Posts
3915
Following
728
Followers
1601
"I'm interested in all kinds of astronomy."
[RSS] What are we on? A survey on substance use among cybersecurity professionals.

https://forms.gle/GdfVJDPnZHVz1jY67

On Google Forms of course /o\
0
0
2
repeated

How was it like to attend the exclusive event? How did a Unix even qualify in the first place? How can you become one of the MVRs?

Our technical director @raptor answers these and other questions in his latest article:

https://security.humanativaspa.it/my-zero-day-quest-bluehat-podcast

0
3
0
repeated

Happy birthday to Wolfenstein 3D, released on this day, 33 years ago on 5th May 1992!

0
11
0
repeated

The tech industry is a teenage industry. Rebelling against what it sees as old and uncool while desperately following fads and fashions as it tries to fit in with what everyone else is doing.

2
4
0
repeated
Edited 1 year ago

If you've ever struggled with trait/typeclass compiler errors, or if you're interested in better user interfaces for compiler diagnostics, check out our upcoming PLDI paper: "An Interactive Debugger for Rust Trait Errors"

Rust famously has good error messages. But we found that with the right interface, people become ~3x faster at identifying the root cause of a trait error. See our blog post, including a live demo in your browser:

https://cel.cs.brown.edu/blog/an-interactive-debugger-for-rust-trait-errors

1
5
0
repeated

“I started a spreadsheet, which is what middle-class professionals do when faced with systemic problems — we quantify things, as if converting human suffering into Excel cells might render it more manageable.” Via @gvwilson.

https://www.huffpost.com/entry/utah-school-lunch-debt-relief-free-student-meals_n_681258fbe4b03207b5ba49fa/amp

4
12
0
repeated
Edited 1 year ago

did you know that GDB includes a bytecode compiler? specifically, it has a private [edit: it's documented] bytecode format used between it and the GDB server, which the latter uses to implement conditional breakpoints with complex expressions and tracepoints

every time it hits a breakpoint/tracepoint it evaluates the bytecode, which has jumps and can read arbitrary target memory, and decides whether it really was hit or not

5
5
0
repeated
repeated

ICYMI: “Every TWINSCAN EUV ships with ~45 million lines of code […] Bugfixes and features start out as *word documents* sent to a series of review boards…”
https://alecmuffett.com/article/113264

1
1
1
repeated

: a critical security vulnerability discovered in a widely-used web-based system administration tool, allowing authenticated attackers to escalate privileges to root level and execute code.
Caused by CRLF injection: CVE-2025-2774 (CVSS 8.8)
👇
https://cybersecuritynews.com/webmin-vulnerability-escalate-privileges/

1
4
0
repeated

Project Zero Bot

New Project Zero issue:

Firefox: JavaScript can run during XSLTProcessor transform, leading to use-after-free

https://project-zero.issues.chromium.org/issues/389079450

CVE-2025-3028
0
1
1
repeated

Software is like entropy. It is difficult to grasp, weighs nothing, and obeys the second law of thermodynamics; i.e. it always increases.

0
3
0
repeated

Tech Companies Apparently Do Not Understand Why We Dislike AI

It's becoming increasingly apparent that one of the reasons why tech companies are so enthusiastic about shoving AI into every product and service is that they fundamentally do not understand why people dislike AI. I will elaborate. I was recently made aware of the Jetbrains developer ecosystem survey, which included a lot of questions about AI. After I answered some of them negatively (and possibly…

http://soatok.blog/2025/05/04/tech-companies-apparently-do-not-understand-why-we-dislike-ai/

42
20
0
repeated

Wrote a wrapper for Linux’s HID descriptor parser so I can fuzz it with libFuzzer: https://github.com/worthdoingbadly/hid-parser-harness

I’m still trying to figure out the USB uninitialized memory issue from that Amnesty International report, so I made it abort when it sees a 0xbe byte (ASan fills uninitialized malloc’d buffers with this).

0
5
0
repeated

, that app used by the administration to archive Signal messages, has been . The managed to get some users' group chats and messages too. This is a hugely significant not just for those individual customers, but also for the U.S. government more widely. https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/

0
5
0
repeated

Misinformation-Superhighwayman

Edited 1 year ago

May the 5th Element be with you.

2
13
0
Sorry, I have a nasty hangover...
0
6
19
repeated

Quick note: https://arm.jonpalmisc.com/ has been updated to the latest version of the Arm spec. Any changes should be strictly improvements, but let me know if something seems off.

0
3
0
repeated
I know this is gatekeeping, but spammers who can't replace "%victim%" should just leave the industry.
2
1
9
Show older