www.theregister.com/2025/10/16/w...
This is the end ...
@furaxfox.bsky.social
Parceque ! (mes opinions n'engagent que moi) Ailleurs en ligne: http://goupilland.net http://github.com/FuraxFox/ http://mastodon.acm.org/@FuraxFox
www.theregister.com/2025/10/16/w...
This is the end ...
GPU computing before CUDA was *weird*.
Memory primitives were graphics shaped, not computer science shaped.
Want to do math on an array? Store it as an RGBA texture.
Fragment Shader for processing. *Paint* the result in a big rectangle.
#Podcast #Cybersécurité #LA25 #LesAssises
Épisode #516 consacré aux Assises de la Cybersécurité 2025, avec Maria Iacono
www.nolimitsecu.fr/les-assises-...
Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-043/
youtu.be/AQqZUzeTFOc?...
If you want love from attackers: vibe code your applications
Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-042/
And when strategic choices make the organisation fragile, it is not only IT which suffers but the whole organization and its partners.
08.10.2025 21:30 — 👍 0 🔁 0 💬 0 📌 0The impact of a serious cyber attack is not about IT it is about business. And restoring full business function after an emergency interruption can be very, VERY, long.
Cyber-resilience is not just an IT problem, and it has to be dealt with as an organisation level strategy.
...Anybody who has been in the trenches of these incidents will tell you that two things happen: your business IT has a heart attack, and paying does not equal restoration. In almost every case, even with payment, restoration takes weeks to months[...]
08.10.2025 21:26 — 👍 0 🔁 0 💬 1 📌 0[...]Many organisations think IT disaster recovery plans deal with ransomware. It doesn’t. [...]. I’ve talked to business after business after business whose real plan with ransomware is simply: the insurance covers it, we’d pay. ...
08.10.2025 21:26 — 👍 0 🔁 0 💬 1 📌 0@doublepulsar.com on the impact of ransomware on business and society
doublepulsar.com/the-elephant...
Virtual Machines render fonts. It’s kind of insane.
TrueType has its own instruction set, memory stack, and function calls.
You can debug it like assembly. It’s also exploitable:
Sa très belle exposition avait été installée à Besançon. La Russie est un état terroriste.
03.10.2025 20:35 — 👍 104 🔁 32 💬 0 📌 0Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-041/
⚠️ Alerte CERT-FR ⚠️
Les vulnérabilités CVE-2025-20362 et CVE-2025-20333 sont activement exploitées sur Cisco ASA et FTD.
Un attaquant non authentifié peut exécuter du code arbitraire à distance.
www.cert.ssi.gouv.fr/alerte/CERTF...
#Podcast #Cybersécurité #ANSSI #IOT
Épisode #514 consacré à la publication de @anssi-fr.bsky.social : "Approche SSI pour l'Internet des objets industriels", avec Laëtitia C.
www.nolimitsecu.fr/approche-ssi...
How to assemble a tiny but realistic, Docker-like Container using only stock Linux tools: unshare, mount, and pivot_root - A very long article by Ivan Velichko #Docker #Linux labs.iximiuz.com/tutorials/co...
02.10.2025 19:10 — 👍 5 🔁 3 💬 0 📌 1This processor doesn’t (officially) exist.
Pre-production Engineering Samples sometimes make it into the grey market.
Rarer still are Employee Loaner Chips.
Ghosts abandoned before ever becoming products:
Roughly 48,800 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) appliances exposed on the public web are vulnerable to two vulnerabilities actively leveraged by hackers.
30.09.2025 12:58 — 👍 6 🔁 4 💬 0 📌 0Enquête pour @numerama.com: comment Rohan Rane, fondateur de l'organisation CVLT incarcéré en France, a posé les bases méthodologiques et idéologiques d'une vague mondiale de cyber-sextortion sadique, qui a ciblé des centaines de mineures. Le fondateur de 764 a ainsi été "formé" au sein de CVLT.
29.09.2025 13:19 — 👍 41 🔁 42 💬 2 📌 1The three buddies back together for a fresh problem. @craiu.bsky.social @jags.bsky.social
WATCH on YouTube youtu.be/yBrNMWvYQ6A?...
Warnings about Cisco vulns under active exploit are falling on deaf ears
30.09.2025 16:16 — 👍 7 🔁 4 💬 0 📌 0A good post by Bruce Schneier: digital threat modeling under authoritarianism www.schneier.com/blog/archive...
29.09.2025 10:23 — 👍 44 🔁 32 💬 1 📌 6Russia has become the largest single-country buyer of Ecuadorian bananas, purchasing 1.5 million metric tons during 2024 and the first half of 2025.
How is it related to global diversification of cocaine trafficking routes? 🤔
SSDs are pretty reliable in a technical sense.
That is, unless you make a really, really bad mistake in firmware.
HP had a line of ~20 different Enterprise SSD models for datacenter use.
In exactly 3 years, 270 days and 8 hours, every one is irrecoverably bricked.
#Podcast #Cybersécurité
Épisode #513 consacré à l'outil de cartographie open source Mercator, avec son créateur Didier Barzin
www.nolimitsecu.fr/mercator/
Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-040/
Seuls des rois de la cryptanalyse pouvaient percer le mystère des lettres codées d'une reine ✍️
23.09.2025 08:37 — 👍 171 🔁 54 💬 2 📌 5In-depth investigation from the BBC, which infiltrated a disinformation operation to interfere in the Moldovan elections.
This operation is coordinated remotely by pro-Russian actors through Telegram.
www.bbc.co.uk/news/article...