Posts
3906
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
repeated

A sign of the times.

3
14
0
repeated
Edited 28 days ago

There is at least one Adobe Reader 0day being exploited in the wild:
https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html

TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.

Nobody knows what secondary payload the C2 is delivering to selected targets. But it's a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.

So I'll bet dollars to donuts that there is a second more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.

Edit: This is now fixed as CVE-2026-34621.

4
6
0
Edited 29 days ago
Artemis II mission planning:

"We strap you on a rocket, launch around the Moon based on some absurdly complicated mathematical formulas, then guide you back down the atmosphere at insane speeds, trying hard not to burn you alive.

Finally, we have to make sure you don't splash down at these particular areas of our planet, or some angry Earthlican may just shoot you."

Humanity is weird.
0
1
0
repeated

cpuid has been compromised, most downloads are serving a rat+infostealer as we speak, make sure you didn't get hit

0
3
0
repeated

We publish a major Citizen Lab report on Webloc, an ad-based mass surveillance system that monitors the movements and personal characteristics of hundreds of millions people globally based on data obtained from mobile apps and digital advertising.

Customers include ICE, El Salvador and Hungary.

Our research shows that ad-based surveillance is now used by military, intelligence and law enforcement agencies down to local police in several countries.

Full report here:
https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/

1
20
0
This comic needed an update
0
9
17
repeated

Very slightly work adjacent: a "we've updated our privacy policy" email in my inbox reminded me of a thing that $work did, and that I wish every company did: we checked all our ToS and similar documents into a git repo and published it, so that when they change you can just go look at the damn diff and see what changed (https://github.com/tailscale/terms-and-conditions).

If you work someplace and have the authority to do this, I wish this was normalized and expected of corporations that expect us to ingest a short story worth of legalese and keep up with the changes over time.

4
8
0
Thanks to
@jasminecarter.bsky.social
my cumulative complexity calculator for #Ghidra now has a cute logo:

https://github.com/v-p-b/rabbithole
0
1
2
Fair criticism of the latest @Bellingcat piece about leaked .gov.hu credentials (HU, use your favorite translator):

https://kiber.blog.hu/2026/04/09/tobb_szaz_magyar_kormanyzati_jelszo_kerult_ki_az_internetre_ja_de_mikor

There is *a lot* to report about in Hungarian politics/natsec, but digging up old credential dumps just misdirects attention and discredits relevant investigative work.
0
1
5
Edited 29 days ago
Unfortunately many skeptical takes on #Mythos / #Glasswing remind me of Gell-Mann amnesia:

https://en.wiktionary.org/wiki/Gell-Mann_Amnesia_effect

Every #LLM company and claim deserves ruthless skepticism, but arguments based on falsehoods and misunderstandings don't lead us forward.

Watching this talk is recommended:

https://www.youtube.com/watch?v=1sd26pWhfmg
2
0
5
repeated

Near as I can tell, this is all very good news. More things should take advantage of secure enclaves, and this open standard protects against one of the hardest current defense surfaces.

https://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html

2
7
0
repeated

Former Trenchant exec who stole exploits from his employer and sold them to a Russian broker says he was suffering depression & money troubles when he decided to sell the exploits. Also, new info reveals the nature of the work he did for an Australian intel agency before joining Trenchant. My story is linked below. Please consider becoming a paid subscriber if you like my work on this piece. It's 4,000 words and I'm making it available for free to everyone. But I can only do that because some subscribers have generously become paid subscribers.

https://www.zetter-zeroday.com/trenchant-exec-says-he-had-depression-money-troubles-when-he-decided-to-sell-zero-days-to-russian-buyer-also-new-info-reveals-nature-of-his-work-for-australian-intelligence-agency/?ref=zero-day-newsletter

1
6
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

I came across a reference to in another thread. It looks interesting: an open-source thing that can manage a bunch of compliance requirements.

So I went looking for information about their agent's security. Things I did find:

  • Installing it requires root and it appears to run as root.

Things I did not find:

  • Any security audit of the agent.
  • Any documentation on how they do privilege separation in the agent.
  • Any design docs for the agent.
  • Any threat model docs for the agent.

Are these things somewhere I missed? Anyone familiar with the project know how they avoid their network-connected-and-highly-privileged thing being an attack vector for client devices? Is it possible to run it sandboxed with read-only access to the system (for reporting violations but not automatically trying to fix them)?

4
2
0
repeated
repeated

New, by me at TechCrunch: The developer of the widely popular Wireguard VPN says he is also unable to ship software updates to Windows users after Microsoft locked his account, marking the second high-profile app developer (VeraCrypt) in the past few weeks to face this issue.

https://techcrunch.com/2026/04/08/wireguard-vpn-developer-cant-ship-software-updates-after-microsoft-locks-account/

5
18
0
repeated
Edited 1 month ago

RE: https://infosec.exchange/@josephcox/116374994792773696

To stop leaking your Signal messages:

Signal > Settings > Notifications > Notification Content > Show > “Name only” or “No name or content”

iOS and Android notifications all go through Apple and Google’s servers respectively and are not end to end encrypted. The feds have known and used this for years now.

Edit: That last bit doesn’t affect Signal, my bad. The settings change does still protect from the on-device notification DB storing message preview. See this reply for more info

https://tech.lgbt/@becomethewaifu/116375432389206118

1
7
0
repeated

rocket propulsion engineers per newton

0
1
0
repeated
repeated

C and C++ run your OS, your browser, your database, and your critical infrastructure. They're also the easiest languages to get catastrophically wrong.

We wrote down everything a security auditor should check: language-level bug classes, stdlib pitfalls, Linux and Windows issues from usermode to kernel, seccomp sandbox escapes, and ptrace handler race conditions.

One checklist, hundreds of checks. https://appsec.guide/docs/languages/c-cpp/

1
4
0
repeated

Project Zero Bot

New Project Zero issue:

Adobe DNG SDK: out-of-bounds write in dng_render_task::ProcessArea due to coordinate system confusion

https://project-zero.issues.chromium.org/issues/479111319

CVE-2026-27280
0
1
1
Show older