Did anyone count? How many vulns just in 2025 alone?
- 1 Post
- 18 Comments
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Ivanti warns of critical Endpoint Manager code execution flawEnglish1·4 months ago
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Windows drive letters are not limited to A-ZEnglish4·4 months agoSo, will the AV software then scan that +:\ drive or not? 🤔
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•SonicWall: Firewall configs stolen for all cloud backup customersEnglish1·6 months agoI wonder what must happen that we as a society start to make companies responsible for such fails.
I like this comment on that page, haven’t heard about it before: «Was done…in Stockholm a few years back. Someone copied the plates of the CEO of the company operating a toll road in the city and posted it online. Folks pasted it over their own plates and used the toll road all day. The ALPR dutifully generated an humongous bill…»
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader supportEnglish3·7 months agoSee slides #8 and #10 on this presentation: https://download.openwall.net/pub/projects/lkrg/presentations/OSTconf2020-LKRG-In-A-Nutshell.pdf -> Kernel Panic (milder response would be ineffective) and killing the task.
And which has constantly lied to you and ignored what you told it to not do. Must be that quality we were told about…
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dogEnglish2·9 months ago«PQC…isn’t mathematics or engineering, it’s augury: ‘A great machine shall arise, and it will cast aside all existing cryptography, there shall be Famine, Plague, War, and a long arable field.’»
🤭
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•A PNG Image With an Embedded Gift, (Sat, May 31st)English5·10 months agoYes. And you will have a good chance that the EDR wont flag the extractor since its not suspicious code per se.
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•How the Signal Knockoff App TeleMessage Got Hacked in 20 MinutesEnglish7·11 months ago«When they loaded this URL, the server responded with a Java heap dump, which is a roughly 150-MB file containing a snapshot of the server’s memory at the moment the URL was loaded.»
Comedy gold, the whole article…
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Microsoft employees are banned from using DeepSeek app, president saysEnglish2·11 months agoNews or not. I like the fact that the pot is calling the kettle black…
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Microsoft wouldn't look at a bug report without a video. Researcher maliciously compliedEnglish6·1 year agoA tad late (the original story), but now there is an opinion piece on this topic now: https://www.theregister.com/2025/03/24/microsoft_opinion/
I like the part with “This a post-literate era, and we should expect the next demand for bughunters to express proof-of-concept as a TikTok dance short.”
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Hackers exploit DoS flaw to disable Palo Alto Networks firewallsEnglish2·1 year agoOH: «by sending a malicious DNS packet to the target device», 👌🤭
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Ivanti warns of maximum severity CSA auth bypass vulnerabilityEnglish1·1 year agoI lost count. How many vulns this year already?
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•How Cloudflare CTO John Graham-Cumming cracked an encrypted ZIP file containing the code for a system that helped ANC members communicate safely under apartheid (Steven Levy/Wired)English9·1 year agoOr you could follow to the (original) blog: https://blog.jgc.org/2024/09/cracking-old-zip-file-to-help-open.html
krogoth@infosec.pubMto Pulse of Truth@infosec.pub•Revolver Rabbit gang registers 500,000 domains for malware campaignsEnglish1·2 years agoYou mean like FIST but with a huge revolver? 😍
I like this part: «Can I access the shell in an emergency? Emergency shell access is available to YOLO Support engineers, with your written consent, during an active support case. End users do not have shell access»