Goupil's Avatar

Goupil

@furaxfox.bsky.social

Parceque ! (mes opinions n'engagent que moi) Ailleurs en ligne: http://goupilland.net http://github.com/FuraxFox/ http://mastodon.acm.org/@FuraxFox

213 Followers  |  400 Following  |  76 Posts  |  Joined: 30.11.2024  |  2.2365

Latest posts by furaxfox.bsky.social on Bluesky

Preview
Windows 10 isn't only Microsoft product at end of support : Windows 10 is the least of some people's problems

www.theregister.com/2025/10/16/w...
This is the end ...

16.10.2025 14:21 — 👍 0    🔁 0    💬 0    📌 0
Post image Post image

GPU computing before CUDA was *weird*.


Memory primitives were graphics shaped, not computer science shaped.


Want to do math on an array? Store it as an RGBA texture.


Fragment Shader for processing. *Paint* the result in a big rectangle.

14.10.2025 20:43 — 👍 67    🔁 6    💬 6    📌 2
Preview
Les Assises 2025 - NoLimitSecu Episode #516 Les Assises 2025 Avec Maria Iacono

#Podcast #Cybersécurité #LA25 #LesAssises

Épisode #516 consacré aux Assises de la Cybersécurité 2025, avec Maria Iacono

www.nolimitsecu.fr/les-assises-...

13.10.2025 06:21 — 👍 3    🔁 2    💬 0    📌 0

Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-043/

13.10.2025 12:13 — 👍 1    🔁 1    💬 0    📌 0
Vibe coding your way into a security nightmare by Arjen Wiersma
YouTube video by Devoxx Vibe coding your way into a security nightmare by Arjen Wiersma

youtu.be/AQqZUzeTFOc?...
If you want love from attackers: vibe code your applications

09.10.2025 08:21 — 👍 1    🔁 1    💬 0    📌 0

Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-042/

06.10.2025 12:16 — 👍 1    🔁 1    💬 0    📌 0

And when strategic choices make the organisation fragile, it is not only IT which suffers but the whole organization and its partners.

08.10.2025 21:30 — 👍 0    🔁 0    💬 0    📌 0

The impact of a serious cyber attack is not about IT it is about business. And restoring full business function after an emergency interruption can be very, VERY, long.

Cyber-resilience is not just an IT problem, and it has to be dealt with as an organisation level strategy.

08.10.2025 21:29 — 👍 0    🔁 0    💬 1    📌 0

...Anybody who has been in the trenches of these incidents will tell you that two things happen: your business IT has a heart attack, and paying does not equal restoration. In almost every case, even with payment, restoration takes weeks to months[...]

08.10.2025 21:26 — 👍 0    🔁 0    💬 1    📌 0

[...]Many organisations think IT disaster recovery plans deal with ransomware. It doesn’t. [...]. I’ve talked to business after business after business whose real plan with ransomware is simply: the insurance covers it, we’d pay. ...

08.10.2025 21:26 — 👍 0    🔁 0    💬 1    📌 0
Preview
The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic… Recently, there’s been three major UK ransomware and/or extortion incidents at three big UK companies — Co-op Group, Marks and Spencer and…

@doublepulsar.com on the impact of ransomware on business and society
doublepulsar.com/the-elephant...

08.10.2025 21:24 — 👍 1    🔁 0    💬 1    📌 0
Post image Post image

Virtual Machines render fonts. It’s kind of insane.



TrueType has its own instruction set, memory stack, and function calls.



You can debug it like assembly. It’s also exploitable:

02.10.2025 20:43 — 👍 109    🔁 21    💬 3    📌 3

Sa très belle exposition avait été installée à Besançon. La Russie est un état terroriste.

03.10.2025 20:35 — 👍 104    🔁 32    💬 0    📌 0

Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-041/

29.09.2025 12:13 — 👍 1    🔁 2    💬 0    📌 0

⚠️ Alerte CERT-FR ⚠️

Les vulnérabilités CVE-2025-20362 et CVE-2025-20333 sont activement exploitées sur Cisco ASA et FTD.
Un attaquant non authentifié peut exécuter du code arbitraire à distance.

www.cert.ssi.gouv.fr/alerte/CERTF...

25.09.2025 17:34 — 👍 3    🔁 5    💬 1    📌 1
Preview
Approche SSI pour l'Internet des objets industriels - NoLimitSecu Episode #514 Approche SSI pour l’Internet des objets industriels Avec Laëtitia C. Références :  https://cyber.gouv.fr/sites/default/files/document/approche_ssi_pour_l_internet_des_objets_industriels_2...

#Podcast #Cybersécurité #ANSSI #IOT

Épisode #514 consacré à la publication de @anssi-fr.bsky.social : "Approche SSI pour l'Internet des objets industriels", avec Laëtitia C.

www.nolimitsecu.fr/approche-ssi...

29.09.2025 08:41 — 👍 5    🔁 4    💬 0    📌 0
Preview
How Container Filesystem Works: Building a Docker-like Container From Scratch | iximiuz Labs Learn how Linux containers are built from the ground up. Starting with the mount namespace and a root filesystem, see why PID, cgroup, UTS, and network namespaces naturally follow - and how this…

How to assemble a tiny but realistic, Docker-like Container using only stock Linux tools: unshare, mount, and pivot_root - A very long article by Ivan Velichko #Docker #Linux labs.iximiuz.com/tutorials/co...

02.10.2025 19:10 — 👍 5    🔁 3    💬 0    📌 1
Post image Post image

This processor doesn’t (officially) exist.



Pre-production Engineering Samples sometimes make it into the grey market.



Rarer still are Employee Loaner Chips.

Ghosts abandoned before ever becoming products:

01.10.2025 21:26 — 👍 35    🔁 6    💬 3    📌 1
Preview
Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws Roughly 48,800 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) appliances exposed on the public web are vulnerable to two vulnerabilities actively leveraged by hackers.

Roughly 48,800 Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) appliances exposed on the public web are vulnerable to two vulnerabilities actively leveraged by hackers.

30.09.2025 12:58 — 👍 6    🔁 4    💬 0    📌 0

Enquête pour @numerama.com: comment Rohan Rane, fondateur de l'organisation CVLT incarcéré en France, a posé les bases méthodologiques et idéologiques d'une vague mondiale de cyber-sextortion sadique, qui a ciblé des centaines de mineures. Le fondateur de 764 a ainsi été "formé" au sein de CVLT.

29.09.2025 13:19 — 👍 41    🔁 42    💬 2    📌 1
Cisco firewall zero-days and bootkits in the wild
YouTube video by Three Buddy Problem Cisco firewall zero-days and bootkits in the wild

The three buddies back together for a fresh problem. @craiu.bsky.social @jags.bsky.social

WATCH on YouTube youtu.be/yBrNMWvYQ6A?...

27.09.2025 19:56 — 👍 7    🔁 5    💬 1    📌 0
Preview
Warnings about Cisco vulns under active exploit are falling on deaf ears 50,000 firewall devices still exposed Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by "advanced" attackers remain exposed to the internet, according to Shadowserver data.…

Warnings about Cisco vulns under active exploit are falling on deaf ears

30.09.2025 16:16 — 👍 7    🔁 4    💬 0    📌 0
Digital Threat Modeling Under Authoritarianism - Schneier on Security Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smar...

A good post by Bruce Schneier: digital threat modeling under authoritarianism www.schneier.com/blog/archive...

29.09.2025 10:23 — 👍 44    🔁 32    💬 1    📌 6
Post image

Russia has become the largest single-country buyer of Ecuadorian bananas, purchasing 1.5 million metric tons during 2024 and the first half of 2025.

How is it related to global diversification of cocaine trafficking routes? 🤔

29.09.2025 10:29 — 👍 53    🔁 32    💬 3    📌 3
Post image Post image

SSDs are pretty reliable in a technical sense.


That is, unless you make a really, really bad mistake in firmware.

HP had a line of ~20 different Enterprise SSD models for datacenter use.


In exactly 3 years, 270 days and 8 hours, every one is irrecoverably bricked.

22.09.2025 18:50 — 👍 143    🔁 39    💬 11    📌 4
Preview
Mercator - NoLimitSecu Episode #513 consacré à Mercator Avec Didier Barzin

#Podcast #Cybersécurité

Épisode #513 consacré à l'outil de cartographie open source Mercator, avec son créateur Didier Barzin

www.nolimitsecu.fr/mercator/

23.09.2025 06:12 — 👍 7    🔁 3    💬 0    📌 0

Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-040/

22.09.2025 13:50 — 👍 1    🔁 1    💬 0    📌 0
Video thumbnail

Seuls des rois de la cryptanalyse pouvaient percer le mystère des lettres codées d'une reine ✍️

23.09.2025 08:37 — 👍 171    🔁 54    💬 2    📌 5
Preview
How Russian-funded fake news network aims to disrupt European election - BBC investigation An undercover reporter discovers a network is offering to pay for social media posts undermining Moldova’s ruling party.

In-depth investigation from the BBC, which infiltrated a disinformation operation to interfere in the Moldovan elections.

This operation is coordinated remotely by pro-Russian actors through Telegram.
www.bbc.co.uk/news/article...

21.09.2025 12:08 — 👍 39    🔁 30    💬 3    📌 3
Preview
Ivanti EPMM holes let miscreants plant shady listeners, CISA says Unnamed org compromised with two malware sets An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed organization, according to the US Cybersecurity and Infrastructure Security Agency.…

Ivanti EPMM holes let miscreants plant shady listeners, CISA says

19.09.2025 17:28 — 👍 1    🔁 1    💬 0    📌 0

@furaxfox is following 20 prominent accounts