I like this part: «Can I access the shell in an emergency? Emergency shell access is available to YOLO Support engineers, with your written consent, during an active support case. End users do not have shell access»
- 2 Posts
- 25 Comments
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Ivanti warns of critical Endpoint Manager code execution flawEnglish
1·5 个月前Did anyone count? How many vulns just in 2025 alone?
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Windows drive letters are not limited to A-ZEnglish
4·5 个月前So, will the AV software then scan that +:\ drive or not? 🤔
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•SonicWall: Firewall configs stolen for all cloud backup customersEnglish
1·7 个月前I wonder what must happen that we as a society start to make companies responsible for such fails.
I like this comment on that page, haven’t heard about it before: «Was done…in Stockholm a few years back. Someone copied the plates of the CEO of the company operating a toll road in the city and posted it online. Folks pasted it over their own plates and used the toll road all day. The ALPR dutifully generated an humongous bill…»
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader supportEnglish
3·8 个月前See slides #8 and #10 on this presentation: https://download.openwall.net/pub/projects/lkrg/presentations/OSTconf2020-LKRG-In-A-Nutshell.pdf -> Kernel Panic (milder response would be ineffective) and killing the task.
And which has constantly lied to you and ignored what you told it to not do. Must be that quality we were told about…
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dogEnglish
2·9 个月前«PQC…isn’t mathematics or engineering, it’s augury: ‘A great machine shall arise, and it will cast aside all existing cryptography, there shall be Famine, Plague, War, and a long arable field.’»
🤭
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•A PNG Image With an Embedded Gift, (Sat, May 31st)English
5·11 个月前Yes. And you will have a good chance that the EDR wont flag the extractor since its not suspicious code per se.
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•How the Signal Knockoff App TeleMessage Got Hacked in 20 MinutesEnglish
7·11 个月前«When they loaded this URL, the server responded with a Java heap dump, which is a roughly 150-MB file containing a snapshot of the server’s memory at the moment the URL was loaded.»
Comedy gold, the whole article…
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Microsoft employees are banned from using DeepSeek app, president saysEnglish
2·1 年前News or not. I like the fact that the pot is calling the kettle black…
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Microsoft wouldn't look at a bug report without a video. Researcher maliciously compliedEnglish
6·1 年前A tad late (the original story), but now there is an opinion piece on this topic now: https://www.theregister.com/2025/03/24/microsoft_opinion/
I like the part with “This a post-literate era, and we should expect the next demand for bughunters to express proof-of-concept as a TikTok dance short.”
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Hackers exploit DoS flaw to disable Palo Alto Networks firewallsEnglish
2·1 年前OH: «by sending a malicious DNS packet to the target device», 👌🤭
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Ivanti warns of maximum severity CSA auth bypass vulnerabilityEnglish
1·1 年前I lost count. How many vulns this year already?
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•How Cloudflare CTO John Graham-Cumming cracked an encrypted ZIP file containing the code for a system that helped ANC members communicate safely under apartheid (Steven Levy/Wired)English
9·2 年前Or you could follow to the (original) blog: https://blog.jgc.org/2024/09/cracking-old-zip-file-to-help-open.html
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Revolver Rabbit gang registers 500,000 domains for malware campaignsEnglish
1·2 年前You mean like FIST but with a huge revolver? 😍
krogoth@infosec.pubMto
Pulse of Truth@infosec.pub•Majority of Critical Open Source Projects Contain Memory Unsafe CodeEnglish
1·2 年前Not sure if that is even the point. The article is all about memory unsafe programming!!1!. But there is no context at all.
Sure, there are vulnerabilities because of unsafe memory handling. But I looked for some statistic which would bring unsafe memory handling into context with say the high profile vulnerabilities from the last few weeks / months. I haven’t spent too much time on research but looking at some lists containing vulns from the last few months it seems as if all those pre-auth, priv escalation, directory traversal and whatnot very based on much simpler failures like wrong error handling or logical errors or missing code than unsafe memory handling.
I might be wrong, then please show me the numbers, but shooting at C/C++ because unsafe!!1! sounds like a very biased story there.
And while we are at it. I’d also be interested in C vs. (somewhat modern) C++.
Oh wow 🙄. Thanks for letting me know.