infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

Overview of WebAssembly Type Confusion in JavaScript Engines Exploitation

https://xia0.sh/blog/overview-of-wasm-in-jsengine-exploit?ref=blog.exploits.club
this post | permalink
@troed Devs make mistakes. This should've been caught by a code scanner.
this post | permalink
It's not ../, it's a vanilla stack overflow as a result of strncpy with input size.

This company should not exist by now.

https://labs.watchtowr.com/do-secure-by-design-pledges-come-with-stickers-ivanti-connect-secure-rce-cve-2025-0282/
this post | permalink
[RSS] WorstFit: Unveiling Hidden Transformers in Windows ANSI!

https://devco.re/blog/2025/01/09/worstfit-unveiling-hidden-transformers-in-windows-ansi/
this post | permalink
@cfgbot file renaming is hard! /cc @gergelykalman
this post | permalink
[RSS] Two Network-related vunlnerabilities Analysis

https://u1f383.github.io/linux/2025/01/08/two-network-related-vulnerabilities-analysis.html

#Linux kernel - CVE-2023-6932 CVE-2023-0461
this post | permalink
[RSS] Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

https://www.netspi.com/blog/technical-blog/cloud-pentesting/hijacking-azure-machine-learning-notebooks/
this post | permalink
@jerry Can't verify it's really you with shoes on
this post | permalink
@wdormann @http IME devil is in the details and having another (easy to use) tool on your belt is always useful. But conceptually you are right of course.
this post | permalink
@wdormann @http Admin->Kernel is still useful for attackers though, esp. for disabling endpoint protection.
this post | permalink
Next Page