Posts
3915
Following
728
Followers
1601
"I'm interested in all kinds of astronomy."
repeated

TrendAI Zero Day Initiative

All of the gear needed for Berlin is on its way. Next stop - Germany!

0
3
0
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

In 15 minutes Europe will hopefully launch its next climate satellite. The launch can however only be watched via YouTube since we apparently can’t do that ourselves and have to put our government info next to the antivax promo. https://www.esa.int/ESA_Multimedia/ESA_Web_TV

3
5
0
[RSS] Why did Windows 7, for a few months, log on slower if you have a solid color background?

https://devblogs.microsoft.com/oldnewthing/20250428-00/?p=111121
1
5
7
repeated
Edited 1 year ago

FYSA; has switched from pefile to LIEF:
https://github.com/binref/refinery/pull/84
It shouldn't change anything, but if it does, please let me know.

2
4
0
repeated
Edited 29 days ago

I wrote a book on Linux Memory Management, published by @nostarch - it's a comprehensive 1300 page exploration of Linux 6.0's memory management code, depth-first, diving into the code and REALLY explaining how things work.

The idea is to avoid hand waving as much as possible and literally explore what the kernel _actually_ does.

It's full of diagrams and careful explanations of logic including a ton of stuff you just can't find anywhere else.

It's currently available in its entirety in draft form via early access when you pre-order.

It's available at https://nostarch.com/linux-memory-manager

:)

2
13
0
repeated

Thanks Forbes, I was confused what password spraying...sorry, "sparaying" attacks looked like. 🫠

0
2
0
#music #metal
Show content
In today's episode of Cultural Topics to Quickly End Conversations:

https://risingnemesisrecords.bandcamp.com/track/a-new-god-of-wrath
0
0
0
repeated

★ Another Periodic Suggestion to Try, Just Try, Switching to Kagi for Search
https://daringfireball.net/2025/04/try_switching_to_kagi

3
3
0
repeated

Michał "rysiek" Woźniak · 🇺🇦

Edited 1 year ago

Apparently CEO is annoyed that people are sharing that article where he is quoted saying that their browser will track everything users do to sell more ads.

> “That’s kind of one of the other reasons we wanted to build a browser, is we want to get data even outside the app to better understand you,” Srinivas said.

This is that article, in case you'd like to share it:
https://techcrunch.com/2025/04/24/perplexity-ceo-says-its-browser-will-track-everything-users-do-online-to-sell-hyper-personalized-ads/

Receipt:
https://xcancel.com/AravSrinivas/status/1915812398470205461#m

13
19
0
repeated

"In the coming day(s), pretty much every system out there will fail to update. [..] This is not only you, this is for everyone, and this is entirely our fault. We lost access to the signing key of the repository, so we had to create a new one," https://www.kali.org/blog/new-kali-archive-signing-key/

0
3
0
repeated

CVE ID: CVE-2025-1976
Vendor: Broadcom
Product: Brocade Fabric OS
Date Added: 2025-04-28
Vulnerability: Broadcom Brocade Fabric OS Code Injection Vulnerability
Notes: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602 ; https://nvd.nist.gov/vuln/detail/CVE-2025-1976
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-1976

0
1
0
repeated
Edited 1 year ago

Exploiting CVE-2024-0582 via the Dirty Pagetable Method

Kuzey Arda Bulut posted an article about exploiting CVE-2024-0582 in io_uring using the Dirty Pagetable technique.

https://kuzey.rs/posts/Dirty_Page_Table/

This bug was previously reported by @jann and exploited by Oriol Castejón.

https://project-zero.issues.chromium.org/issues/42451653
https://blog.exodusintel.com/2024/03/27/mind-the-patch-gap-exploiting-an-io_uring-vulnerability-in-ubuntu/

0
3
0
I wonder what crazy #conspiracy theories are going around about the South-European #blackout 🍿
1
0
3
repeated

New release! v0.9.0

- Set custom analysis options
- Set custom base address (bootloaders, etc)

https://github.com/clearbluejar/ghidriff/releases/tag/v0.9.0

1
5
1
repeated
#music #metal #mathcore #blackmetal
Show content
Vulgar Display of Purring Presents: New York

https://vulgardisplayofpurring.bandcamp.com/album/vulgar-display-of-purring-presents-new-york

This is a fun compilation!
0
0
1
repeated

I cannot stress this enough:

In a lot of traditions what we call fairy tales (or wonder tales) were for adults. Often told by grown men at the barracks or during work.

Which means uncensored fairy tale texts often include a whole lot of cussing. Because you'd yell "Sh**!" too if a devil chased you.

And this is how we get the scene where an evil king offers a hero money for his services and the hero flat out says "Your majesty, suck my d***"

0
1
0
repeated

🌟New report out today!🌟

Navigating Through The Fog

In December 2024, The DFIR Report's Threat Intel Group uncovered an open directory linked to a Fog ransomware affiliate, revealing their operational toolkit.

Key takeaways from our analysis:

➡️ Initial Access: Compromised SonicWall VPN credentials were used.

➡️ Toolkit: Included tools for reconnaissance, exploitation (Certipy, Zer0dump), credential theft (DonPAPI), persistence (AnyDesk automated via PowerShell), and C2 (Sliver, Proxychains tunneling).

➡️ Targets: Victims spanned technology, education, and logistics sectors across Europe, North America, and South America.

➡️ Persistence: AnyDesk RMM tool was leveraged for maintaining access.

➡️ Command & Control: Sliver C2 executables were hosted alongside Proxychains for traffic tunneling.

Read the full analysis here: https://thedfirreport.com/2025/04/28/navigating-through-the-fog/

0
2
0
repeated

Like others, Rapid7 MDR has observed in-the-wild exploitation of SAP NetWeaver Visual Composer CVE-2025-31324 in customer environments. Webshells being dropped with random 8-character names. Earliest confirmed EITW on our side currently is late March, but I'd expect that may change (i.e., move earlier). Manufacturing is overwhelmingly the most affected vertical, mostly in the U.S.

https://www.rapid7.com/blog/post/2025/04/28/etr-active-exploitation-of-sap-netweaver-visual-composer-cve-2025-31324/

0
2
0
repeated

Fuzzing Windows ARM64 binaries with a DBI and LLVM?
Here we go: https://www.romainthomas.fr/post/25-04-windows-arm64-qbdi-fuzzing/

0
5
0
Show older