Posts
2507
Following
649
Followers
1468
"I'm interested in all kinds of astronomy."
repeated

This is exactly what the internet is for.

9
32
3
repeated

Give lengthy and incomprehensible explanations when questioned.

2
1
0
repeated

Filippo Valsorda (🏝️🔙 Aug 1)

Operating a Certificate Transparency log is now within reach of many organizations.

I wrote up the requirements: essentially one small server process, a couple people, and the capacity to host 3-5 TB of static files. https://words.filippo.io/run-sunlight/

I'd love to chat with anyone who's considering running one!

5
6
0
repeated

Remember the perfect 10 CVE-2024-56346 in IBM NIM? They are just now publishing an advisory that IBM Virtualization Engine TS7700 is vulnerable to it. I know IBM is large, but that seems like a long time to wait to publish that an IBM product is impacted by another IBM vulnerability, especially that one.

https://www.ibm.com/support/pages/node/7238566

0
2
0
[RSS] Dubious security vulnerability: If I perform this complex series of manual steps, I can crash a program I am running

https://devblogs.microsoft.com/oldnewthing/20250707-00/?p=111351
0
0
2
[RSS] [CVE-2025-32461] Tiki Wiki CMS Groupware <= 28.3 Two SSTI Vulnerabilities

https://karmainsecurity.com/KIS-2025-03
0
0
2
[RSS] How I Discovered a Libpng Vulnerability 11 Years After It Was Patched

https://blog.himanshuanand.com/posts/discovered-a-libpng-vulnerability-11-years-after-it-was-patched/
0
2
4
[RSS] Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key

https://www.netspi.com/blog/technical-blog/network-pentesting/remote-code-execution-sailpoint-iqservice/
0
1
3
repeated

Computer engineer interested on and looking for job.
Maybe I do not have the skills, but one thing i can say is that I’m pretty good on getting my shit done, even if is something new to me.

0
4
0
repeated

In our last blog post, our colleague Gianluca shares the story of a lucky discovery: a bug initially spotted during a routine assessment turned out to be a high impact vulnerability in Microsoft Graph API — earning a $3,000 bounty.

https://security.humanativaspa.it/export-to-pdf-allows-local-file-inclusion-path-traversal-in-microsoft-365/

0
3
0
repeated
repeated

If you have an Intel Raptor Lake system and you're in the northern hemisphere, chances are that your machine is crashing more often because of the summer heat. I know because I can literally see which EU countries have been affected by heat waves by looking at the locales of Firefox crash reports coming from Raptor Lake systems.

7
33
1
repeated

What does the web mean to you?

As we celebrate 1 trillion webpages archived in the Wayback Machine, we want to hear your story. Why does preserving the web matter to you?

📝 Share your story now: https://forms.gle/c3XqotHUToKe2pZw5

0
4
0
repeated

Checklists Are The Thief Of Joy

I have never seen security and privacy checklists used for any other purpose but deception. After pondering this observation, I'm left seriously doubting if comparison checklists have any valid use case except to manipulate the unsuspecting. But before we get into that, I'd like to share why we're talking about this today. Recently, another person beat me to the punch of implementing MLS (RFC 9420) in TypeScript.

http://soatok.blog/2025/07/07/checklists-are-the-thief-of-joy/

10
6
0
repeated

Post-auth code injection in IBM Integration Bus for z/OS.

https://www.ibm.com/support/pages/node/7239003

sev:HIGH 8.2 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

IBM Integration Bus for z/OS 10.1.0.0 through 10.1.0.5 is vulnerable to code injection by a privileged user with access to the IIB install directory.

https://nvd.nist.gov/vuln/detail/CVE-2025-36014

0
2
0
repeated

Software dependencies are subject to Brandolini's law (a.k.a the Bullshit Asymmetry Principle), which states:

"The amount of energy needed to refute bullshit is an order of magnitude bigger than that needed to produce it."

However, I also find that in any software project, the amount of effort needed to get rid of an external dependency is an order of magnitude bigger than it took to add it.

Conclusion: most software is largely made of bullshit.

1
1
0
repeated

Post-quantum crypto resists quantum computers, not physical attacks.

On July 10, we're live with PQShield to show how side-channel and fault injection techniques still break schemes like ML-KEM, and how to protect your implementations.

Register now:
🔵 11am CEST: https://pqshield.zoom.us/webinar/register/WN_GUBZIV41QDGiROlkbuUsPg#/registration
🔵 6pm CEST: https://pqshield.zoom.us/webinar/register/WN_6WZOefg3T06jQW6ind_bqw#/registration

0
2
0
repeated

New IBM Redbook about modernization on the IBM Power and IBM i was published on May 20, 2025.
💙
https://www.rpgpgm.com/2025/07/new-modernization-techniques-redbook.html

0
1
0
Show older