Posts
3368
Following
712
Followers
1580
"I'm interested in all kinds of astronomy."
repeated

TrendAI Zero Day Initiative

Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to STAR Labs SG for winning Master of Pwn with $320,000. Thanks to @offensive_con for hosting, and thanks to all who participated. Can't wait to see you next year!

0
2
0
repeated

Open Source Security mailing list

GLIBC-SA-2025-0002: CVE-2025-4802: glibc: elf: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH https://www.openwall.com/lists/oss-security/2025/05/17/2
Affects statically linked setuid binaries that call dlopen, including internally to glibc after setlocale or NSS functions such as getaddrinfo

0
6
0
[RSS] Coinbase flips $20M extortion demand into bounty for info on attackers

https://cyberscoop.com/coinbase-cyberattack-extortion-counter-reward/
0
0
1
[RSS] Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)

https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/
0
0
2
[RSS] exploits.club Weekly Newsletter 72 - Windows On Windows, CoreAudio Fuzzing, VirtualBox escapes, And More

Achievement unlocked: featured in exploits.club newsletter \o/

https://blog.exploits.club/exploits-club-weekly-newsletter-72-windows-on-windows-coreaudio-fuzzing-virtualbox-escapes-and-more/
0
3
6
repeated

TrendAI Zero Day Initiative

Wrapping up Day Two of Berlin 2025. We’ve awarded $695,000 for 20 unique 0-days, with one more day to go!

0
2
0
repeated
Edited 9 months ago

Dear , you helped secure millions and millions of servers, not just web servers. But your announcement at https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/ about ending Ending TLS Client Authentication Certificate Support in 2026 because Google changes their requirements would result in your certificates being unusable for SMTP servers. You are literally risking an email collapse for many mailserver owners just to please Google? Please think again. Please.

3
10
0
repeated

TrendAI Zero Day Initiative

Confirmed!! Dinh Ho Anh Khoa of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit SharePoint. He earns $100,000 and 10 Master of Pwn points.

0
4
0
repeated

has blocked its services to the International Criminal Court by order of Donald . The prosecutor doesn’t have access to his . Source:AP

https://apnews.com/article/icc-trump-sanctions-karim-khan-court-a4b4c02751ab84c09718b1b95cbd5db3

10
12
0
repeated

G DATA's Karsten Hahn details how software downloads for the printer company Procolored were infected with XRed backdoor for half a year. https://www.gdatasoftware.com/blog/2025/05/38200-printer-infected-software-downloads

0
2
0
repeated

CISA is changing the way they publizice alerts, including the KEV (known exploited vulnerabilities). These will no longer be shown on the "Alerts" overview, but must be subscribed to via GovAlert (or just scrape the JSON...).

The first vulnerability that is *not* being published as an alert is...drumroll... CVE-2025-47729. "The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL app users"

Isn't that a funny coincidence?

1
10
0
repeated
Edited 9 months ago

I am totally sure (sarcasm included) that has totally overseen that their planned changes to their root program requirements will cause a lot of problems for mailserver owners like me who in future might run into weird problems with certificates for SMTP. I am sure that Google is absolutely not trying to make running your own mailserver even more complicated just to protect their gmail business. That would be totally not how Google thinks, amirite? https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/

2
10
0
repeated
repeated

CISA Warns of Chromium Vulnerability CVE-2025-4664 Actively Exploited in the Wild affecting , MS and Opera – Make sure to update your browser to the latest version today!
👇
https://cybersecuritynews.com/cisa-warns-of-google-chromium-vulnerability-actively-exploited-in-the-wild/

0
2
0
repeated

I wanted to end last year with a vm escape, took me a bit longer but I want to present you my latest public research:

A VM escape in Oracle VirtualBox using only one integer overflow bug!

This was fixed in April 15 and assigned CVE-2025-30712.

https://github.com/google/security-research/security/advisories/GHSA-qx2m-rcpc-v43v

0
5
0
repeated

TrendAI Zero Day Initiative

A brief summary of Day One of Berlin 2025, featuring Sina Kheirkhah, STAR Labs SG, Wongi Lee of Theori, Marcin Wiązowski and more.

0
2
0
repeated
repeated

yossarian (1.3.6.1.4.1.55738)

this ratelimiting stuff with GitHub makes me really think that MSFT might actually successfully kill their golden goose

trust arrives on foot and leaves on horseback, etc

2
2
0
repeated

TrendAI Zero Day Initiative

Confirmed! Hyeonjin Choi of Out Of Bounds earns $15,000 for a third round win and 3 Master of Pwn Points by successfully using a type confusion bug to escalate privileges in

0
2
0
Show older