Posts
3865
Following
725
Followers
1594
"I'm interested in all kinds of astronomy."
"Predictably, they decided to implement a super-complex XML parser [...] It will also accept the same parameter via query string in a GET request, except in that case the base64-encoded XML document is additionally compressed."

#Citrix should do CTF challenges instead of security appliances, really.

https://labs.watchtowr.com/the-sequels-are-never-as-good-but-were-still-in-pain-citrix-netscaler-cve-2026-3055-memory-overread/
0
7
19
repeated

The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread) - watchTowr Labs https://labs.watchtowr.com/the-sequels-are-never-as-good-but-were-still-in-pain-citrix-netscaler-cve-2026-3055-memory-overread/

0
1
0
repeated

while we’re eating our best writing crayons and using finger paint to finish our latest research, we’ve decided to take this opportunity to share research from the archives with new followers 🙂

happy Friday… for now 🥹

https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/

(Yes this is not new don’t @ us)

0
2
0
[RSS] CVE-2025-14325: SpiderMonkey Type Confusion in Baseline JIT Inline Cache

https://qriousec.github.io/post/cve-2025-14325/
0
0
1
#music #acid
Show content
Fun set for #Saturday by one of my favorite Hungarian DJs

https://www.mixcloud.com/titusz-bicskei/
0
0
0
repeated

Cry and sob hysterically at every occasion, especially when confronted by government clerks.

0
4
0
"Insanity is doing the same thing over and over again and expecting different results"

Einstein obviously didn't have to work with LLMs
1
3
1
repeated

A hefty root cause analysis of Secure Firewall Management Center (FMC) RCE CVE-2026-20079 out now from our exploit dev team. The bug's a CVSS 10, but there are significant prerequisites for exploitation that limit real-world exploitability https://www.vulncheck.com/blog/cisco-fmc-auth-bypass-cve-2026-20079

0
2
0
repeated

AI, a few thoughts, observations about AI & security vulns.
My standard line about AI is "there's a lot I'm uncertain about". But let's be clear, there's a lot I don't like & I'm probably biased towards the "here's how spectacularly AI failed once again" news (of which there are plenty) or at least the "it's not as impressive as it may look".
Yet, I don't want to close my eyes if I see things that clearly don't fit my biases. And I know a thing or two about security vulnerabilities.🧵

1
2
0
Took me a while to discover the automatic tab arrangement/containerization feature of Sidebery - best thing since silced bread!

https://addons.mozilla.org/en-US/firefox/addon/sidebery/

Right click on tab -> Configure site
0
0
0
repeated

US or EU, Remote - Wiz - Threat Intelligence Researcher (Cloud)

Wiz has been doing some great work around TeamPCP lately, among other things.

According to LinkedIn ( https://www.linkedin.com/posts/benjamin-read-41817121_im-continuing-to-build-the-threat-intel-share-7442969734645608448-Gu-n?utm_source=share&utm_medium=member_desktop&rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o ) it's posted for US but open to EU. They're looking for two roles, one Cyber Crime and one Cyber Espionage.

(I am not affiliated with Wiz or at all involved in this hiring process.)

https://www.wiz.io/careers/job/4658917006/threat-intelligence-researcher-cloud

1
2
0
repeated

you know

multiple people now have said that the thing they like about LLMs is that they don't have to deal with feeling embarrassed or humiliated by bringing questions to others that the others will judge them for.

which like

y'all.

this is a classic "solving a people problem with tech and having horrible side effects as a result" situation

and perhaps y'all ought to be less fucking toxic and judgemental to your coworkers.

fuck.

0
4
0
repeated

Rust 1.94.1 has been released.

This point release fixes a few regressions that slipped into in Rust 1.94.0: an internal compiler error in Clippy, a small security issue in Cargo, and two issues in the standard library.

See the blog post for details: https://blog.rust-lang.org/2026/03/26/1.94.1-release/

0
3
0
#ICS #OT crowd: I'm looking for "Production Line Design for Dummies"-type resources. I'm primarily interested in high-level best practices, rules of thumb for making industrial processes work reliably, ELI5 level is sufficient. Let's say I want to build a lemonade factory for my teddy bear!

Any recommendations?
1
0
1
repeated

I discovered a race-based vulnerability class in the Linux kernel: "Out-of-Cancel"

A structural flaw where cancel_work_sync() is used as a barrier for object lifetime management, causing UAF across multiple networking subsystems.

I wrote an exploit for CVE-2026-23239 (espintcp). It interleaves Delayed ACK timers, NET_RX softirqs, timerfd hardirqs, workqueue scheduling, and CFS scheduler manipulation to hit a ~Xµs race window.

Blog: https://v4bel.github.io/linux/2026/03/23/ooc.html

This is the race scenario diagram 😁:

1
5
0
repeated

Lorenzo Franceschi-Bicchierai

NEW: Here's everything you need to know about the new iPhone hacking tool DarkSword.

What is DarkSword? How does it work? Where did it come from? How did it leak online? What can you do about it?

We break it all down in this explainer.

http://techcrunch.com/2026/03/26/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know/

0
4
0
repeated
repeated
Edited 28 days ago

Vibe Security Radar: Real CVEs where AI-generated code introduced the vulnerability.

https://vibe-radar-ten.vercel.app/

EDIT: forget that, it's slop:

> If the primary model fails, a Claude Agent SDK fallback with independent repository access retries the investigation.

sigh

2
2
0
Show older