Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

harrysintonen@infosec.exchangeH

harrysintonen@infosec.exchange

@harrysintonen@infosec.exchange
About
Posts
15
Topics
8
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • CVE-2026-42945 Heap-based Buffer Overflow in #nginx combined with the linux kernel LPEs is "not great" as we say in the industry.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    CVE-2026-42945 Heap-based Buffer Overflow in #nginx combined with the linux kernel LPEs is "not great" as we say in the industry.

    Link Preview Image
    NGINX Rift

    An 18 year old memory corruption flaw in NGINX Plus and NGINX Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests.

    favicon

    (depthfirst.com)

    #CVE_2026_42945

    Uncategorized nginx cve202642945

  • Yet another #BitLocker "exploit" circulating.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @gabrielesvelto Any solution that unlocks the encryption automatically without user having to provide "something you know" (*) is vulnerable to attacks by definition.

    *) "something you have" may be good enough, for example some token or USB key. In this case you need to accept the risk of the attacker gaining access to the token, however.

    Uncategorized bitlocker infosec cybersecurity

  • Yet another #BitLocker "exploit" circulating.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Yet another #BitLocker "exploit" circulating.

    This is a friendly reminder that if you set your system to just unlock with TPM alone, the system is not protected against determined attacker. BitLocker with TPM cannot protect your system unless if you configure the system to request PIN as well.

    See: https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/countermeasures

    #infosec #cybersecurity

    Uncategorized bitlocker infosec cybersecurity

  • Vulnerabilities found from #curl:
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Vulnerabilities found from #curl:

    #Mythos: 1
    Me: 30

    - https://daniel.haxx.se/blog/2026/05/11/mythos-finds-a-curl-vulnerability/
    - https://sintonen.fi/advisories/

    Uncategorized curl mythos

  • Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @christopherkunz Sure if you executed that particular exploit you definitely must restore the /etc/passwd afterwards.

    Uncategorized linuxkernel vulnerability infosec cybersecurity cve202643284

  • Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Note that if you tested the exploit locally and then applied the workaround your system will retain the tampered kernel cache and will remain vulnerable even when the module is no longer in memory and cannot no longer be loaded.

    You can use sudo sh -c "echo 3 > /proc/sys/vm/drop_caches" to flush the exploit from memory. Rebooting will also work, of course.

    EDIT: Needless to say you should not execute random exploits in any important system. Always use a dedicated VM you can wipe after testing.

    Uncategorized linuxkernel vulnerability infosec cybersecurity cve202643284

  • Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @gtsadmin They will be loaded by the kernel automatically on demand. So apply the mitigation until kernel update is available.

    Uncategorized linuxkernel vulnerability infosec cybersecurity cve202643284

  • Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Apparently there's yet another #LinuxKernel Local Privilege Escalation #vulnerability. There's a mitigation that disables esp4, esp6 and rxrpc modules.

    Link Preview Image
    oss-security - Dirty Frag: Universal Linux LPE

    favicon

    (www.openwall.com)

    Link Preview Image
    GitHub - V4bel/dirtyfrag

    Contribute to V4bel/dirtyfrag development by creating an account on GitHub.

    favicon

    GitHub (github.com)

    EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. https://nvd.nist.gov/vuln/detail/CVE-2026-43284 https://nvd.nist.gov/vuln/detail/CVE-2026-43500

    #infosec #cybersecurity #CVE_2026_43284 #CVE_2026_43500

    Uncategorized linuxkernel vulnerability infosec cybersecurity cve202643284

  • i set up a new vps at some weird provider and they sent me an e-mail with my vps credentials
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @rebane2001 This reminds me of a certain provider who used to have a pre-created user on the default Linux image with a password the same as the username. The user was in sudoers. This user account wasn't documented anywhere.

    So even if you changed the root password, all systems set up with that image remained trivially exploitable over ssh.

    Uncategorized

  • Los Alamos nuclear secrets "leaked" in LPG-21 magnetic disk memory:
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Los Alamos nuclear secrets "leaked" in LPG-21 magnetic disk memory:

    - YouTube

    Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

    favicon

    (www.youtube.com)

    I guess securely wiping storage media wasn't a thing eh?

    #retrocomputing #usagielectric

    Uncategorized retrocomputing usagielectric

  • I've tried to report a security vulnerability to @signalapp for months now (first attempt was 2025-11-23 to the official security-at email address).
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @Netux @signalapp I of course included PoC. This is no my first ride.

    Uncategorized signalapp

  • I've tried to report a security vulnerability to @signalapp for months now (first attempt was 2025-11-23 to the official security-at email address).
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    I've tried to report a security vulnerability to @signalapp for months now (first attempt was 2025-11-23 to the official security-at email address). I haven't gotten any response from them, even after repeated attempts. This is highly frustrating.

    Is there a way to reach them? I don't need any kind of special treatment, just someone acknowledging that the message has been received would be okay.

    #signalapp

    Uncategorized signalapp

  • So... Anthropic spent weeks claiming that it couldn't publicly release its Mythos AI model because of its alleged offensive hacking capabilities and.... some AI nerds from Discord just found it and accessed it?
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    @zackwhittaker No amount of AI can protect one from human stupidity.

    Uncategorized

  • Not every security adjacent bug is an exploitable vulnerability.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Not every security adjacent bug is an exploitable vulnerability.

    Uncategorized

  • #Yammer (oh sorry I meant "Viva Engage communities") will be enabled in #Teams for everyone, by default.
    harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    #Yammer (oh sorry I meant "Viva Engage communities") will be enabled in #Teams for everyone, by default. Unless if you opt out at org level: https://mc.merill.net/message/MC1218423

    Here's how you can turn this thing off: https://learn.microsoft.com/en-us/MicrosoftTeams/teams-viva-experiences#how-to-set-viva-engage-experiences-in-teams

    Uncategorized yammer teams
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups