSuperHackers/GeneralsGameCode/issues/272

5
6
0
repeated
repeated
repeated

3 different VMware zero days, under active exploitation by ransomware groups

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

VMware ESXi
VMware Workstation Pro / Player (Workstation)
VMware Fusion
VMware Cloud Foundation
VMware Telco Cloud Platform

(Exploitation actually ESXi)

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390

2
10
0
repeated

I need to do a blog post on this, but it seems like a lot of old tricks have been lost over the years. One thing I was thinking about is all the ways to obscure an executable name in command prompts. For example, and I'm not sure how many of them are documented, but all of these work:

8
10
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

miniaudio ma_dr_flac__decode_samples__lpc out-of-bounds write vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2063

CVE-2024-41147
0
1
1
[RSS] CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy

https://www.thezdi.com/blog/2025/3/3/cve-2024-43639
0
0
1
[RSS] !exploitable Episode Two - Enter the Matrix. SSHD exploit used by Trinity in the movie The Matrix Reloaded

https://blog.doyensec.com/2025/03/04/exploitable-sshd.html
0
0
1
repeated

BlackHoodie will be back at @_ringzer0 Bootcamp on March 21st with a training about Compiler Internals for Security Engineers, brought to you by.. me 😊 Registration is open, please tell your friends and hacker family, alternatively Shares appreciated 😁 https://blackhoodie.re/Ringzer0_Bootstrap_2025/

0
6
0
repeated

My team designed and is maintaining Enclaves. Good article here :-)

https://bird.makeup/@dwizzzlemsft/1896624017903325658

0
1
0
repeated

Two seemingly blockbuster stories published on Friday that reported that the Trump admin had ordered US Cyber Command and CISA to "stand down" on their work to detect and counter Russian cyber threats. But new info has come out to contradict the stories or qualify them. I dug into what we know and don't know. As always, if anyone has any additional information related to these stories, please contact me on Signal at KimZ.42.

https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/

0
7
0
repeated

go to the cloud they said
it'll be fine they said

0
2
0
repeated

New blog post: Electronic signing in Collabora Online https://vmiklos.hu/blog/cool-esign.html

0
1
0
"They should be paying me per token" should be our mantra

https://www.youtube.com/watch?v=3yeb5gSLnjw
1
1
2
repeated

CP/M Users: Looking for a copy of Avocet XASM85 for a resurrection project.

1
4
0
Show older