Posts
3110
Following
706
Followers
1551
"I'm interested in all kinds of astronomy."
[RSS] Is Mouse Input Random Enough for Generating Secret Keys?

https://x41-dsec.de/security/research/news/2025/09/25/mouse-entropy/
0
2
3
repeated

i can finally share the google docs attack poc from my slides!!

blogpost coming later

(video 1/2 - the attack)

1
2
0
repeated

🔴 We just published our Black Hat Arsenal talk (part 1)!

It's a brief tutorial on:

1. using rev.ng from the CLI;
2. playing around with the decompiled code in VSCode;
3. finding bugs with clang static analyzer! 🦾

https://www.youtube.com/watch?v=_Ph_kQr064w

1
2
0
repeated

I didn't know how to explain it at the time but we have words for my bug report now: I used the SSDP RFC -> LLM-generated EBNF grammar -> vibe-coded Rust compiler for EBNF to Protobuf -> vibe-coded C++ frontend -> vibe-coded root cause -> vibe-coded report https://issues.chromium.org/issues/40070891

1
1
0
repeated

🏆 VB2025 Péter Szőr Award — Finalists Announced!

We're excited to reveal the three shortlisted finalists for this year’s Péter Szőr Award, selected by committee vote

The winner will be announced at the Gala Dinner this evening, Thursday 25 September, at VB2025 in Berlin.

0
2
0
repeated
Edited 3 months ago

We need an internet archive outside the US! We can't put all our eggs in one basket.

Oh, wait: we *have* an internet archive outside the US. Let's support it.

And now they have an office - a physical presence!

https://flaminghydra.com/freedom-and-sharing-at-the-internet-archive-europe/

https://www.internetarchive.eu/

1
16
0
repeated

Inky Impression 用に額縁を設計してプリントして収めた。安っぽいけどだいぶフォトフレーム感が出た

0
1
0
repeated
repeated

So I just reported a very interesting bug in Outlook - took me a while to analyze and understand (part of) the root cause..

The bug allows to read the value of an MAPI property* and use it *directly* as a memory pointer. We know OOB (e.g. caused by integer overflow) bugs are not rare but they're all some sort of "offsets", not someone just read the value and directly use it as a pointer.. So basically you can set the DWORD 0xdddddddd in the email and Outlook would happily access memory at 0xdddddddd. Not sure what severity it could be as it's an OOB-read at first glance, but def. an interesting find for me.:)

Full details will be released after MSRC's review.

* https://learn.microsoft.com/en-us/office/client-developer/outlook/mapi/mapi-property-overview

2
1
0
repeated

System/38 project update. Edith is off the pallet and on her own wheels. WE REPEAT THE EDITH HAS LANDED.

https://www.gofundme.com/f/ibm-system-38-computer-rescue-and-restoration

1
1
0
repeated

The crates.​io team was notified of two malicious crates (with similar names as legitimate crates) which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exfiltration. The malicious crates have been removed.

See the blog post for details: https://blog.rust-lang.org/2025/09/24/crates.io-malicious-crates-fasterlog-and-asyncprintln/

0
7
0
repeated

I wrote an article about what I wish juniors in cybersecurity would ask for and contribute when asking for a mentor and career guidance, in light of the terrible tech jobs market.

https://tisiphone.net/2025/09/24/reasonable-expectations-for-cybersecurity-mentees/

7
9
0
How a 20 year old bug in GTA San Andreas surfaced in Windows 11 24H2

https://cookieplmonster.github.io/2025/04/23/gta-san-andreas-win11-24h2-bug/
1
2
4
[RSS] Why is Windows still tinkering with critical sections?

https://devblogs.microsoft.com/oldnewthing/20250924-00/?p=111624
0
0
1
repeated

stty

https://wizardzines.com/comics/stty/

(from The Secret Rules of the Terminal, out now! https://wizardzines.com/zines/terminal/)

2
2
0
repeated

You just don't understand the fourth industrial revolution

10
19
0
"CVE-2025-1727 reveals a critical design flaw: the EoT/HoT linking protocol — which sends emergency brake commands [to trains] over a radio channel — has no cryptographic authentication."

https://cervello.security/blog/vulnerabilities-incidents/research-cve-2025-1727/
0
2
6
repeated

🚨 SolarWinds, the gift that keeps on giving: a new Web Help Desk patch bypass, CVE-2025-26399, enables unauthenticated RCE via deserialization.

It’s a patch bypass of CVE-2024-28988/CVE-2024-28986 - previously exploited.

Given SolarWinds’ past, in-the-wild exploitation is highly likely. Patch now.

Need help assessing your exposure? https://watchtowr.com/

0
1
0
[RSS] BYOVD to the next level (part 1) -- exploiting a vulnerable driver (CVE-2025-8061)

http://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061.html
0
1
2
Show older