Posts
3368
Following
712
Followers
1580
"I'm interested in all kinds of astronomy."
repeated
Released xer v0.0.4-alpha with support for signed byte values (hexadecimal and decimal) for people dealing with Java:

https://github.com/v-p-b/xer/releases/tag/v0.0.4-alpha
0
0
1
repeated
repeated

The libxml2 maintainer is no longer accepting embargoed security reports. They just get treated like regular issues.

This bit in a comment on the announcement really resonates with me:

> these companies make billions of profits and refuse to pay back their technical debt, either by switching to better solutions, developing their own or by trying to improve libxml2.

Too often a company will depend on some library, and then when there are issues with it, shame the maintainer into fixing them. "There's a problem with your project, it is your responsibility to fix it".

No.

You chose to build on top of this library, and with that took on all responsibility that comes with that choice. Any tech debt or bugs are now YOUR tech debt and bugs. What are you going to do about them?

https://gitlab.gnome.org/GNOME/libxml2/-/issues/913

0
6
0
repeated
repeated
repeated
Edited 7 months ago

PHRACK is coming to ! We're printing ~10,000 zines and giving an hour-long talk you won't want to miss! Stay tuned. ðŸ”Ĩ

1
6
0
repeated

We did a presentation at Null Byte Security Conference last year entitled "The importance of a rigorous methodology in information security research". The presentation aimed to introduce security professionals to the importance of rigor in information security research, but also to other aspects.

We consider rigor very important for the information security industry.

We have observed, over more than 15 years in the field, that many beginners lack a solid understanding of rigor and the scientific method, which hinders their learning and growth.

The audience was mostly people starting in the information security industry, and we tried to make it simple, but not simpler. The slides can be found at the link below:

https://allelesecurity.com/wp-content/uploads/2025/06/The-importance-of-a-rigorous-methodology-in-information-security-research.pdf

0
5
0
repeated

CVE-2025-48706 - Out-of-bounds read in COROS PACE 3

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-028.txt

Watch Out! Bluetooth Analysis of the COROS PACE 3

https://blog.syss.com/posts/bluetooth-analysis-coros-pace-3/

0
2
0
[RSS] exploits.club Weekly Newsletter 76 - Tesla Wall Charger Bugs, Chrome PoCs, Secure Boot Arb Writes, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-76-tesla-wall-charger-bugs-chrome-pocs-secure-boot-arb-writes-and-more/
0
1
2
[RSS] [Today] is the 37th birthday of the IBM Power servers and the #IBMi operating system.

https://www.rpgpgm.com/2025/06/happy-birthday-to-ibm-power-and-ibm-i.html
0
0
1
ClamAV 1.4.3 and 1.0.9 security patch versions published

https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html

CVE-2025-20260
CVE-2025-20234
+1 upstream vuln in lzma-sdk
0
2
2
repeated
repeated
repeated

ðŸ“Ģ Exciting opportunity in our iOS team for a Senior Vulnerability Researcher with experience in Apple platforms.

Remote or office based.

https://jobs.gohire.io/interrupt-labs-zcocopee/senior-ios-vulnerability-researcher-237538/

0
2
0
repeated

Do you know of examples of a software library's test suite catching a bug in its upstream dependencies? I've seen a few of these over the years, and I'd like to put together a small list. Things like:

- A programming language implementation's test suite uncovering a bug in other implementations
- A library's test suite uncovering a bug in the language implementation itself
- A framework addon's / extension's test suite uncovering a bug in the framework

4
3
0
repeated

Some pictures of KICKI a DEC PDP-10 model KI10 sn 522 currently in preservation.

Would you like to support us? Visit: https://icm.museum

0
3
0
repeated

You've been asking for the slides from my x33fcon talk this year - here they are!

I covered most modern anti-phishing protections and how to evade them, with a particular focus on how URL rewriting can be used to bypass Google Safe Browsing.

Enjoy! 🊝🐟

🔗👇

0
2
0
Show older