Posts
3915
Following
728
Followers
1601
"I'm interested in all kinds of astronomy."
repeated

The V Programming Language

V now supports 3 more architectures:

- loongarch64
- riscv32
- s390x (IBM Z)

0
3
0
repeated
Edited 11 months ago

I always find it a bit surprising that "looking up executables in PATH" isn't implemented in one central place (there are at least 3 implementations that I use regularly: in libc, my shell, in Go, and probably more that I don't know about)

it's a weird thing because there are actually many different implementations, but I think in general the implementations act similarly enough that you can pretend there's only 1 implementation, I've never actually run into a problem caused by this

6
2
1
repeated
repeated

Check it out. I just published TeleMessage Explorer: a new open source research tool https://micahflee.com/telemessage-explorer-a-new-open-source-research-tool/

1
8
0
repeated

"Much of the essence of building a program is in fact the debugging of the specification." — Fred Brooks

1
4
0
repeated

Hey fedi, if someone knows how to correctly define parallelized instructions in Ghidra's SLEIGH, well, I'm more than interested !

Or if you are aware of any decent documentation on how to define parallelized instructions in SLEIGH and want to share some pointers, that would be awesome too 😊

1
3
0
repeated

Types of codebases my customers send me:

- Enterprise javabean factory factory... on a SIM card

- C# programmer retasked to write an authenticated bootloader in C for an arm platform with no training

- Beautiful well-written, easy-to-read C by an experienced systems programmer, with one mind-blowing 100-out-of-100-risk-severity bug buried in miscutils.c

- There is a hermit monk in a cave in Czechia. Once every three years, he emerges with a new revision of the codebase. It is horrifying spaghetti logic that repulses the human soul, but no matter how long and how hard you look, you can't actually find anything wrong with it

8
17
0
repeated

Germany’s largest telecommunication provider Deutsche Telekom is owned by Chinese hackers. And its managed IT service subsidiaries are too. No media reporting on it yet. Deutsche Telekom (addicted to cheap Huawei equipment) chose not to go public. Wake up! https://blog.eclecticiq.com/china-nexus-threat-actor-actively-exploiting-ivanti-endpoint-manager-mobile-cve-2025-4428-vulnerability

2
2
0
repeated
repeated
repeated
Edited 11 months ago

Interesting story about Google publishing someone's phone number on searches for them when they gave the number to Google for account verification/security:

https://danq.me/2025/05/21/google-shared-my-phone-number/

Reminds me of the time a company I worked for (AFAIK) accidentally used phone numbers obtained the same way for ad targeting and got fined $150M

0
6
0
[RSS] DBus and Polkit Introduction

https://u1f383.github.io/linux/2025/05/25/dbus-and-polkit-introduction.html

With analysis of CVE-2025-23222 and CVE-2021-3560
1
4
5
[RSS] CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows [Fortinet]

https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/
0
2
6
repeated

Graham Sutherland / Polynomial

Mateusz Jurczyk from GP0 has been been writing a blog series on the implementation details of the Windows Registry, and there's a truly monumental amount of work on show here.

this one post alone is 24,000 words long, and covers a huge range of security issues discovered across the registry attack surface.

practically mandatory reading if you're doing Windows appsec assessments. really incredible stuff.

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html

0
5
0
repeated

Sad times, John Young of Cryptome is no longer with us:

https://www.theregister.com/2025/05/24/john_young_obituary/

0
2
0
[RSS] Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE

https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
0
1
1
Attacking EDRs Part 4: Fuzzing Defender's Scanning and Emulation Engine (mpengine.dll)

https://labs.infoguard.ch/posts/attacking_edr_part4_fuzzing_defender_scanning_and_emulation_engine/

Great to see snapshot #fuzzing successfully applied to another AV product!
0
6
5
Show older