The full webinar recording is out. š“
Watch time travel debugging in action: https://youtu.be/tEzumvwjUzo
going to take some weapons to the datacenter any day now
How was it like to attend the exclusive #ZeroDayQuest event? How did a Unix #hacker even qualify in the first place? How can you become one of the #Microsoft MVRs?
Our technical director @raptor answers these and other questions in his latest article:
https://security.humanativaspa.it/my-zero-day-quest-bluehat-podcast
Happy birthday to Wolfenstein 3D, released on this day, 33 years ago on 5th May 1992!
The tech industry is a teenage industry. Rebelling against what it sees as old and uncool while desperately following fads and fashions as it tries to fit in with what everyone else is doing.
If you've ever struggled with trait/typeclass compiler errors, or if you're interested in better user interfaces for compiler diagnostics, check out our upcoming PLDI paper: "An Interactive Debugger for Rust Trait Errors"
Rust famously has good error messages. But we found that with the right interface, people become ~3x faster at identifying the root cause of a trait error. See our blog post, including a live demo in your browser:
https://cel.cs.brown.edu/blog/an-interactive-debugger-for-rust-trait-errors
āI started a spreadsheet, which is what middle-class professionals do when faced with systemic problems ā we quantify things, as if converting human suffering into Excel cells might render it more manageable.ā Via @gvwilson.
did you know that GDB includes a bytecode compiler? specifically, it has a private [edit: it's documented] bytecode format used between it and the GDB server, which the latter uses to implement conditional breakpoints with complex expressions and tracepoints
every time it hits a breakpoint/tracepoint it evaluates the bytecode, which has jumps and can read arbitrary target memory, and decides whether it really was hit or not
New post: Full Disclosure: Multiple Rundeck Job Command Injections https://insinuator.net/2025/05/full-disclosure-multiple-rundeck-job-command-injections/
ICYMI: āEvery TWINSCAN EUV ships with ~45 million lines of code [ā¦] Bugfixes and features start out as *word documents* sent to a series of review boardsā¦ā
https://alecmuffett.com/article/113264
#SecurityByDesign #SoftwareEngineering #bugs
š
#Webmin: a critical security vulnerability discovered in a widely-used web-based system administration tool, allowing authenticated attackers to escalate privileges to root level and execute code.
Caused by CRLF injection: CVE-2025-2774 (CVSS 8.8)
š
https://cybersecuritynews.com/webmin-vulnerability-escalate-privileges/
Software is like entropy. It is difficult to grasp, weighs nothing, and obeys the second law of thermodynamics; i.e. it always increases.
Tech Companies Apparently Do Not Understand Why We DislikeĀ AI
It's becoming increasingly apparent that one of the reasons why tech companies are so enthusiastic about shoving AI into every product and service is that they fundamentally do not understand why people dislike AI. I will elaborate. I was recently made aware of the Jetbrains developer ecosystem survey, which included a lot of questions about AI. After I answered some of them negatively (and possiblyā¦
http://soatok.blog/2025/05/04/tech-companies-apparently-do-not-understand-why-we-dislike-ai/
Wrote a wrapper for Linuxās HID descriptor parser so I can fuzz it with libFuzzer: https://github.com/worthdoingbadly/hid-parser-harness
Iām still trying to figure out the USB uninitialized memory issue from that Amnesty International report, so I made it abort when it sees a 0xbe byte (ASan fills uninitialized mallocād buffers with this).