Posts
3905
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
repeated

📣I will be reaching out all the speakers next week, in order to confirm the details of every presentation and get the schedule published in September!

If you are willing to present the closes in October! Reach me out if you have questions or half-shaped proposals to show!

0
3
0
repeated

linker errors per Planck time

0
1
0
repeated

Interesting links of the week:

Strategy:

* https://wero-wallet.eu/ - a European replacement for PayPal, Google and Apple

Threats:

* https://the-sequence.com/rustypages-malware-part-i - some nice new shiney malware for OS X
* https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/ - don't you just hate being poked with bamboo?

Detection:

* https://camel-security.github.io/ - LLM guard rails from GOOG
* https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging?view=powershell-5.1#enabling-script-block-logging - MSFT's protected logging feature for PS
* https://adsecurity.org/?p=4510 - mm, honey
* https://blog.pypi.org/posts/2025-08-18-preventing-domain-resurrections/ - preventing domain resurrections in PyPI

Bugs:

* https://www.heise.de/en/news/Docker-Desktop-Critical-vulnerability-allows-host-access-10560707.html - attackers may no longer be contained
https://bughunters.google.com/blog/5800341475819520/a-fuzzy-escape-a-tale-of-vulnerability-research-on-hypervisors - I hate being supervised, do you?

Exploitation:

* https://arxiv.org/abs/2507.09411 - feasibility of generating variant malware using LLMs
* https://phrack.org/issues/72/5_md#article - @phrack #72 lands and it's a goodie... aforementioned link is to @orange's work on PHP
* https://versprite.com/blog/the-shell-was-restricted-but-the-kernel-memory-was-wide-open/ - attacking Linux-based firmware for LPE via the kernel
* https://blog.anh4ckin.ch/posts/netexec-workshop2k25/ - nosing around an AD lab

,

0
3
0
repeated

Sam Altman calls AI a “bubble” while seeking $500B valuation for OpenAI
"Someone will lose a phenomenal amount of money," says CEO while fundraising at record prices.
https://arstechnica.com/information-technology/2025/08/sam-altman-calls-ai-a-bubble-while-seeking-500b-valuation-for-openai/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

8
7
0
Edited 8 months ago
LLM's let's you use natural language to extract data from computers.

POML is a way to wrap your natural language prompts to XML to give them structure again:

https://github.com/microsoft/poml

Seriously.
0
0
4
repeated

Well AMD just made an oopsie! They accidentally posted the complete source code to FSR4, then tried to remove it, but uhhhhh... here's the repo: https://github.com/GPUOpen-LibrariesAndSDKs/FidelityFX-SDK/tree/01446e6a74888bf349652fcf2cbf5f642d30c2bf
and here's the commit history: https://github.com/GPUOpen-LibrariesAndSDKs/FidelityFX-SDK/commit/01446e6a74888bf349652fcf2cbf5f642d30c2bf
MIT license, have fun!

0
11
0
[RSS] exploits.club Weekly Newsletter 83 - Windows P20 Wins, LLMs + CodeQL, MCP Takes Down DEFCON CTF, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-83-windows-p20-wins-llms-codeql-mcp-takes-down-defcon-ctf-and-more/
0
0
2
repeated

@blackhoodie_re will be back at @hexacon_fr this year, and we're currently looking for former BlackHoodies who would be willing to give a training, between Oct 6 and 9! https://blackhoodie.re/Hexacon2025/

0
3
0
repeated

longing for the day when computers are advanced enough to handle 65k bytes of plaintext

1
3
1
repeated
Edited 8 months ago

NEW: Earlier this month, two hackers published their findings in Phrack magazine after hacking into the computer of a North Korean government hacker. Now, in speaking with @lorenzofb, the hackers explain why they went public — even though their breach was probably illegal.

https://techcrunch.com/2025/08/21/hackers-who-exposed-north-korean-government-hacker-explain-why-they-did-it

0
3
0
repeated
repeated

side channel attacks per hour

1
1
0
repeated

⚠️: If you are using Docker for Desktop you need to update it TODAY to v4.44.3. Critical CVE-2025-9074 in previous versions allows malicious containers to access host system:

👇
https://www.heise.de/en/news/Docker-Desktop-Critical-vulnerability-allows-host-access-10560707.html

0
4
0
Fresh Windows VM crashes the kernel debugger, great...
0
0
0
repeated

Anyone happens to know if there's any easy trick to bypass an Incapsula "security firewall" that thinks downloading with curl/wget is an attack to be prevented? (It's not just the user agent, I tried that.)

1
3
0
[RSS] OpenPrinting ippusbxd media-size-supported stack based buffer overflow vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071
0
0
0
repeated

Open Source Security mailing list

rsync: 6 CVEs https://www.openwall.com/lists/oss-security/2025/01/14/3
Two independent groups of researchers identified a total of 6 CVEs in rsync. In the most severe CVE (affects rsync 3.2.7+), an attacker only requires anonymous read access to a rsync server, such as a public mirror, to execute arbitrary code.

1
4
0
repeated
Edited 8 months ago

Time to upgrade to 3.2.2.

XXE in XFA parsing up through version 3.2.1

https://lists.apache.org/thread/8xn3rqy6kz5b3l1t83kcofkw0w4mmj1w

0
1
0
[RSS] Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault

https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-vault-twice-pre-auth-rce-chains-in-commvault/
0
0
2
Show older