Given the recent data breach and Coinbase’s user agreement that aims to force customers into arbitration rather than individual or class action lawsuits, it’s interesting to read the outcome of a recent arbitration case against Coinbase.
https://www.courtlistener.com/docket/69741499/1/coinbase-inc-v-spilker/
Five of CISA’s six operational divisions and six of its 10 regional offices will have lost top leaders by the end of the month, the agency’s new deputy director, Madhu Gottumukkala, informed employees in an email on Thursday.
https://www.cybersecuritydive.com/news/cisa-senior-official-departures/748992/
I swear to god, I am starting to understand John McAfee.
On May 20th 2025 a BGP message was propagated that triggered some surprising (to many) behaviors with two major BGP implementations that are often used for carrying internet traffic.
In a new blog post, I will dissect what that message was, and my thoughts on how it happened:
https://blog.benjojo.co.uk/post/bgp-attr-40-junos-arista-session-reset-incident
The DWARF debug format is well-known for debugging executables,
but it is also an effective format for sharing reverse engineering information
across various tools, such as IDA, BinaryNinja, Ghidra, and Radare2.
In this blog post, I introduce a new high-level API in LIEF that allows the
creation of DWARF files. Additionally, I present two plugins designed to export
program information from Ghidra and BinaryNinja into a DWARF file.
https://lief.re/blog/2025-05-27-dwarf-editor/
(Bonus: The blog post includes a DWARF file detailing my reverse engineering work on DroidGuard)
Don't forget to patch your GIMPs for sev:HIGH
BoFs and UAFs today.
https://access.redhat.com/security/cve/CVE-2025-48796
Defcon forums have to be RCE’d once a year, I don’t make the rules!
https://chaos.social/@christopherkunz/114579265339897261
V now supports 3 more architectures:
- loongarch64
- riscv32
- s390x (IBM Z)
I always find it a bit surprising that "looking up executables in PATH" isn't implemented in one central place (there are at least 3 implementations that I use regularly: in libc, my shell, in Go, and probably more that I don't know about)
it's a weird thing because there are actually many different implementations, but I think in general the implementations act similarly enough that you can pretend there's only 1 implementation, I've never actually run into a problem caused by this
CatSynth Pic: CoCo with massive modular 😻🎛 https://catsynth.com/2025/05/coco-with-massive-modular/ #CatsOfMastodon #eurorack #modular
Check it out. I just published TeleMessage Explorer: a new open source research tool https://micahflee.com/telemessage-explorer-a-new-open-source-research-tool/