infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

[RSS] Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE

https://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875
this post | permalink
@kaoudis Or d14n for short
this post | permalink
@lcamtuf "scale of J.K. Rowling to Stormfront" is there an SI equivalent of this?
this post | permalink
Teammate generated a song with LLM about a local charlatan, and I have to bow before the genius of the Machine:

"[Person] will be the wall
that guides us through the night!"
this post | permalink
@malwarejake (Not so) funny story: banks around here test critical systems on prod because testing on test would risk being non-compliant if the regulator doesn't find the test system "similar enough" (whatever that means) to prod. Regulation also mandates that users on prod must be "real" because anti-laundering and whatever. In the end you either test with a real account on prod or you don't work for that client anymore.

As a company owner, I took one for the team and set up a personal bank account for testing. Surely enough, it resulted in me getting fucked *at another bank* (costing me considerable money).
this post | permalink
#IBMi is vulnerable to an authenticated user gaining elevated privilege to a physical file [CVE-2024-47104]

https://www.ibm.com/support/pages/node/7179158

Emphasis mine:

"A user with authority to a *view* can alter the based-on *physical file* security attributes without having object management rights to the physical file."

I wonder what other discrepancies there may be between Db2 and other interfaces.
this post | permalink
@cR0w @krypt3ia https://www.youtube.com/watch?v=dIDDkmxv0tA ?
this post | permalink
@wirepair I'm more terrified by the thoughts of this particular human...
this post | permalink
@cR0w And this is a foot soldier, not the head of sales!
this post | permalink
"I've learned today that you are sensitive to ensuring human readability."

And this comes from someone who's been writing documentation professionally at #Microsoft! I'm at loss for words...

https://github.com/MicrosoftDocs/WSL/pull/2021#issuecomment-2548390973
this post | permalink
Next Page