93 Followers
90 Following
27 Posts
- writing and editing since 2011
- fuck "AI" and "crypto" and Elon Musk
- accusations of LLM usage will be met with violence
- friendlier than any of this makes me seem
Pronounsthey / them

The bright #LLM future, next part.

git.gentoo.org is now effectively dead, being DDoS-ed by almost a million different IPs every day. Most of them are just performing a single request at a totally random URL. How are people supposed to deal with that? How can we distinguish a legitimate user who hit some URL from a scraper that distributes its operations over thousands of IP addresses?

If you use LLM crap, you're part of the problem. You support these bastards. You should be ashamed of yourself.

#Gentoo #NoAI #NoLLM #AI

Ummm... Is SANS training ICE?

https://sam.gov/workspace/contract/opp/99f8bdc298c34f06bcac9bd7e39b1bca/view

Edit to add: SANS is training ICE how to pull information off of harddrives, etc.

FOR498: Digital Acquisition and Rapid Triage

"Course Overview:
A digital forensic acquisition training course, FOR498 provides the skills to identify the many and varied data storage mediums in use today, and how to collect and preserve this data in a forensically sound manner despite how and where it may be stored. This forensics data collection course covers digital acquisition from computers, portable devices, networks, and the cloud, and teaches rapid triage—the art and science of identifying and starting to extract actionable intelligence from a hard drive in 90 minutes or less."

This training will directly hurt people.

#sans #ice #infosec

Perhaps the most offensive thing to me of all, is that these LLM-loving AI-boosting idiots who perpetuate falsehoods like 'AI can read minds with fMRI' and 'AI can magically find vulnerabilities' and 'AI will cure cancer' is that we have known this is bullshit for years.

Years.

IBM Watson was launched as a magical cure-all in 2013. By 2022 it had been pulled from everything because despite years of 'refining' and 'training,' following it would have killed over 50% of patients. At it's best.

A security audit of Rust Coreutils found 70 CVEs. 44 of these could be fixed for release 0.8. The rest remain unfixed and undisclosed for now.

Ubuntu 26.04 LTS has added Rust Coreutils EXCEPT the cp, mv, and rm commands.

I assume most of the remaining 26 CVEs are therefore in cp, mv and rm.

How is your „let‘s rewrite it in Rust“ project going?

https://www.phoronix.com/news/Ubuntu-Rust-Coreutils-Audit

Update: Rust coreutils has contributed to the GNU test cases.

Ubuntu Rust Coreutils Audit Revealed 113 Issues, Ubuntu 26.10 Aims For "100% Rust Coreutils"

Ahead of tomorrow's Ubuntu 26.04 LTS release, Canonical published a blog post today outlining the state of Rust Coreutils for its premiere in this long-term support (LTS) version

github operates on the five neins principle:
* nein to availability
* nein to predictability
* nein to user experience
* nein to community service
* nein to thoughtful decisions
Found it

JetBrains Security Bulletin only shows 7 vulnerabilities out of "26 security problems fixed": 🔗 https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&version=2024.03

  • CVE-2024-31134 (vendor 6.5 medium) In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled
  • CVE-2024-31135 (vendor 6.1 medium) In JetBrains TeamCity before 2024.03 open redirect was possible on the login page
  • CVE-2024-31136 (vendor 7.4 high) In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter
  • CVE-2024-31137 (vendor 6.8 medium) In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration
  • CVE-2024-31138 (vendor 4.6 medium) In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings
  • CVE-2024-31139 (vendor 5.9 medium) In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector
  • CVE-2024-31140 (vendor 4.1 medium) In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files from the server by installing tools

cc: @campuscodi

#JetBrains #TeamCity #vulnerability

Fixed security issues

This page contains information about resolved security issues, including description, severity, assigned CVEs, and the product versions in which they were resolved.

JetBrains