infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

[Cloudflare] Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1

https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/
this post | permalink
[RSS] Investigating a Mysteriously Malformed Authenticode Signature -- Elastic Security Labs

https://www.elastic.co/security-labs/malformed-authenticode-signature
this post | permalink
[RSS] Reverse engineering of Apple's iOS 0-click CVE-2025-43300: 2 bytes that make size matter

http://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
this post | permalink
[RSS] exploits.club Weekly Newsletter 85 -Fuzzing KSMBD, Kernel-Hack-Drill, Vibe-Crashing, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-85-fuzzing-ksmbd-kernel-hack-drill-vibe-crashing-and-more/
this post | permalink
[RSS] Exploit development for IBM i

https://blog.silentsignal.eu/2025/09/04/Exploit-development-for-IBM-i/

Another one from my old partners in crime, incl. exploit for CVE-2023-30990 #IBMi
this post | permalink
[RSS] Analysis of CVE-2025-37756, an UAF Vulnerability in Linux KTLS

https://u1f383.github.io/linux/2025/09/03/analysis-of-CVE-2025-37756-an-uaf-vulnerability-in-linux-ktls.html
this post | permalink
[RSS] Secondary Context Path Traversal in Omnissa Workspace ONE UEM

https://slcyber.io/assetnote-security-research-center/secondary-context-path-traversal-in-omnissa-workspace-one-uem/
this post | permalink
[RSS] Dubious security vulnerability: Remembering passwords for recently-opened ZIP files

https://devblogs.microsoft.com/oldnewthing/20250902-00/?p=111544
this post | permalink
[RSS] Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel

https://swarm.ptsecurity.com/kernel-hack-drill-and-a-new-approach-to-exploiting-cve-2024-50264-in-the-linux-kernel/
this post | permalink
@gsuberland
this post | permalink
Next Page