Microsoft has discovered a side-channel attack (Whisper Leak) on the network communications between AI chatbots and their backend LLMs
www.microsoft.com/en-us/securi...
@droner.bsky.social
researcher. exploit dev. pdx. hacking @ atredis https://dronesec.net/
Microsoft has discovered a side-channel attack (Whisper Leak) on the network communications between AI chatbots and their backend LLMs
www.microsoft.com/en-us/securi...
Moorty the MOO mascot holding a 386 CPU
I've officially released my real-mode emulator CPU test suite for the Intel 80386.
github.com/singlestepte...
#retrocomputing #emulation
New Blog Post: Seth Jenkins broke kASLR by doing β¦ nothing π©
googleprojectzero.blogspot.com/2025/11/defe...
[RSS] Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com ->
Original->
Interested in Jump The Wall? Applications close Nov 7 π₯
www.districtcon.org/jtw
Zimperium has discovered more than 760 Android apps that steal and relay NFC data to a remote attacker
zimperium.com/blog/tap-and...
Sophos has linked the recent Lanscope zero-day to Bronze Butler (Tick)
news.sophos.com/en-us/2025/1...
[RSS] [Blog] A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS
code-white.com ->
Original->
Blog post about my recent CVE-2025-58726, aka βThe Ghost Reflectionβ is out, read it here:
semperis.com/blog/exploit...
π
Tickets for BSides Seattle 2026 are open
www.bsidesseattle.com
We're officially announcing our speakers DistrictCon Year 1! Check out our incredible lineup: www.districtcon.org/speakers
This also includes our Day 1 & Day 2 Keynotes from Ian Levy and Dan Ridge.
And don't forget, GA tickets go on sale November 16! See you in January! πͺ©
CVE-2025-12220 - Busybox 1.31.1 - Multiple Known Vulnerabilities
CVE ID : CVE-2025-12220
Published : Oct. 25, 2025, 4:15 p.m. | 45Β minutes ago
Description : Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19....
Junkyard closes TODAY!!!!
www.districtcon.org/junkyard
The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: sessionize.com/reverse-2026
21.10.2025 19:20 β π 0 π 1 π¬ 0 π 0The Linux kernel has patched a bug in the RDSEED entropy generator that caused AMD Zen5 chips to fail to produce random numbers.
The patch disables RDSEED and forces all AMD Zen5 processors to use RDRAND for generating random numbers.
lore.kernel.org/lkml/2025101...
[RSS] exploits.club Weekly Newsletter 89 - iOS GPU Driver Bugs, Kernel Stack UAFs, Hardware Wallet Auth Bypasses, and More
blog.exploits.club ->
Original->
Announcing #Pwn2Own Automotive 2026! We're heading back to Tokyo and we're adding new targets Level 3 charging thanks to #Aplitronic & the OCTT thanks to the @openchargealliance.org. Tesla is back, too. Check out the details at www.zerodayinitiative.com/blog/2025/10...
16.10.2025 15:07 β π 1 π 2 π¬ 0 π 0Talks from the REcon 2025 security conference, which took place in June, areΒ available on YouTube
www.youtube.com/@reconmtl/vi...
π¨ Save the Date for #offensivecon26
Mark your calendars, spread the word, and stay tuned for when registrations open!
π Hilton Berlin
π§ Trainings: 11β14 May 2026
π€ Conference: 15β16 May 2026
Visit πoffensivecon.org for more details.
This one's a wild/messy one: Cyber giant F5, which serves most of the Fortune 500, said unknown government hackers had 'long term' access to its network:
β’ stole source code, some customer data
β’ accessed undisclosed vulns in BIG-IP
β’ DOJ allowed F5 to delay public notice citing national security
eclypsium.com/research/pwn... - This is the blog version of the Ekoparty talk I did in 2022; while the Chinese APTs have developed more advanced techniques, a lot of this may still be useful as you deal with the bombshell that dropped today.
15.10.2025 16:51 β π 9 π 7 π¬ 0 π 0It's Patch Tuesday and ASP.NET Core has a doozy, with a CVSS score of 9.9, our highest ever. Let's examine why.
The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...
* Thread- (1/7)
[RSS] Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers
blog.quarkslab.com ->
Original->
Modern iOS Security Features β A Deep Dive into SPTM, TXM, and Exclaves
arxiv.org ->
#fromTwitter
Original->
Trend Micro's ZDI has reported 13 vulnerabilities in the Ivanti Endpoint Manager that are still unpatched after the vendor requested an extension until March next year
www.zerodayinitiative.com/advisories/p...
We're updating our bounty program with the top award now set at $2 million for zero-click remote exploit chains. In addition - there are increased awards for proximate wireless attacks, WebKit, and Gatekeeper
security.apple.com/blog/apple...
github.com/bahorn/detec...
some rootkit detection stuff
one involving seeing if a line shows up in dmesg or not after loading a unsigned module, if it doesn't show something has been loaded in the past.
other diffs two ways of reading the kernel message buffer, getting logs hidden in one
Close your eyes and β¨imagine:
From a low-integrity process (from LPAC even), you can inject your data anywhere you want:
privileged tasks, PPL/protected processes, the OS kernel itself, and VTL1 trustlets.
Now open your eyes. It is not hypothetical.
It is the reality. Read it on page 33.
Our CFP is open! If youβre working on something exciting, we want to hear from you! Submit your talk for RE//verse 2026: sessionize.com/reverse-2026
02.10.2025 15:41 β π 1 π 2 π¬ 0 π 0