[Gecko] Competition, Innovation, and the Future of the Web - Why Independent Browser Engines Matter
https://blog.mozilla.org/netpolicy/2026/03/23/competition-innovation-and-the-future-of-the-web/
🦎️
A man used LLMs to generate hundreds of thousands of "songs", then used bots to stream them billions of times, to collect $8m in royalties. https://www.justice.gov/usao-sdny/pr/north-carolina-man-pleads-guilty-music-streaming-fraud-aided-artificial-intelligence-0 Is there a better metaphor for late-stage capitalism than burning resources to make songs that are never listened to, then steaming them to robots that will never hear them, ad infinitum?
Micropatches released for Desktop Windows Manager Elevation of Privilege Vulnerability (CVE-2025-55681)
https://blog.0patch.com/2026/03/micropatches-released-for-desktop.html
that sound you hear is every Windows platform engineer pasting the "Our commitment to Windows quality" post into their AGENTS.md
New Post: Debugging - WinDBG & WinDBGX Fundamentals https://www.corelan.be/index.php/2026/03/23/debugging-windbg-windbgx-fundamentals/
RE: https://mastodon.art/@lurnoise/114993216415771245
Hi! You should hire me for stuff, not only do I draw pretty neatly but I'm also very kind and easy to work with and always hit the deadlines <3
What You Need to Know: Windows Admin Center Remote Privilege Escalation (CVE-2026-26119) https://www.semperis.com/blog/what-you-need-to-know-windows-admin-center-remote-privilege-escalation-cve-2026-26119/
Almost 7 years of silence.
Today, that changes.
March 23, 2026.
Follow to be among the first to know:
https://www.corelan.be/index.php/contact
Tick tock. It’s coming.
Our Call for Participation is now live!
If you have a talk, workshop, performance, or installation you'd like to bring to EMF, you can now submit it here:
Accepted proposals are guaranteed the chance to buy a ticket!
This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.
👉 https://itm4n.github.io/cve-2026-20817-wersvc-eop/
Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.
TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? 🤷♂️