Posts
3887
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
The Great Software Quality Collapse: How We Normalized Catastrophe

https://techtrenches.substack.com/p/the-great-software-quality-collapse

"We've normalized software catastrophes to the point where a Calculator leaking 32GB of RAM barely makes the news."
2
21
19
repeated
repeated

Finding a buggy driver is one thing, abusing it is another🧠
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀

➡️ https://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061_part2.html

0
4
0
And they say school material is disconnected from real life:

I just had to use one of my password cracking wordlists to figure out kiddos homework
0
0
5
repeated

Open Source isn't going to help.

There's a way to invisibly compromise all software.

A perfect, self-replicating "sin" passed down for generations of compilers.

It's not just theoretical, and Ken Thompson showed us how.

4
1
0
repeated
repeated

My Dad's on the lookout for a reasonable e-book reader. No Android, no color, no LCD screen - eInk only.

It's been over a decade I last bought an ebook reader, and the Kindle Paperwhite we bought back then still functions great (it never connected to the internet), so I'm a bit out of my depth.

I was looking at a Kobo Clara BW, and I seem to recall reading favourable reviews of Kobo devices.

Is this a good one? Or is there any better one in a similar price range?

For various reasons, not interested in second hand devices, nor DIY or hacked customs. Dad needs something that can be bought off the shelf of a random local shop (or ordered online, shipping to Hungary without horrible tarrifs).

3
2
1
repeated

If you have a bash command line of "exec program ..." and you can control the "..." can you make it not run the exec and do something different? The answer is yes. Even if "..." is somewhat sanitised for shell metacharacters. If you can inject $[+] it will make bash error on that line and run the next. This is how https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 works.

0
8
0
Mole is a Binary Ninja plugin designed to identify interesting paths in binaries [by performing static backward slicing]

https://github.com/cyber-defence-campus/mole
0
0
5
repeated

In our final ksmbd research post, @sine provides a detailed walkthrough for exploiting a local privilege escalation vulnerability. If you're interested in learning more about exploitation on modern systems - check it out!

https://blog.doyensec.com/2025/10/08/ksmbd-3.html

1
3
0
This was driving me nuts: Even though I set #Firefox to always ask where it saves files, sometimes when I accessed PDF's it saved them in my Downloads directory without question.

It seems `browser.download.start_downloads_in_tmp_dir=true` solves this problem but I still can't wrap my head around why they implemented this exceptional behavior (and why there is no visible setting for it).

Source: https://www.reddit.com/r/firefox/comments/1jnpvs3/firefox_doesnt_ask_when_downloading_pdfs_and/
0
0
4
repeated

Cybersecurity Awareness Month is dumb. Here are some alternatives.

No Vendor November Do some free shit to improve your posture. You know your users, systems and business better than they do.

Defaults December Security by design and default deny.

2
5
0
repeated

Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)
https://blog.0patch.com/2025/10/micropatches-released-for-windows.html

1
3
0
repeated

TrendAI Zero Day Initiative

Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. https://www.zerodayinitiative.com/blog/2025/10/6/crafting-a-full-exploit-rce-from-a-crash-in-autodesk-revit-rfa-file-parsing

0
2
0
repeated

Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984) https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984

0
4
0
repeated

We just posted our AttackerKB @rapid7 Analysis for the recent Cisco ASA 0day chain; CVE-2025-20362 and CVE-2025-20333. The auth bypass appears to be a patch bypass of an older 2018 vuln. The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to be overflowed and memory corruption to occur. Full technical root cause analysis here: https://attackerkb.com/topics/Szq5u0xgUX/cve-2025-20362/rapid7-analysis

1
5
0
[RSS] iOS emulation for security research -- early access now open

https://u.eshard.com/ios-emulator
0
0
1
[RSS] Remembering the end of support for VRML in Internet Explorer

https://devblogs.microsoft.com/oldnewthing/20251007-00/?p=111657
0
0
1
Show older