Posts
2488
Following
654
Followers
1479
"I'm interested in all kinds of astronomy."
repeated
Edited 5 months ago

Update: it wasn't the ECB blocking gnome-calculator, it was an HTTP library regression breaking the connection to the ECB. Text in [] is incorrect, retained due to RTs etc.

[The ECB have remotely bricked gnome-calculator]

In the latest episode of "Why the 21st Century is impossibly stupid", GNOME calculator contacts the ECB on startup to get currency rates. It just hangs on startup if this fails, the whole calculator not just the currency stuff. [The ECB has blocked GNOME calculator].

To fix this, you can do "dconf write /org/gnome/calculator/refresh-interval 0", whatever tf dconf is, because when I tried it told me dbus-launch is missing, wtf that is, because it doesn't have a package. Turns out it's in "dbus-x11". I dunno why X11, because I use wayland, but I'm past caring at this point. I installed it and it worked.

Now I can calculate how much postage I need to pay for this parcel.

[A bloody OS-shipped desktop calculator, DDoSing a central bank, and blocking on connection failure].

2
7
0
[oss-security] Below: World Writable Directory in /var/log/below Allows Local Privilege Escalation (CVE-2025-27591)

https://seclists.org/oss-sec/2025/q1/201

Below: "A time traveling resource monitor for modern Linux systems" <- this sounds pretty cool!

https://github.com/facebookincubator/below
0
0
1
Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799 /CVE-2025-24801)

https://blog.lexfo.fr/glpi-sql-to-rce.html

GLPI: "The most complete open source service management software"
1
2
5
repeated
repeated

Writing these words from the first Linux kernel ever booted on x86_64 by a pure Go UEFI bootloader!

Pro debugging technique: listening to CPU noises to attest boot flow progress while Frame Buffer issues made everything dark 😅.

1
6
1
repeated

🔥 The "impossible" XXE in PHP? Not so impossible anymore.

Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.

Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/

0
5
0
repeated

My mom accidentally referred to cryptocurrency as “kleptocurrency” this morning and I think I’m going to call it that from now on! 🤑

7
14
0
repeated

has discovered a zero day exploit abusing -2025-24983 vulnerability in the Windows kernel 🪟 to elevate privileges (). First seen in the wild in March 2023, the exploit was deployed through backdoor on the compromised machines.

The exploit targets Windows 8.1 and Server 2012 R2. The vulnerability affects OSes released before Windows 10 build 1809, including still supported Windows Server 2016. It does not affect more recent Windows OSes such as Windows 11.

The vulnerability is a use after free in Win32k driver. In a certain scenario achieved using the API, the structure gets dereferenced one more time than it should, causing UAF. To reach the vulnerability, a race condition must be won.

The patches were released today. Microsoft advisory with security update details is available here:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983

0
6
0
repeated

10x the speed and half the memory usage by migrating the TypeScript compiler from TS to Go isn't exactly a ringing TypeScript endorsement.

https://devblogs.microsoft.com/typescript/typescript-native-port/

2
5
1
The only reasonable reaction to this is to unfollow ofc
0
0
6
[RSS] Detecting and Mitigating the Apache Camel Vulnerability CVE-2025-27636

https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations
0
1
5
The Tomcat RCE is pretty fun, fortunately requirements look quite unusual. I'll write this up soonish, but first I have some hardware to fix...
0
0
5
repeated

NIST selects HQC (Hamming Quasi-Cyclic -- https://pqc-hqc.org/) for standardization as the second key-encapsulation mechanism after ML-KEM.

But no rush, "the final version will be published in approximately two years".

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/w-6RREtb7-c/m/vRjBJE3dAAAJ

https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf

0
2
0
repeated

A study of eight AI search engines found they provided incorrect citations of news articles in 60%+ of queries; Grok 3 answered 94% of the queries incorrectly (Columbia Journalism Review)

https://www.cjr.org/tow_center/we-compared-eight-ai-search-engines-theyre-all-bad-at-citing-news.php
http://www.techmeme.com/250310/p28#a250310p28

0
3
0
repeated
repeated

DDoS attacks almost always originate from hacked devices. The country/countries that the traffic originates from has never been an indicator of who's behind the attack. Musk's implication that Ukraine was responsible for the Twitter DDoS attack based on seeing some traffic originating from Ukrainian IPs is just dangerous speculation.

I've mapped botnet professionally for a decade, and all that looking at IP addresses locations tells you is the geographical distribution of compromised devices. When you plot this kind of data of chart, you typically just get a heat map of population density, slightly skewed by economic factors. Nations with larger populations tend to have more devices, but developing nations tend to have a higher percentage of older less secure devices, which are more likely to be hacked and recruited into botnets.

10
12
2
Show older