RE: https://infosec.exchange/@albinowax/116018773839725691
I'm happy to be on the TOP 10 list for the second time, this time with the fun SOAP stuff.
I'm even more happy to see ORM research in 2nd place. I saw it live during BHEU and it was awesome 🤟
Cisco has discovered DKnife, an AitM toolkit installed on hacked routers and edge devices by Chinese hackers, designed to intercept and tamper with traffic to deliver malware
The path to #pwning the PS VR2 (part 1) - "Recovery mode" <- yet another case study on how assumptions should always be checked in practice 🤷
https://bnuuy.solutions/2026/02/01/ps-vr2-recovery-mode.html
Electronic Waste Graveyard Immortalizes Dead Electronics
https://hackaday.com/2026/02/05/electronic-waste-graveyard-immortalizes-dead-electronics/
A good blog about computer viruses in Soviet times, the KGB and computer security in the USSR.
#hacking #history
https://fromcyberia.substack.com/p/how-the-kgb-discovered-computer-viruses
🚨 New advisory was just published!
A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. This vulnerability won first place in the Linux category during the TyphoonPWN 2025 event: https://ssd-disclosure.com/linux-kernel-net-sched-cake-qdisc-use-after-free-lpe/
While waiting for the upcoming release of #IDAPro 9.3 by @HexRaysSA, I have made some updates and bug fixes to my idalib-based headless IDA #plugins rhabdomancer, haruspex, and augur.
Check out the changelogs for all the details and enjoy!
High level diff of iOS 26.3 beta3 vs. iOS 26.3 RC 🎉
https://github.com/blacktop/ipsw-diffs/blob/main/26_3_23D5114d__vs_26_3_23D125/README.md
4 February 1917 | A Polish Jewish dancer Franciszka Mann was born. She was most probably the woman who on 23 October 1943, inside the undressing room of gas chamber II at Auschwitz II-Birkenau, seized SS man Josef Schillinger’s pistol, shot him & wounded SS man Wilhelm Emmerich.
---
A podcast about this and other cases of resistance at Auschwitz: https://www.auschwitz.org/en/education/e-learning/podcast/different-cases-of-organized-resistance-at-auschwitz/
Switching away from Hackerone is not a guarantee... Here we go.
Also came across this today. Wasn't already in the ruleset, so I fixed that.
FreePBX Authenticated Command Injection - testconnection SSH functionality.
https://theyhack.me/CVE-2025-64328-FreePBX-Authenticated-Command-Injection/
Patch diffing + RCA for clfs.sys can take awhile.
I gave the diff + binary to a local LLM.
It mapped the UAF path, race condition, all IOCTLs in <20 min
LLMs don't replace the work, they are momentum.
New blog post following the UAF trail of CVE-2025-29824:
https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/
Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers
Talk by Xingyu Jin and Martijn Bogaard about a new type of logical bugs in kernel driver mmap handlers exploitable via the ptrace functionality.
Authors found multiple Android vendor drivers affected by the issue. They also wrote an exploit for the IMG DXT GPU driver to escalate privileges on Pixel 10.
Video: https://www.youtube.com/watch?v=yAUJFrPjfCI
Slides: https://powerofcommunity.net/2025/slide/x-84592.pdf