NEW: In a hearing last week, an NSO Group lawyer said that Mexico, Saudi Arabia, and Uzbekistan were among the governments responsible for a 2019 hacking campaign against WhatsApp users.
This is the first time representatives of the spyware maker admit who its customers are, after years of refusing to do that.
Fuck that war Signal group. The Trump team insider trading Signal group is where you want to be :PPPPP
Porting COBOL Code and the Trouble With Ditching Domain Specific Languages
Currently available Go fuzzing tools were missing critical features - some don’t play well with the latest Go toolchain. So we set out to change that.
@bruno, Nils Ollrogge, and colleagues explored more powerful ways to fuzz Go binaries. By tapping into Go’s native instrumentation — which is compatible with libFuzzer — we enabled effective fuzzing of Go code using LibAFL.
We’ve documented our approach and shared insights in our latest blog post: https://www.srlabs.de/blog-post/golibafl---fuzzing-go-binaries-using-libafl
Micropatches Released for NTLM Hash Disclosure Spoofing Vulnerability (CVE-2025-24054)
Just a reminder: Vulnerability Lookup isn’t just about finding CVEs. It supports the full chain, collection from multiple sources, continuous distribution, and allocation within a coordinated vulnerability disclosure (CVD) process. 100% open source.
🔗 An online version maintained by @circl https://vulnerability.circl.lu/
🔗 https://www.vulnerability-lookup.org/
🔗 https://github.com/vulnerability-lookup/vulnerability-lookup
So it's official: TLS certificate lifetimes will reduce from the current max of 398 days to:
* 200 days in March 2026
* 100 days in March 2027
* 47 days in March 2029
For web servers/proxies etc. it's reasonably simple, at least for smaller orgs but for e.g. network kit it might be more of a challenge. Having a timeframe to aim at definitely focusses the mind!
Via @riskybiz / https://risky.biz/risky-bulletin-ca-b-forum-approves-47-day-tls-certs/
And all of the sudden, we have solved supply chain security.
No CVE, no vulnerabilities!
Hackers, educators, tinkerers:
The 2025 Hacker Initiative grant cycle is open. We're funding individuals and groups who are:
🔹 Advancing hacker culture
🔹 Promoting digital rights
🔹 Educating the public
If you're building tools, sharing knowledge, or shaking things up apply here 👉 https://hackerinitiative.org/apply-now/
Signal boost appreciated.
A quick reminder that discounted registration rates for for the #LangSec workshop end tomorrow, April 14, at 11:59 pm PDT, and the conference hotel block rates end shortly after. Details at https://langsec.org/spw25/important-dates.html
We hope to see you all in San Francisco on May 15, 2025!
Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. https://recon.cx/ #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @sinsinology @hunterbr72 @clearbluejar @phlaul @oryair1999 @hookgab @thequeenofelf @so11deo6loria @i0n1c @pedrib1337 @malachijonesphd @pat_ventuzelo @kb_intel @pinkflawd @reverse_tactics @onlytheduck @t0nvi @drch40s @brunopujos @mhoste1 @andreyknvl @texplained_re @jsmnsr @pulsoid @specterdev @richinseattle @yarden_shafir @aionescu @hackerschoice @sinsinology @sergeybratus @specterops @oryair1999 @phlaul @trailofbits @hexrayssa @nostarch @hexnomad @netspooky
Regardless of what happens with CVE/NVD, the PSF will continue publishing advisories for CPython through our OSV database and to the security-announce@python.org mailing list.
Please subscribe to those data sources to guarantee delivery of vulnerability data about CPython.